[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] RHEL Linux Kernel Exploit
- To: musnt live <musntlive@xxxxxxxxx>, full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] RHEL Linux Kernel Exploit
- From: Greg Whynott <gwhynott@xxxxxxxxx>
- Date: Wed, 15 Dec 2010 12:34:34 -0500
funny...
1. you were root when you ran the code! epic elite.
2. he said "red hat" NOT redhat based. Redhat has no control over what
others do to "redhat based" efforts.
you need more coffee! 8)
-g
musnt live spewed:
[musntlive@pizda ~]# awk '/rel/' /etc/issue
Scientific Linux SL release 5.5 (Boron)
[musntlive@pizda ~]# uname -a
Linux allotropos 2.6.18-194.3.1.el5 #1 SMP Fri May 7 01:52:57 EDT 2010
i686 athlon i386 GNU/Linux
[musntlive@pizda ~]# md5sum fullnullson.c
b16e2a647bc8de1f72f25ab29aa916da fullnullson.c
[musntlive@pizda ~]# gcc -o hakaruski fullnullson.c && ./hakaruski
[*] Failed to open file descriptors.
[musntlive@pizda ~]# id
uid=0(root) gid=0(root)
groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel),1337(hakaruskis)
[musntlive@pizda ~]# whoami
musntlive
Is this exploit work and is my Linux is RedHat based. Thank you Dan
and Ryan Seacrest!
--
--
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/