OpenVZ Forum


Home » Mailing lists » Devel » IMPORTANT: latest RHEL4 kernel has a root exploit!! (2.6.9-023stab016.2)
IMPORTANT: latest RHEL4 kernel has a root exploit!! (2.6.9-023stab016.2) [message #7368] Thu, 12 October 2006 01:47 Go to next message
Avi Brender is currently offline  Avi Brender
Messages: 17
Registered: October 2006
Junior Member
Hi,

The latest RHEL4 kernel for OpenVZ ((2.6.9-023stab016.2) available at
http://openvz.org/download/kernel/rhel4/ is vulnerable to the PRCTL exploit:
http://isc.sans.org/diary.php?storyid=1482

example session of "nobody" running the exploit and getting a root shell:

[root@mailin-02node tmp]# uname -a
Linux mailin-02node.elitehosts.com 2.6.9-023stab016.2 #1 Thu Aug 10 23:39:42
MSD 2006 i686 i686 i386 GNU/Linux
[root@mailin-02node tmp]# su nobody
bash-3.00$ ls -ld 05
-rwxr-xr-x 1 nobody nobody 13298 Oct 11 21:42 05
bash-3.00$ ./05

prctl() suidsafe exploit

(C) Julien TINNES

[+] Installed signal handler
[+] We are suidsafe dumpable!
[+] Malicious string forged
[+] Segfaulting child
[+] Waiting for exploit to succeed (~26 seconds)
[+] getting root shell
sh-3.00# whoami
root
sh-3.00# uname -a
Linux mailin-02node.elitehosts.com 2.6.9-023stab016.2 #1 Thu Aug 10 23:41:42
MSD 2006 i686 i686 i386 GNU/Linux
sh-3.00#

---------------------------
Avi Brender
abrender@elitehosts.com
Elite Hosts, Inc
-------------------------------------------------------
WARNING !!! This email message is for the sole use of the intended
recipient(s) and may contain confidential and privileged information. Any
unauthorized review; use, disclosure or distribution is prohibited, and
could result in criminal prosecution. If you are not the intended recipient,
please contact the sender by reply email and destroy all copies of the
original message. This message is private and is considered a confidential
exchange - public disclosure of this electronic message or its contents are
prohibited.
----------------------
Re: IMPORTANT: latest RHEL4 kernel has a root exploit!! (2.6.9-023stab016.2) [message #7373 is a reply to message #7368] Thu, 12 October 2006 09:32 Go to previous message
Mishin Dmitry is currently offline  Mishin Dmitry
Messages: 112
Registered: February 2006
Senior Member
Hi, Avi!

Sorry for long delay, new 2.6.9-based kernels are uploaded:
http://download.openvz.org/kernel/rhel4/023stab030.1/

On Thursday 12 October 2006 05:47, Avi Brender wrote:
> Hi,
>
> The latest RHEL4 kernel for OpenVZ ((2.6.9-023stab016.2) available at
> http://openvz.org/download/kernel/rhel4/ is vulnerable to the PRCTL
> exploit: http://isc.sans.org/diary.php?storyid=1482
>
> example session of "nobody" running the exploit and getting a root shell:
>
> [root@mailin-02node tmp]# uname -a
> Linux mailin-02node.elitehosts.com 2.6.9-023stab016.2 #1 Thu Aug 10
> 23:39:42 MSD 2006 i686 i686 i386 GNU/Linux
> [root@mailin-02node tmp]# su nobody
> bash-3.00$ ls -ld 05
> -rwxr-xr-x 1 nobody nobody 13298 Oct 11 21:42 05
> bash-3.00$ ./05
>
> prctl() suidsafe exploit
>
> (C) Julien TINNES
>
> [+] Installed signal handler
> [+] We are suidsafe dumpable!
> [+] Malicious string forged
> [+] Segfaulting child
> [+] Waiting for exploit to succeed (~26 seconds)
> [+] getting root shell
> sh-3.00# whoami
> root
> sh-3.00# uname -a
> Linux mailin-02node.elitehosts.com 2.6.9-023stab016.2 #1 Thu Aug 10
> 23:41:42 MSD 2006 i686 i686 i386 GNU/Linux
> sh-3.00#
>
> ---------------------------
> Avi Brender
> abrender@elitehosts.com
> Elite Hosts, Inc
> -------------------------------------------------------
> WARNING !!! This email message is for the sole use of the intended
> recipient(s) and may contain confidential and privileged information. Any
> unauthorized review; use, disclosure or distribution is prohibited, and
> could result in criminal prosecution. If you are not the intended
> recipient, please contact the sender by reply email and destroy all copies
> of the original message. This message is private and is considered a
> confidential exchange - public disclosure of this electronic message or its
> contents are prohibited.
> ----------------------

--
Thanks,
Dmitry.
Previous Topic: Re: [RFC][PATCH] EXT3: problem with page fault inside a transaction
Next Topic: Re: IMPORTANT: latest RHEL4 kernel has a root exploit!! (2.6.9-023stab016.2)
Goto Forum:
  


Current Time: Mon Aug 12 03:03:38 GMT 2024

Total time taken to generate the page: 0.02875 seconds