Gentoo Archives: gentoo-hardened

From: antoine <antoine@××××××××××.uk>
To: gentoo-security@l.g.o
Cc: gentoo-hardened@l.g.o
Subject: [gentoo-hardened] Re: [gentoo-security] about the recent ELF kernel bug
Date: Fri, 13 May 2005 23:56:34
Message-Id: 1116000232.10006.12.camel@localhost
In Reply to: [gentoo-hardened] about the recent ELF kernel bug by Pedro Venda
1 I failed to crash any of my test systems with that exploit, hardened or
2 not. And no-one else seems to have confirmed that it does work.
3 I can however crash x86_64 systems with another unfixed bug (up to
4 2.6.12-rc4).
5
6 Antoine
7
8 On Fri, 2005-05-13 at 15:09 +0100, Pedro Venda wrote:
9 > hi everyone,
10 >
11 > Has anyone got a clue on how should the proof of concept code behave on
12 > vulnerable and not vulnerable machines?
13 >
14 > On a PaX+grsecurity hardened server, it outputs:
15 >
16 > [+] ./elfcd1 argv_start=0xb47b23d4 argv_end=0xb47b23dc ESP: 0xb47b1890
17 > [+] phase 1
18 > [+] AAAA argv_start=0xb5e0442e argv_end=0xb5e04432 ESP: 0xb5e03930
19 > [+] phase2, <RET> to crash Killed
20 >
21 > and doesn't core-dump. Also it doesn't warn about the segmentation violation
22 > process in the logs...
23 >
24 > On my laptop, a test server and 2 other workstations (standard 2.6.11.5-8
25 > kernels) results are consistent but different from the hardened server:
26 > pjlv@archon test $ ./elfcd1
27 >
28 > [+] ./elfcd1 argv_start=0xbfffeff7 argv_end=0xbfffefff ESP: 0xbfffedb0
29 > [+] phase 1
30 > [+] AAAA argv_start=0xbfff6fee argv_end=0xbfff6ff2 ESP: 0xbfff6e80
31 > [+] phase 2, <RET> to crash Segmentation fault (core dumped)
32 >
33 > and core-dumps.
34 >
35 > any help? is the hardened server secure? I suppose so, since it didn't core
36 > dump.
37 >
38 > regards,
39 > pedro venda.
40
41 --
42 gentoo-security@g.o mailing list
43
44 --
45 gentoo-hardened@g.o mailing list

Replies