1 |
2012.Január 24.(K) 02:35 időpontban Francesco R.(vivo) ezt írta: |
2 |
> On Tuesday 24 January 2012 00:49:19 Tóth Attila wrote: |
3 |
>> Please take a look at on this exploit: |
4 |
>> http://blog.zx2c4.com/749 |
5 |
>> It is interesting to think about /proc/pid/mem protection and about |
6 |
>> building su with PIE enabled... |
7 |
>> |
8 |
>> Regards: |
9 |
>> Dw. |
10 |
> |
11 |
> BTW this in "vanilla" gentoo does not work because of the permission of |
12 |
> the su |
13 |
> file: |
14 |
> ls -l /usr/bin/su |
15 |
> -rws--x--x 1 root root 36776 18 gen 21.31 /usr/bin/su |
16 |
> |
17 |
> readelf cannot read the address, but there can be other ways to access the |
18 |
> binary for example for group "disk" |
19 |
> |
20 |
> hardened gentoo is un-affected as expected (but you already know) |
21 |
> |
22 |
|
23 |
So this exploit is a good example on why hardened gentoo is beneficial. |
24 |
-- |
25 |
dr Tóth Attila, Radiológus, 06-20-825-8057 |
26 |
Attila Toth MD, Radiologist, +36-20-825-8057 |