1 |
On Sunday 15 May 2005 16:25, Kevin F. Quinn wrote: |
2 |
> On 13/5/2005 16:09:23, Pedro Venda (pjvenda@××××××××××××.org) wrote: |
3 |
> > On a PaX+grsecurity hardened server, it outputs: |
4 |
> > ... |
5 |
> > [+] phase2, <RET> to crash Killed |
6 |
> |
7 |
> What kernel version? |
8 |
> |
9 |
> The hardened 2.6.11.1 kernel is not vulnerable to the exploit as described, |
10 |
> because the bug used to trigger the feature is not present. If you read |
11 |
> all the way through http://isec.pl/vulnerabilities/isec-0023-coredump.txt |
12 |
> and compare it with the 2.6.11 kernel source, you'll see that although the |
13 |
> arithmetic error is present (see fill_psinfo()), the bug used to get to it |
14 |
> is not. See https://bugs.gentoo.org/show_bug.cgi?id=92264 |
15 |
> |
16 |
> This doesn't mean necessarily that there is not another way to exploit it. |
17 |
> Exercise for the reader to find one ;) |
18 |
> |
19 |
> > On my laptop, a test server and 2 other workstations (standard 2.6.11.5-8 |
20 |
> > kernels) [...] |
21 |
> > [+] phase 2, <RET> to crash Segmentation fault (core dumped) |
22 |
> |
23 |
> I haven't checked all kernel versions, but the vanilla 2.6.11.7 prevents |
24 |
> the exploit in the same way as the hardened kernel. The difference between |
25 |
> killed and core dump may be due to the grsecurity/pax patches, or could |
26 |
> simply be differences between 2.6.11.1 and 2.6.11.7 (i.e. nothing to do |
27 |
> with hardened). Either way, the exploit fails - not because of anything |
28 |
> particular in the hardened kernel, but due to better written upstream code |
29 |
> in create_elf_tables(). |
30 |
|
31 |
thanks for the explanations. |
32 |
|
33 |
regards, |
34 |
pedro venda. |
35 |
|
36 |
-- |
37 |
|
38 |
Pedro João Lopes Venda |
39 |
email: pjvenda < at > arrakis.dhis.org |
40 |
http://arrakis.dhis.org |