* Christoph Siess <c...@geekhost.info> [2009-09-02 14:57-0400]: > Package: linux-image-2.6.26-2-686 > Version: 2.6.26-17lenny2 > Severity: critical > Tags: security > Justification: root security hole > > > Hi, > > according to http://www.debian.org/security/2009/dsa-1862 this Version of the > 2.6.26-2 Kernel should > not be vulnerable to CVE-2009-2692. > Unfortunately I'm still able to break my system: > c...@server:~$ gcc exploit.c -o exploit > c...@server:~$ ./exploit > sh-3.2# id > uid=0(root) gid=0(root) groups=115(wheel),1000(chs) > > I got the exploit from http://www.risesecurity.org/exploits/linux-sendpage.c > > Correct my if I got something wrong, but according to my understanding this > shouldn't be possible > with version 2.6.26-17lenny2.
I'm afraid this doesn't work on any of the systems i am running 2.6.26-17lenny2 on: mi...@tern:~$ wget http://www.risesecurity.org/exploits/linux-sendpage.c Saving to: `linux-sendpage.c' 100%[================================================================================================================>] 2009-09-03 19:01:43 (24.2 KB/s) - `linux-sendpage.c' saved [9380/9380] mi...@tern:~$ gcc linux-sendpage.c -o exploit mi...@tern:~$ ./exploit sh-3.2$ id uid=1001(micah) gid=1007(micah) groups=4(adm),20(dialout),33(www-data),100(users),1007(micah) micah
signature.asc
Description: Digital signature