[EMAIL PROTECTED]:~/security$ ./elflbl

[+] SLAB cleanup
    child 1 VMAs 64801
[+] moved stack bfffe000, task_size=0xc0000000, map_base=0xbf800000
[+] vmalloc area 0xd4000000 - 0xe7ff1000
[-] FAILED: open lib (/dev/shm/_elf_lib not writable?) (Permission denied)
Killed

[EMAIL PROTECTED]:~/security$ su -

tuxsystem:~# mount -t tmpfs tmpfs /dev/shm
after:

[EMAIL PROTECTED]:~/security$ ./elflbl

[+] SLAB cleanup
    child 1 VMAs 605
[+] moved stack bfffe000, task_size=0xc0000000, map_base=0xbf800000
[+] vmalloc area 0xd4000000 - 0xe7ff1000
    Wait... \
[-] FAILED: try again (-f switch) and again (Cannot allocate memory)
Killed

system: Debian Woody 

Linux version 2.4.28 ([EMAIL PROTECTED]) (gcc version 2.95.4 20011002
(Debian prerelease)) #2 Fri Nov 19 12:27:33 CLST 2004

Saludos!

On Mon, 10 Jan 2005 15:37:52 +0100, Vladislav Kurz
<[EMAIL PROTECTED]> wrote:
> On Monday 10 of January 2005 15:29, Jacques Lav!gnotte wrote:
> > On Mon, 10 Jan 2005 15:19:33 +0100
> >
> > Vladislav Kurz <[EMAIL PROTECTED]> wrote:
> > > mount -t tmpfs tmpfs /dev/shm
> >
> > Only root can do that.
> 
> But it can be already mounted, and the exploit can be modified to use any
> writeable directory instead.
> 
> >
> >                  Jacques
> 
> --
> Regards
>        Vladislav Kurz
> 
> 
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to