[EMAIL PROTECTED]:~/security$ ./elflbl [+] SLAB cleanup child 1 VMAs 64801 [+] moved stack bfffe000, task_size=0xc0000000, map_base=0xbf800000 [+] vmalloc area 0xd4000000 - 0xe7ff1000 [-] FAILED: open lib (/dev/shm/_elf_lib not writable?) (Permission denied) Killed
[EMAIL PROTECTED]:~/security$ su - tuxsystem:~# mount -t tmpfs tmpfs /dev/shm after: [EMAIL PROTECTED]:~/security$ ./elflbl [+] SLAB cleanup child 1 VMAs 605 [+] moved stack bfffe000, task_size=0xc0000000, map_base=0xbf800000 [+] vmalloc area 0xd4000000 - 0xe7ff1000 Wait... \ [-] FAILED: try again (-f switch) and again (Cannot allocate memory) Killed system: Debian Woody Linux version 2.4.28 ([EMAIL PROTECTED]) (gcc version 2.95.4 20011002 (Debian prerelease)) #2 Fri Nov 19 12:27:33 CLST 2004 Saludos! On Mon, 10 Jan 2005 15:37:52 +0100, Vladislav Kurz <[EMAIL PROTECTED]> wrote: > On Monday 10 of January 2005 15:29, Jacques Lav!gnotte wrote: > > On Mon, 10 Jan 2005 15:19:33 +0100 > > > > Vladislav Kurz <[EMAIL PROTECTED]> wrote: > > > mount -t tmpfs tmpfs /dev/shm > > > > Only root can do that. > > But it can be already mounted, and the exploit can be modified to use any > writeable directory instead. > > > > > Jacques > > -- > Regards > Vladislav Kurz > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] > > -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]