*** This bug is a security vulnerability ***

You have been subscribed to a public security bug by Marc Deslauriers 
(mdeslaur):

Binary package hint: linux-image-2.6.35-22-virtual

While regular 2.6.32-based kernel images as well as maverick's 2.6.35
branch already got some bugfixes for econet module (USN-1023-1) there is
a newer local exploit by Dan Rosenberg that combines several exploit
discovered by Nelson Elhage to get a root shell:
http://seclists.org/fulldisclosure/2010/Dec/85

He made the exploit in a way it shouldn't work on most default (patched)
distributions so there is no abuse. This exploit seems not to work in
the latest Maverick kernel (See:
http://seclists.org/fulldisclosure/2010/Dec/115), but the most recent
lts-backport-maverick 2.6.35-22.34 which is in the official repositories
can be exploited with the code.

s...@gemini:~$ uname -a
 Linux gemini 2.6.35-22-virtual #34~lucid1-Ubuntu SMP Mon Oct 11 15:07:52 UTC 
2010 x86_64 GNU/Linux

s...@gemini:~$ ./a.out
[*] Resolving kernel addresses...
 [+] Resolved econet_ioctl to 0xffffffffa0376510
 [+] Resolved econet_ops to 0xffffffffa0376620
 [+] Resolved commit_creds to 0xffffffff81085dc0
 [+] Resolved prepare_kernel_cred to 0xffffffff81086290
[*] Calculating target...
[*] Triggering payload...
[*] Got root!

# lsmod
Module                  Size  Used by
[...]
econet                 11162  2
-> econet is loaded after exploit was run

And yes, you get a working root shell after the exploit run.

Update:
It's only a local flaw but econet got some fixes in both stock lucid and 
maverick kernel while lts-backport-maverick didn't get them. That's the point. 
:-)

** Affects: linux-lts-backport-maverick (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: exploit root
-- 
[econet] LTS Maverick backport kernel: Local privilege escalation
https://bugs.edge.launchpad.net/bugs/687437
You received this bug notification because you are a member of Ubuntu Bugs, 
which is a direct subscriber.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to