[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

PTRACE Fixed?



All,

I just patched my kernel with the patch available on kernel.org.  I
downloaded, compiled and ran the km3.c exploit for this bug.  How can I
tell if the exploit failed or not?  When I run the exploit as non-root
it keeps starting children over and over again.  When I run it as root
it does the following:

Linux kmod + ptrace local root exploit by <anszom@v-lo.krakow.pl>

=> Simple mode, executing /usr/bin/id > /dev/tty
sizeof(shellcode)=95
=> Child process started..........
=> Child process started.+ 2131
uid=0(root) gid=0(root) groups=0(root)
- 2131 ok!

As non-root:

Linux kmod + ptrace local root exploit by <anszom@v-lo.krakow.pl>

=> Simple mode, executing /usr/bin/id > /dev/tty
sizeof(shellcode)=95
=> Child process started..........
=> Child process started..........
=> Child process started..........
=> Child process started..........
=> Child process started..........
=> Child process started..........
=> Child process started..........
=> Child process started..........
=> Child process started..........
=> Child process started..........
=> Child process started..........


Does this mean the patch I downloaded worked?

Thanks,


-- 
Phil

PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/key.txt | gpg --import
--
Excuse #15: Fat electrons in the lines 

Attachment: pgpSYza1VxwSd.pgp
Description: PGP signature


Reply to: