NX-stack bypass w(1) Local Root Exploit Realization <3 - Pt. 19
Woo-Hoo. I’m finally ready to release source code :D
Woo-Hoo. I’m finally ready to release source code :D
there’s only enough room in the name[32] field for 28-4 = 24 bytes of ‘authentic’ asm instructions, followed by the 8 necessary for the call / branch instruction. What’s the difference between a call and a branch instruction.. Is it …
Heap-Based Execution from UTMPX entries – Pt. 17 Read more »
Summary: id is what makes new entries to utmpx file possible… pad couldn’t be “1” but “aa” is working… The “PID” check is OFF
Messing with programs I learned that there is a 8-byte window after the buffer, where the first 4 actually “say” something.. Don’t know what yet.. but all it takes is that first byte to be overwritten AND a subsequent call …
“The Shellcoder’s Handbook” comes supplied with a ready exploit against http://www.securitytracker.com/id/1008833 But, it has some problems. the kernel module compiling script is broken (needs -c flag), else it will bitch about _init and _fini being defined twice.. This script uses …
I learned something cool about NameFS today.. You can mount a file descriptor to a folder and that entire folder’s contents are irretrievable. The folder becomes what I like to think as a symbolic link to the file descriptor. Isn’t …
A search on “what is a file descriptor” : http://en.wikipedia.org/wiki/File_descriptor “In computer programming, a file descriptor (FD) is an abstract indicator for accessing a file” — the “file” keyword is clickable and it goes on to compare “files” to “documents” …
File Descriptors – More than Meets the Eye – Pt. 3 Read more »
Here is an important excerpt from Solaris Internals, present in both the old version and the new (up to Solaris 10):
First thing’s first.. getting started with Solaris 8 mdb, a kernel debugging utility. a modular debugger. The vulnerability is in NameFS, according to these articles: Sun Bug Id# 6581308 https://blogs.oracle.com/sunsecurity/entry/sun_alert_237986_a_security http://dl.packetstormsecurity.net/0808-advisories/sa31356.txt http://www.securityfocus.com/bid/30513/discuss Good hint here: http://www.rapid7.com/db/vulnerabilities/sunpatch-114984
This might be useful as some sort of binary signature in System(). /var/adm/messages is where the stack-execution notice comes up. I don’t know if the SIGPIPE error could possibly produce a message in /var/adm/messages, or some other log?? let’s see…. …