2003-03-20 19:10:13

by Yaroslav Popovitch

[permalink] [raw]
Subject: ptrace bug fix is not working!!!

Hi! I applied Alan Cox's patches for ptrace bug. But system is still
exploitable.

I used my own kernel-2.4.19 with patch for 2.4.19 kernel. It does not
helped. Then I took vanilla 2.4.20 kernel from http://www.kernel.org and applied
patch for 2.4.20 kernel. System is still exploitable.


Cheers,YP

-
Mr. Yaroslav Popovitch [email protected] - tel. +372 6419975
SOT Finnish Software Engineering Ltd. - fax +372 6419975
Kreutzwaldi 7-4, 10124 TALLINN - http://www.sot.com
ESTONIA - http://sotlinux.net


Attachments:
chk.c (3.83 kB)
Exploit itself
config (22.97 kB)
config for 2.4.20
kernel-patches.tgz (7.29 kB)
Alan Cox's fixes, tested patches for 2.4.19 and 2.4.20 kernel
Download all attachments

2003-03-20 19:18:49

by Jeff Garzik

[permalink] [raw]
Subject: Re: ptrace bug fix is not working!!!

On Thu, Mar 20, 2003 at 09:23:28PM +0200, Yaroslav Popovitch wrote:
> Hi! I applied Alan Cox's patches for ptrace bug. But system is still
> exploitable.
>
> I used my own kernel-2.4.19 with patch for 2.4.19 kernel. It does not
> helped. Then I took vanilla 2.4.20 kernel from http://www.kernel.org and applied
> patch for 2.4.20 kernel. System is still exploitable.

Can you verify that you are clearing the setuid bit that gets set, when
the exploit is run? IIRC, you must manually do that to verify that your
system is indeed no longer exploitable.

Jeff




2003-03-20 19:38:26

by Yaroslav Popovitch

[permalink] [raw]
Subject: Re: ptrace bug fix is not working!!!

On Thu, 20 Mar 2003, Jeff Garzik wrote:

> On Thu, Mar 20, 2003 at 09:23:28PM +0200, Yaroslav Popovitch wrote:
> > Hi! I applied Alan Cox's patches for ptrace bug. But system is still
> > exploitable.
> >
> > I used my own kernel-2.4.19 with patch for 2.4.19 kernel. It does not
> > helped. Then I took vanilla 2.4.20 kernel from http://www.kernel.org and applied
> > patch for 2.4.20 kernel. System is still exploitable.
>
> Can you verify that you are clearing the setuid bit that gets set, when
> the exploit is run? IIRC, you must manually do that to verify that your
> system is indeed no longer exploitable.
>
> Jeff
>
Thanks, it helped ;). I did not delete and recompiled exploit from
previous attempts, so it had SUID flag set. Thx.

Sry for panic ...

Cheers,YP

>
>
>

-
Mr. Yaroslav Popovitch [email protected] - tel. +372 6419975
SOT Finnish Software Engineering Ltd. - fax +372 6419975
Kreutzwaldi 7-4, 10124 TALLINN - http://www.sot.com
ESTONIA - http://sotlinux.net