Critical Bug & Exploit Here!!

Questions about the project and the distribution - obviously no support questions here please
Forum rules
Do not post support questions here. Before you post read the forum rules. Topics in this forum are automatically closed 6 months after creation.
Locked
User avatar
Acid_1
Level 5
Level 5
Posts: 796
Joined: Thu Nov 01, 2007 11:12 pm
Location: Saskatchewan, Canada

Critical Bug & Exploit Here!!

Post by Acid_1 »

Here's an explanation of the bug:

http://blog.cr0.org/2009/08/linux-null- ... ue-to.html


Here's the code to use it:

http://grsecurity.net/%7Espender/wunderbar_emporium.tgz

Run the wunderbar_emporium.sh in a shell. If it starts doing some funky colors after a few seconds, it works. If not, then you're secure.


Want to get it to run anyways, just for fun? Drop to a root terminal, and then type:

Code: Select all

echo 0 > /proc/sys/vm/mmap_min_addr
Then run the compiled binary that occured from the shell script.

Code: Select all

./pwnkernel
It should drop you to a root shell.

To fix back to a secure system, go to the root terminal and type:

Code: Select all

echo 65536 > /proc/sys/vm/mmap_min_addr


I thought it was interesting. This affects all kernels for the last 8 years!
Last edited by LockBot on Wed Dec 28, 2022 7:16 am, edited 1 time in total.
Reason: Topic automatically closed 6 months after creation. New replies are no longer allowed.
Husse

Re: Critical Bug & Exploit Here!!

Post by Husse »

To check if you are at risk

Code: Select all

cat /proc/sys/vm/mmap_min_addr
If it says 65536, you're safe. If it says 0, then you're vulnerable. To fix

Code: Select all

echo "65536" | sudo tee /proc/sys/vm/mmap_min_addr
Locked

Return to “Non-technical Questions”