|
Message-ID: <CAJ_zFkLAM+5DpyS4L6aqiyKT4AZY7fbW+5M7+=rBYNcE-Cr6aw@mail.gmail.com>
Date: Wed, 15 Apr 2015 12:55:53 -0700
From: Tavis Ormandy <taviso@...gle.com>
To: Tyler Hicks <tyhicks@...onical.com>
Cc: oss-security@...ts.openwall.com,
Assign a CVE Identifier <cve-assign@...re.org>, security <security@...ntu.com>,
Stéphane Graber <stgraber@...ntu.com>
Subject: Re: Re: Problems in automatic crash analysis frameworks
On Wed, Apr 15, 2015 at 11:48 AM, Tavis Ormandy <taviso@...gle.com> wrote:
> FWIW, I verified this is exploitable.
>
Here's the script I used to verify, it should create the file
/etc/rootfiletest. By using the partial trick or creating parse
errors, this is easy to turn into a root shell.
Note: I'm a c programmer, I don't know python at all, it's probably
the worlds worst python code - I used python because I was reading the
python3-lxc code.
taviso@...ntu:~/tmp$ ls -l /etc/rootfiletest
ls: cannot access /etc/rootfiletest: No such file or directory
taviso@...ntu:~/tmp$ rm -rf /tmp/?0* /tmp/exploit/
taviso@...ntu:~/tmp$ python3 test.py
taviso@...ntu:~/tmp$ ls -l /etc/rootfiletest
-rw-rw---- 1 root root 0 Apr 15 12:53 /etc/rootfiletest
Tavis.
View attachment "exploit.py" of type "text/x-python" (811 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.