Linux general technology-Linux programming and kernel information-vulnerabilities of 64-bit Linux in seckilling. The following is a detailed description. Some time ago, I got the shell of a 64-bit linux User and tried a lot of Local Elevation of Privilege. I suddenly found this thing. uid = 0 directly, cute "#".
I have successfully tested ubuntu 7.04 64-bit.
You can directly compile gcc and then execute it.
I don't understand the program principle, the cause of the vulnerability, and the description is a system call problem. No shellcode, not like overflow.
/* Linux Kernel 2.4/2.6 x86-64 System Call Emulation Exploit /*
* Exploit for x86_64 linux kernel ia32syscall emulation
* Bug, discovered by Wojciech Purczynski
*
*
* Robert Swiecki
* Przemyslaw Frasunek
* Pawel Pisarczyk
* Of ATM-Lab http://www.atm-lab.pl
*/
# Include
# Include
# Include
# Include
# Include
# Include
# Include
# Include
# Include
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.