You are not logged in.
http://www.h-online.com/open/news/item/ … 19834.html
Are we affected? When will the update come out? Why does it take so long? ;-)
Last edited by karol (2012-01-23 19:51:29)
Offline
The kernel in testing was updated today and is fixed. The core kernels have not been updated, but the widely publicised mempodipper fails to yield a root shell
$ ./mempodipper
===============================
= Mempodipper =
= by zx2c4 =
= Jan 21, 2012 =
===============================
[+] Opening socketpair.
[+] Waiting for transferred fd in parent.
[+] Executing child from child fork.
[+] Opening parent mem /proc/13550/mem in child.
[+] Sending fd 5 to parent.
[+] Received fd at 5.
[+] Assigning fd 5 to stderr.
[+] Reading su for exit@plt.
[+] Resolved exit@plt to 0x401a60.
[+] Calculating su padding.
[+] Seeking to offset 0x401a52.
[+] Executing su with shellcode.
Segmentation fault
$
Offline
I stand corrected, guess what's just appeared.
Offline
A smiley?
A pony?
A root prompt?
Offline
an elephant
Give what you have. To someone, it may be better than you dare to think.
Offline
A developer? ;P
I see that linux 3.2.1-2 has been moved to [core]. stronnag, is this the fixed version?
Last edited by karol (2012-01-23 19:18:01)
Offline
It looks like it. On two machines (ia-32, x86_64) mempodipper now terminates without the segfault.
Offline
Thanks :-)
Marking the thread as solved.
Offline
The patched kernel was in the repo about 5 hours before this thread was started.
Offline
Hate to cross post of sorts, but am I the only one who can't compile this with the new patch?
CPU-optimized Linux-ck packages @ Repo-ck • AUR packages • Zsh and other configs
Offline
The patched kernel was in the repo about 5 hours before this thread was started.
I did see http://projects.archlinux.org/svntogit/ … 24e137d008 but couldn't make much out of it. Maybe I should have googled a bit more, sorry.
Offline
Did anyone manage to elevate their privileges on their Arch box with mempodipper anyway? It doesn't seem to work on my 32-bit boxes with graysky's 3.2.1-3-ck, which shouldn't be patched.
Offline
Did anyone manage to elevate their privileges on their Arch box with mempodipper anyway? It doesn't seem to work on my 32-bit boxes with graysky's 3.2.1-3-ck, which shouldn't be patched.
Supposedly stronnag managed to hack his box: https://bbs.archlinux.org/viewtopic.php … 8#p1046378
Offline
His post shows "segmentation fault" and then "$", and he says it fails to yield a root shell, so it doesn't seem like a successful privilege elevation. I don't get a segmentation fault, though - I'm simply still (good?) old lucke, not root.
Offline
I did not succeed in rooting any of my previously unpatched Arch boxen. A different story on Ubuntu though, prior to their updated kernel release.
Offline
According to this blog post, the exploit takes advantage of the string written by su to stderr, and it is different on my Arch boxes than the one shown in the blog. Perhaps that is "saving" Arch? I don't have other distros to check what string they output and if they're exploitable, and I can't figure out from the code if the string really matters.
Offline
I've tried several previous kernels on my 32-bit Arch and none of them could be hacked.
Offline
Yeah seems it doesn't work with su on Arch, much like on Fedora :
as it turns out, Fedora very aptly compiles their su with PIE, which defeats this attack. They do not, unfortunately, compile all their SUID binaries with PIE, and so this attack is still possible with, for example, gpasswd.
Just tried using this version (using gpasswd), and I do get a root shell. If you wanna try too, use this: http://git.zx2c4.com/CVE-2012-0056/plai … c?h=fedora
Offline
Yeah, I've just tried it, jjacky (before reading your post) - an exploit crafted for Fedora works indeed on Arch.
Offline
The mempodipper code doesn't work on our /bin/su, but it does on other setuid binaries eg. /usr/bin/chfn, I can get a root shell with that on both i686 and x86_64.
Offline
@ghen: What exactly did you change in the code to get the exploit working? I doubt it still works after the patch released earlier today.
Yet, I'd like to know.
Offline
The exploit works perfectly fine on arch.
[jelle@P8][~]%./a.out -o 404e40
===============================
= Mempodipper =
= by zx2c4 =
= Jan 21, 2012 =
===============================
[+] Waiting for transferred fd in parent.
[+] Executing child from child fork.
[+] Opening parent mem /proc/10011/mem in child.
[+] Sending fd 3 to parent.
[+] Received fd at 5.
[+] Assigning fd 5 to stderr.
[+] Calculating su padding.
[+] Seeking to offset 0x404e37.
[+] Executing su with shellcode.
sh-4.2# whoami
root
sh-4.2# exit
exit
64 bit btw
And i didn't update to -2 yet.
Offline
Just for propaganda:
I run Linux 3.2 with PaX patches on several machines and the exploit did not work on any of them. This would be probably true for the next few local root exploits, too .
Offline