Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 12 May 2000 13:49:04 -0700
From:      Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
To:        "Patrick Bihan-Faou" <patrick@mindstep.com>
Cc:        "Cy Schubert - ITSD Open Systems Group" <Cy.Schubert@uumail.gov.bc.ca>, freebsd-security@FreeBSD.ORG
Subject:   Re: envy.vuurwerk.nl daily run output 
Message-ID:  <200005122049.e4CKnjU42033@cwsys.cwsent.com>
In-Reply-To: Your message of "Fri, 12 May 2000 11:46:41 EDT." <0e8c01bfbc29$4432e390$040aa8c0@local.mindstep.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <0e8c01bfbc29$4432e390$040aa8c0@local.mindstep.com>, 
"Patrick Bihan-
Faou" writes:
> Hi,
> 
> > I was about to comment that anyone with root can break out of any
> > chrooted environment including jail, however testing the break out of
> > jail exploit (good thing I tested before I spoke), which BTW worked on
> > FreeBSD-3 and numerous other platforms including Linux, Solaris, and
> > Tru64-UNIX, appears to no longer work under 4.0 -- which is a good
> > thing!  When did the FreeBSD chroot(2) get fixed?
> >
> > Once again FreeBSD leads the way.
> >
> > Following is the break-out-of-jail code.
> 
> I just tested the exploit code on a 3.4 system and a 4.0 system and my
> results are:
> 
> - if I run the program as root, then programs runs properly: starts SH in /
> - if I run the program as !root, then the program fails to chroot to back to
> / (I guess this is the expected behaviour).
> 
> 
> For info:
> 
> The FreeBSD 3.x machine:
> 
> FreeBSD jacuzzi.local.mindstep.com 3.4-STABLE FreeBSD 3.4-STABLE #8: Thu Apr
> 27 00:13:41 EDT 2000
> patrick@jacuzzi.local.mindstep.com:/usr/src/sys/compile/JACUZZI  i386
> 
> 
> The FreeBSD 4.0 machine:
> 
> FreeBSD nitro 4.0-STABLE FreeBSD 4.0-STABLE #3: Fri Apr 21 15:10:09 EDT 2000
> patrick@nitro:/usr/src/sys/compile/NITRO  i386
> 
> 
> So my question is: is the exploit really fixed ? Or is it normal for root to
> be able to break loose from chroot ?

I've been, as root, able to break out of jail with the posted code on 
FreeBSD-3.3, RH 5.2 & 6.0, Solaris 2.6, and Tru64-UNIX 4.0D.  I've, as 
root, not been able to break out of jail on 4.0-STABLE as of April 22, 
hence suspected that FreeBSD plugged this hole.


Regards,                       Phone:  (250)387-8437
Cy Schubert                      Fax:  (250)387-5766
Team Leader, Sun/DEC Team   Internet:  Cy.Schubert@osg.gov.bc.ca
Open Systems Group, ITSD, ISTA
Province of BC





To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200005122049.e4CKnjU42033>