Date: Fri, 12 May 2000 13:49:04 -0700 From: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca> To: "Patrick Bihan-Faou" <patrick@mindstep.com> Cc: "Cy Schubert - ITSD Open Systems Group" <Cy.Schubert@uumail.gov.bc.ca>, freebsd-security@FreeBSD.ORG Subject: Re: envy.vuurwerk.nl daily run output Message-ID: <200005122049.e4CKnjU42033@cwsys.cwsent.com> In-Reply-To: Your message of "Fri, 12 May 2000 11:46:41 EDT." <0e8c01bfbc29$4432e390$040aa8c0@local.mindstep.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <0e8c01bfbc29$4432e390$040aa8c0@local.mindstep.com>, "Patrick Bihan- Faou" writes: > Hi, > > > I was about to comment that anyone with root can break out of any > > chrooted environment including jail, however testing the break out of > > jail exploit (good thing I tested before I spoke), which BTW worked on > > FreeBSD-3 and numerous other platforms including Linux, Solaris, and > > Tru64-UNIX, appears to no longer work under 4.0 -- which is a good > > thing! When did the FreeBSD chroot(2) get fixed? > > > > Once again FreeBSD leads the way. > > > > Following is the break-out-of-jail code. > > I just tested the exploit code on a 3.4 system and a 4.0 system and my > results are: > > - if I run the program as root, then programs runs properly: starts SH in / > - if I run the program as !root, then the program fails to chroot to back to > / (I guess this is the expected behaviour). > > > For info: > > The FreeBSD 3.x machine: > > FreeBSD jacuzzi.local.mindstep.com 3.4-STABLE FreeBSD 3.4-STABLE #8: Thu Apr > 27 00:13:41 EDT 2000 > patrick@jacuzzi.local.mindstep.com:/usr/src/sys/compile/JACUZZI i386 > > > The FreeBSD 4.0 machine: > > FreeBSD nitro 4.0-STABLE FreeBSD 4.0-STABLE #3: Fri Apr 21 15:10:09 EDT 2000 > patrick@nitro:/usr/src/sys/compile/NITRO i386 > > > So my question is: is the exploit really fixed ? Or is it normal for root to > be able to break loose from chroot ? I've been, as root, able to break out of jail with the posted code on FreeBSD-3.3, RH 5.2 & 6.0, Solaris 2.6, and Tru64-UNIX 4.0D. I've, as root, not been able to break out of jail on 4.0-STABLE as of April 22, hence suspected that FreeBSD plugged this hole. Regards, Phone: (250)387-8437 Cy Schubert Fax: (250)387-5766 Team Leader, Sun/DEC Team Internet: Cy.Schubert@osg.gov.bc.ca Open Systems Group, ITSD, ISTA Province of BC To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200005122049.e4CKnjU42033>