Date: Sat, 31 Jul 2010 13:59:43 +0100 From: =?UTF-8?Q?Istv=C3=A1n?= <leccine@gmail.com> To: Kostik Belousov <kostikbel@gmail.com> Cc: freebsd-security <freebsd-security@freebsd.org>, Selphie Keller <selphie.keller@gmail.com> Subject: Re: kernel module for chmod restrictions while in securelevel one or higher Message-ID: <AANLkTi=6e1ZkCEYEJS%2B74DHK8QxfaFjYHDP8JJoJE4n-@mail.gmail.com> In-Reply-To: <20100731124136.GN22295@deviant.kiev.zoral.com.ua> References: <235BB726E71747BA980A0EF60F76ED37@2WIRE304> <20100731124136.GN22295@deviant.kiev.zoral.com.ua>
next in thread | previous in thread | raw e-mail | index | archive | help
http://www.securiteam.com/exploits/6P00C00EKO.html <http://www.securiteam.com/exploits/6P00C00EKO.html>HTH On Sat, Jul 31, 2010 at 1:41 PM, Kostik Belousov <kostikbel@gmail.com>wrote: > On Fri, Jul 30, 2010 at 11:18:39PM -0700, Selphie Keller wrote: > > Kernel module for chmod restrictions while in securelevel one or higher: > > http://gist.github.com/501800 (fbsd 8.x) > > > > Was looking at the new recent sendfile/mbuf exploit and it was using a > > shellcode that calls chmod syscall to make a setuid/setgid binary. > However > Can you point to the exploit (code) ? > -- the sun shines for all http://l1xl1x.blogspot.com
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?AANLkTi=6e1ZkCEYEJS%2B74DHK8QxfaFjYHDP8JJoJE4n->
