Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 31 Jul 2010 13:59:43 +0100
From:      =?UTF-8?Q?Istv=C3=A1n?= <leccine@gmail.com>
To:        Kostik Belousov <kostikbel@gmail.com>
Cc:        freebsd-security <freebsd-security@freebsd.org>, Selphie Keller <selphie.keller@gmail.com>
Subject:   Re: kernel module for chmod restrictions while in securelevel one or higher
Message-ID:  <AANLkTi=6e1ZkCEYEJS%2B74DHK8QxfaFjYHDP8JJoJE4n-@mail.gmail.com>
In-Reply-To: <20100731124136.GN22295@deviant.kiev.zoral.com.ua>
References:  <235BB726E71747BA980A0EF60F76ED37@2WIRE304> <20100731124136.GN22295@deviant.kiev.zoral.com.ua>

next in thread | previous in thread | raw e-mail | index | archive | help

http://www.securiteam.com/exploits/6P00C00EKO.html

<http://www.securiteam.com/exploits/6P00C00EKO.html>HTH

On Sat, Jul 31, 2010 at 1:41 PM, Kostik Belousov <kostikbel@gmail.com>wrote:

> On Fri, Jul 30, 2010 at 11:18:39PM -0700, Selphie Keller wrote:
> > Kernel module for chmod restrictions while in securelevel one or higher:
> > http://gist.github.com/501800 (fbsd 8.x)
> >
> > Was looking at the new recent sendfile/mbuf exploit and it was using a
> > shellcode that calls chmod syscall to make a setuid/setgid binary.
> However
> Can you point to the exploit (code) ?
>



-- 
the sun shines for all

http://l1xl1x.blogspot.com



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?AANLkTi=6e1ZkCEYEJS%2B74DHK8QxfaFjYHDP8JJoJE4n->