[vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)

From: Jean Weisbuch <jean_at_phpnet.org>
Date: Tue 14 May 2013 - 23:04:15 BST
Message-ID: <5192B4DF.40406@phpnet.org>

Hi,

The semtex.c exploit released today permit any user on the host to gain
root privileges, i confirm that it works on a 3.2.42-vs2.3.2.16-beng
kernel but it doesnt work (at least not "out of the box") on a VServer
guest with "normal" capabilities/flags used.

Note that the exploit must be compiled with -O2 in order to work.

More infos and the exploit code :
http://packetstormsecurity.com/files/121616/semtex.c

Regards,
         Jean Weisbuch
Received on Tue May 14 23:04:48 2013

[Next/Previous Months] [Main vserver Project Homepage] [Howto Subscribe/Unsubscribe] [Paul Sladen's vserver stuff]
Generated on Tue 14 May 2013 - 23:04:48 BST by hypermail 2.1.8