Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)

From: Jean Weisbuch <jean_at_phpnet.org>
Date: Tue 14 May 2013 - 23:10:18 BST
Message-ID: <5192B64A.2040702@phpnet.org>

ps: this very exploit can be blocked by setting the sysctl
kernel.perf_event_paranoid value to 2.

Le 15/05/2013 00:04, Jean Weisbuch a écrit :
> Hi,
>
> The semtex.c exploit released today permit any user on the host to
> gain root privileges, i confirm that it works on a
> 3.2.42-vs2.3.2.16-beng kernel but it doesnt work (at least not "out of
> the box") on a VServer guest with "normal" capabilities/flags used.
>
> Note that the exploit must be compiled with -O2 in order to work.
>
> More infos and the exploit code :
> http://packetstormsecurity.com/files/121616/semtex.c
>
> Regards,
> Jean Weisbuch
Received on Tue May 14 23:10:40 2013

[Next/Previous Months] [Main vserver Project Homepage] [Howto Subscribe/Unsubscribe] [Paul Sladen's vserver stuff]
Generated on Tue 14 May 2013 - 23:10:40 BST by hypermail 2.1.8