Bug 101572 - kernel ptrace bug
kernel ptrace bug
Status: CLOSED NOTABUG
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: kernel (Show other bugs)
2.1
i686 Linux
medium Severity medium
: ---
: ---
Assigned To: Larry Woodman
Brian Brock
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2003-08-04 04:13 EDT by Milan Brabec
Modified: 2007-11-30 17:06 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2003-08-04 11:23:24 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Milan Brabec 2003-08-04 04:13:10 EDT
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; cs-CZ; rv:1.4) Gecko/20030624

Description of problem:
The latest kernel from RHEN updates (kernel 2.4.9-e.25.smp) is still vulnerable
to ptrace exploit (from march 2003), available e.g. from
http://hysteria.sk/sd/p.c. We have checked that some form of ptrace patch is
included in the src.rpm package.

Version-Release number of selected component (if applicable):
kernel 2.4.9-e.25.smp

How reproducible:
Always

Steps to Reproduce:
1. login as normal user 
2. compile ptrace_exploit.c
3. run ./ptrace_exploit

    

Actual Results:  you've got root's shell

Expected Results:  ptrace exploit shouldn't get root's priviledges 

Additional info:
Comment 1 Arjan van de Ven 2003-08-04 04:28:51 EDT
be careful; if you tested this exploit before you updated the kernel as well, it
will have made itself setuid root..... so it appears to have succeeded.
Is this the case ?
Comment 2 Milan Brabec 2003-08-04 04:50:13 EDT
Yes, we have had the binary setuid root. Sorry.


Note You need to log in before you can comment on or make changes to this bug.