Bug 101572 - kernel ptrace bug
Summary: kernel ptrace bug
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: kernel
Version: 2.1
Hardware: i686
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Larry Woodman
QA Contact: Brian Brock
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2003-08-04 08:13 UTC by Milan Brabec
Modified: 2007-11-30 22:06 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2003-08-04 15:23:24 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Milan Brabec 2003-08-04 08:13:10 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; cs-CZ; rv:1.4) Gecko/20030624

Description of problem:
The latest kernel from RHEN updates (kernel 2.4.9-e.25.smp) is still vulnerable
to ptrace exploit (from march 2003), available e.g. from
http://hysteria.sk/sd/p.c. We have checked that some form of ptrace patch is
included in the src.rpm package.

Version-Release number of selected component (if applicable):
kernel 2.4.9-e.25.smp

How reproducible:
Always

Steps to Reproduce:
1. login as normal user 
2. compile ptrace_exploit.c
3. run ./ptrace_exploit

    

Actual Results:  you've got root's shell

Expected Results:  ptrace exploit shouldn't get root's priviledges 

Additional info:

Comment 1 Arjan van de Ven 2003-08-04 08:28:51 UTC
be careful; if you tested this exploit before you updated the kernel as well, it
will have made itself setuid root..... so it appears to have succeeded.
Is this the case ?

Comment 2 Milan Brabec 2003-08-04 08:50:13 UTC
Yes, we have had the binary setuid root. Sorry.




Note You need to log in before you can comment on or make changes to this bug.