Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Not working on Linux 2.6.32-25-generic-pae i686 #36

Open
Vestein opened this issue Nov 6, 2016 · 1 comment
Open

Not working on Linux 2.6.32-25-generic-pae i686 #36

Vestein opened this issue Nov 6, 2016 · 1 comment

Comments

@Vestein
Copy link

Vestein commented Nov 6, 2016

I tried cowroot and dirtyc0w on Linux 2.6.32-25-generic-pae i686 (Ubuntu 10.04.1 LTS) and non of this worked.

On Linux 3.18.0-kali3-586 i686, dirtyc0w did not work. It hangs before replacing the file. /etc/passwd file not replaced.

@unixfox
Copy link

unixfox commented Nov 7, 2016

Try using a PTRACE_POKEDATA family, for example this exploit: https://github.com/scumjr/dirtycow-vdso
Some system doesn't allow to read inside the /proc/self/mem
And remember to check if your system is vulnerable before creating an issue: https://github.com/dirtycow/dirtycow.github.io/wiki/Check-if-your-system-is-vulnerable

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants