-
Notifications
You must be signed in to change notification settings - Fork 14k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Reliable Datagram Sockets (RDS) Privilege Escalation exploit #9966
Conversation
TestingUbuntu 10.04 (Linux 2.6.32-21-generic)
|
@bcoles is there a reason you included the password in the first comment, but not in the docs? I did not use it and it is not shown as an option in standard or advanced options? Also, since you're using a static binary, it would be nice to have compilation instructions in the markdown doc. I assume standard gcc will do it, but it is still nice to have. I'd like to land this today, so if you can't get to it today, I'll probably just add it when I land it unless you're passionate about it. |
end | ||
|
||
def exploit | ||
if check != CheckCode::Appears |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So I hate unless
as much as the next non-ruby dev, but you used it on line 115. Just an inconsistent nitpicky thing I noticed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if
was copypasta from another module. I like unless
.
Edit Fixed
Edit: Removed |
Compilation is trivial. Provided binaries are cross-compiled with musl. ./x86_64-linux-musl-gcc -o rds.x64 -pie -static rds.c
./i486-linux-musl-gcc -o rds.x86 -pie -static rds.c Although they probably should have also been stripped with |
I've performed the suggested modifications |
…exploit Merge branch 'land-9966' into upstream-master
Release notesThis PR adds a privilege escalation against the Reliable Datagram Sockets (RDS) protocol on Linux kernel versions 2.6.30 to 2.6.36-rc8. |
…exploit Merge branch 'land-9966' into upstream-master
Add Reliable Datagram Sockets (RDS) Privilege Escalation exploit.
Verification
List the steps needed to make sure this thing works
msfconsole
use exploit/linux/local/rds_priv_esc
set SESSION <ID>
run
Scenarios