exploit-db-mirror/exploits/linux/local/9435.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

35 lines
No EOL
1.2 KiB
Text

/* dedicated to my best friend in the whole world, Robin Price
the joke is in your hands
just too easy -- some nice library functions for reuse here though
credits to julien tinnes/tavis ormandy for the bug
may want to remove the __attribute__((regparm(3))) for 2.4 kernels,
I have no time to test
spender@www:~$ cat redhat_hehe
I bet Red Hat will wish they closed the SELinux vulnerability when they
were given the opportunity to. Now all RHEL boxes will get owned by
leeches.c :p
fd7810e34e9856f77cba67f291ba115f33411ebd
d4b0e413ebf15d039953dfabf7f9a2d1
thanks to Dan Walsh for the great SELinux bypass even on "fixed" SELinux
policies
and nice work Linus on trying to silently fix an 8 year old
vulnerability, leaving vendors without patched kernels for their users.
use ./wunderbar_emporium.sh for everything
don't have mplayer? watch an earlier version of the exploit at:
http://www.youtube.com/watch?v=arAfIp7YzZ4
*/
http://www.grsecurity.net/~spender/wunderbar_emporium.tgz
Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9435.tgz (2009-wunderbar_emporium.tgz)
# milw0rm.com [2009-08-14]