Add Reliable Datagram Sockets (RDS) Privilege Escalation exploit#9966
Add Reliable Datagram Sockets (RDS) Privilege Escalation exploit#9966bwatters-r7 merged 5 commits intorapid7:masterfrom
Conversation
TestingUbuntu 10.04 (Linux 2.6.32-21-generic) |
|
@bcoles is there a reason you included the password in the first comment, but not in the docs? I did not use it and it is not shown as an option in standard or advanced options? Also, since you're using a static binary, it would be nice to have compilation instructions in the markdown doc. I assume standard gcc will do it, but it is still nice to have. I'd like to land this today, so if you can't get to it today, I'll probably just add it when I land it unless you're passionate about it. |
| end | ||
|
|
||
| def exploit | ||
| if check != CheckCode::Appears |
There was a problem hiding this comment.
So I hate unless as much as the next non-ruby dev, but you used it on line 115. Just an inconsistent nitpicky thing I noticed.
There was a problem hiding this comment.
if was copypasta from another module. I like unless.
Edit Fixed
|
Edit: Removed |
|
Compilation is trivial. Provided binaries are cross-compiled with musl. ./x86_64-linux-musl-gcc -o rds.x64 -pie -static rds.c
./i486-linux-musl-gcc -o rds.x86 -pie -static rds.c Although they probably should have also been stripped with |
|
I've performed the suggested modifications |
…exploit Merge branch 'land-9966' into upstream-master
Release notesThis PR adds a privilege escalation against the Reliable Datagram Sockets (RDS) protocol on Linux kernel versions 2.6.30 to 2.6.36-rc8. |
…exploit Merge branch 'land-9966' into upstream-master
Add Reliable Datagram Sockets (RDS) Privilege Escalation exploit.
Verification
List the steps needed to make sure this thing works
msfconsoleuse exploit/linux/local/rds_priv_escset SESSION <ID>runScenarios