Upload

Loading...

Linux 2.6.31 perf_counter x86/x64 Local Root Exploit with SELinux user_u defeat and disabling

7,672

Loading...

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Sep 18, 2009

In this video I demonstrate a different method of exploiting the recent perf_counter vulnerability where it doesn't require a NULL mapping. The technique is from nemo, credits to him: it seems quite stable on both single and multi-processor machines (it's been 100% reliable so far). To further demonstrate how easy the vulnerability can be exploited in the face of access control mechanisms, I exploit the vulnerability in the restricted user_u role of SELinux on a fully patched FC11 (which prevents execution of any suid app, among many other things), bypassing execmem restrictions, and finally disable SELinux completely.

  • Music

    • "Interpretation Of Dreams (Ethnic Mix)" by Elysium (Google Play)
  • Category

  • License

    • Standard YouTube License

Loading...

Advertisement
When autoplay is enabled, a suggested video will automatically play next.

Up Next


to add this to Watch Later

Add to