urlancomp at gmail
Apr 12, 2012, 1:48 PM
Post #3 of 3
They can now install wicd on a Linux machine and then say "Linux priv
Re: Backtrack 5 R2 priv escalation 0day found in CTF exercise
[In reply to]
escalation 0day found in CTF exercise". hehehe
2012/4/12 InterN0T Advisories <advisories [at] intern0t>
> And now for some truth / enlightenment:
> On Wed, 11 Apr 2012 09:47:39 -0500, "Adam Behnke"
> <adam [at] infosecinstitute> wrote:
> > wicd Privilege Escalation 0Day
> > Tested against Backtrack 5, 5 R2, Arch distributions
> > Spawns a root shell. Has not been tested for potential remote
> > vectors.
> > Discovered by a student that wishes to remain anonymous in the course
> > This 0day exploit for Backtrack 5 R2 was discovered by a student in the
> > InfoSec Institute Ethical Hacking class, during an evening CTF exercise.
> > The
> > student wishes to remain anonymous, he has contributed a python version
> > the 0day, a patch that can be applied to wicd, as well as a writeup
> > detailing the discovery and exploitation process. You can find a python
> > version of the exploit and full write up with patch here:
> > http://www.infosecinstitute.com/courses/ethical_hacking_training.html
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/