[Full-disclosure] Backtrack 5 R2 priv escalation 0day found in CTF exercise
urlancomp at gmail.com
Thu Apr 12 21:48:04 BST 2012
They can now install wicd on a Linux machine and then say "Linux priv
escalation 0day found in CTF exercise". hehehe
2012/4/12 InterN0T Advisories <advisories at intern0t.net>
> And now for some truth / enlightenment:
> On Wed, 11 Apr 2012 09:47:39 -0500, "Adam Behnke"
> <adam at infosecinstitute.com> wrote:
> > wicd Privilege Escalation 0Day
> > Tested against Backtrack 5, 5 R2, Arch distributions
> > Spawns a root shell. Has not been tested for potential remote
> > vectors.
> > Discovered by a student that wishes to remain anonymous in the course
> > This 0day exploit for Backtrack 5 R2 was discovered by a student in the
> > InfoSec Institute Ethical Hacking class, during an evening CTF exercise.
> > The
> > student wishes to remain anonymous, he has contributed a python version
> > the 0day, a patch that can be applied to wicd, as well as a writeup
> > detailing the discovery and exploitation process. You can find a python
> > version of the exploit and full write up with patch here:
> > http://www.infosecinstitute.com/courses/ethical_hacking_training.html
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-------------- next part --------------
An HTML attachment was scrubbed...
Full-Disclosure is hosted and sponsored by Secunia.