Hacker News
new
past
comments
ask
show
jobs
points
by
not_your_vase
18 hours ago
|
comments
by
progval
18 hours ago
|
next
[-]
The binary "zip" isn't the exploit, it's the shellcode. The exploit is the rest, which changes the code of a SUID executable (su).
reply
by
tgies
12 hours ago
|
prev
|
next
[-]
I have a C translation here that should be pretty readable
https://github.com/tgies/copy-fail-c
reply
by
stackghost
16 hours ago
|
prev
|
[-]
The call to zlib basically overwrites a minimal ELF into a portion of the `su` binary, which exceve's /bin/sh.
reply
by
Sophira
2 hours ago
|
parent
|
[-]
To be specific, the zlib'd binary basically does this (except that it directly uses Linux syscalls to do so rather then C wrappers):
setuid(0); execve("/bin/sh", NULL, NULL); exit(0);
reply