MaInKiVi · @mainkivi
79 followers · 418 posts · Server xarxa.cloud

Nueva entrada al , hoy sin video, para explicar los tres permisos especiales de : , y . Como siempre desde el @fedora

#servidor #stickybit #setgid #setuid #linux #blog

Last updated 1 year ago

Marco Ivaldi · @raptor
1690 followers · 923 posts · Server infosec.exchange

As it turns out, the bit in was invented by Dennis Ritchie to prevent false updates to the moo game leaderboard 🤯

minnie.tuhs.org/pipermail/tuhs

#setuid #unix #history

Last updated 2 years ago

Tod Beardsley · @todb
821 followers · 429 posts · Server infosec.exchange

All right mastodon. How do I find out who is talking about a particular fresh vuln? I’m going to throw out some hashtags and see what turns up relevant conversation.





Is this a big deal because stack based in a common binary, or a because is capability restricted in ?

freebsd.org/security/advisorie

#infosec #186f495d4be1 #cve_2022_23093 #pingbof #pr_pack #freebsd #bof #setuid #shrug #ping

Last updated 2 years ago

c0nsid3rate 🌱 · @c0nsid3rate
256 followers · 503 posts · Server infosec.exchange

Rooted another OSCP machine this morning. There is no other exploit that has been more widespread and easy to leverage than pwnkit (CVE-2021-4034). I've simply lost count of the the number of machines I've been able to use this on to get root access from a low-privilege account. For people who do this kind of stuff, this post is a cold take, but I just wanted to come here and state the obvious. -2021-4034

From the Ubuntu website: "A local privilege escalation vulnerability was found on polkit’s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn’t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it’ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine."

#oscp #pwnkit #polkit #cve #linux #pkexec #setuid

Last updated 2 years ago