-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rename exploit/linux/local/rds_priv_esc -> exploit/linux/local/rds_rds_page_copy_user_priv_esc #12744
Conversation
working on this now, i have a fedora13 box which is vuln to test with, so easy sauce. |
Looks like it isn't re-exploitable. I'll tack that in while landing.
|
Release NotesRename the |
It is re-exploitable. Did you still have a
|
Interesting. I did have my previous root session open. I'll add a PR with that note in the docs later. |
This could probably be fixed by redefining the ports used: #define RECVPORT 5555
#define SENDPORT 6666 Or perhaps cleanly killing the socket upon completion. However, I'm not particularly interested in pursuing this further. Closing the socket may or may not affect system stability (unknown, I haven't looked). Redefining the ports is problematic, as pre-compiled exploits are used, and I don't feel like rewriting the C to handle the ports as arguments, standard input, or environment variables. Although now that I look at the C code, modifying it to execute |
Rename exploit/linux/local/rds_priv_esc -> exploit/linux/local/rds_rds_page_copy_user_priv_esc to avoid ambiguity. Not the first bug in RDS, and won't be the last RDS msf module.
Also update the module to use the new
Msf::Post::Linux::Compile
mixin and a few small style changes.