Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. If the exploit code can't open su or other setuid binaries for reading, it can't mess with their page cache.

If the exploit code can't open su or other setuid binaries for reading, it can't mess with their page cache.

Scheduled Pinned Locked Moved Uncategorized
7 Posts 3 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • hillu@infosec.exchangeH This user is from outside of this forum
    hillu@infosec.exchangeH This user is from outside of this forum
    hillu@infosec.exchange
    wrote last edited by
    #1

    If the exploit code can't open su or other setuid binaries for reading, it can't mess with their page cache. So what about…

    # find / -type f -uid 0 -perm /u=s | xargs -t -r chmod u-rw,g-rw,o-rw

    ? The binaries can then still be used for their desired privilege escalation features.

    clonejo@social.troll.academyC vincent@knuddelweide.deV 2 Replies Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • hillu@infosec.exchangeH hillu@infosec.exchange

      If the exploit code can't open su or other setuid binaries for reading, it can't mess with their page cache. So what about…

      # find / -type f -uid 0 -perm /u=s | xargs -t -r chmod u-rw,g-rw,o-rw

      ? The binaries can then still be used for their desired privilege escalation features.

      clonejo@social.troll.academyC This user is from outside of this forum
      clonejo@social.troll.academyC This user is from outside of this forum
      clonejo@social.troll.academy
      wrote last edited by
      #2

      @hillu afaiu you can also manipulate other files than just those with setuid. For example cron jobs, systemd services that get executed as root.

      Better deconfigure that exploitable code in the kernel.

      clonejo@social.troll.academyC hillu@infosec.exchangeH 2 Replies Last reply
      0
      • clonejo@social.troll.academyC clonejo@social.troll.academy

        @hillu afaiu you can also manipulate other files than just those with setuid. For example cron jobs, systemd services that get executed as root.

        Better deconfigure that exploitable code in the kernel.

        clonejo@social.troll.academyC This user is from outside of this forum
        clonejo@social.troll.academyC This user is from outside of this forum
        clonejo@social.troll.academy
        wrote last edited by
        #3

        @hillu or just edit binaries that get executed by root

        1 Reply Last reply
        0
        • clonejo@social.troll.academyC clonejo@social.troll.academy

          @hillu afaiu you can also manipulate other files than just those with setuid. For example cron jobs, systemd services that get executed as root.

          Better deconfigure that exploitable code in the kernel.

          hillu@infosec.exchangeH This user is from outside of this forum
          hillu@infosec.exchangeH This user is from outside of this forum
          hillu@infosec.exchange
          wrote last edited by
          #4

          @clonejo Of course; thanks for helping me think. 😉 In any case, it would still help against script kiddies, I guess.

          clonejo@social.troll.academyC 1 Reply Last reply
          0
          • hillu@infosec.exchangeH hillu@infosec.exchange

            @clonejo Of course; thanks for helping me think. 😉 In any case, it would still help against script kiddies, I guess.

            clonejo@social.troll.academyC This user is from outside of this forum
            clonejo@social.troll.academyC This user is from outside of this forum
            clonejo@social.troll.academy
            wrote last edited by
            #5

            @hillu sorry 🙃

            1 Reply Last reply
            0
            • hillu@infosec.exchangeH hillu@infosec.exchange

              If the exploit code can't open su or other setuid binaries for reading, it can't mess with their page cache. So what about…

              # find / -type f -uid 0 -perm /u=s | xargs -t -r chmod u-rw,g-rw,o-rw

              ? The binaries can then still be used for their desired privilege escalation features.

              vincent@knuddelweide.deV This user is from outside of this forum
              vincent@knuddelweide.deV This user is from outside of this forum
              vincent@knuddelweide.de
              wrote last edited by
              #6

              @hillu@infosec.exchange It is my understanding that this will not work. There is a published exploit (https://github.com/rootsecdev/cve_2026_31431/blob/main/exploit_cve_2026_31431.py) that messes with the page cache for /etc/passwd to simply show your user id as 0, so a normal call to su will make you root.

              hillu@infosec.exchangeH 1 Reply Last reply
              0
              • vincent@knuddelweide.deV vincent@knuddelweide.de

                @hillu@infosec.exchange It is my understanding that this will not work. There is a published exploit (https://github.com/rootsecdev/cve_2026_31431/blob/main/exploit_cve_2026_31431.py) that messes with the page cache for /etc/passwd to simply show your user id as 0, so a normal call to su will make you root.

                hillu@infosec.exchangeH This user is from outside of this forum
                hillu@infosec.exchangeH This user is from outside of this forum
                hillu@infosec.exchange
                wrote last edited by
                #7

                @vincent Correct.

                1 Reply Last reply
                1
                0
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • Popular
                • World
                • Users
                • Groups