Jan-Philipp Litza

Exploiting Fedora 16 with CVE-2012-0056 23. January 2012

As most server admins should have heard by now, there’s a new cross-platform local root exploit available, associated with CVE-2012-0056 using /proc/<pid>/mem. While the exploit in the blog post uses /bin/su as a target suid executable, Fedora is doing a good job at least for that binary, using ASLR and thus defeating the exploit. But using

find /usr/bin -uid root -perm -u+s | while read file; do if readelf -h $file | grep -Eq "Type:s*"; then echo $file; fi; done

gives you a list of quite some other binaries not using ASLR with the suid bit set, thus being possible victims. The other thing that such a binary needs to be vulnerable is outputting some user-provided content to either stdout or stderr. Because I didn’t know all of the listed binaries, I went for something I knew: /usr/bin/newgrp simply says newgrp: group 'foobar' does not exist on invocation with some invalid group. Great!

While this simple change was sufficient to exploit Ubuntu again (Ubuntu is also vulnerable to the original code), Fedore just greeted me with a segfault. So I fired up gdb to find out, why. Luckily, it was able to tell me the function in which the segfault occured: audit_log_acct_message. So instead of wondering why the segfault occured in the first place (the binary didn’t look as if this function would be overwritten by overwriting exit like in the original code), I decided to try overwriting this function instead of exit. And voila, it worked! I only had a few Fedora boxes to test, so I can’t say for sure if newgrp is always compiled with auditing support. If it isn’t, this function call doesn’t have to be present!

So what is the patch status for the common distros: