Name: Anonymous 2008-02-24 19:40
So I entered /prog/ this afternoon, with the objective of fapping to some LISP threads, just like any normal day. But i came across a 1337 thread (obvious modget is failget), where i found a very nice sudo exploit. After some minutes I realized that my hosting had debian 3.1, and a very outdated version of sudo. The official website didn't say anything, so I decided to take the risk, installed sudo it in my arch linux box, checked the exploit code a bit, fixed the syntax error and compiled. Then ran it, and tried to run /tmp/.beyond - but it failed.
I was actually failing very hard. After that I decided to compile an older version of sudo, using abs. Grabbed the PKGBUILD and tried to copy it to ~/abs, but that dir was not there. I noticed that the CPU usage was very high and i wasn't doing anything, so i ran ps and discovered two little rm processes.
Well played, anon. Whoever crafted that code is indeed an EXPERT SHELLCODE PROGRAMMER
BTW, I had some chrooted systems that caught most of the rm, but most of the user preferences were lost. I have 3gb of free space now, and the migration from epiphany to firefox 3 was much easier. I feel better now.
I was actually failing very hard. After that I decided to compile an older version of sudo, using abs. Grabbed the PKGBUILD and tried to copy it to ~/abs, but that dir was not there. I noticed that the CPU usage was very high and i wasn't doing anything, so i ran ps and discovered two little rm processes.
Well played, anon. Whoever crafted that code is indeed an EXPERT SHELLCODE PROGRAMMER
BTW, I had some chrooted systems that caught most of the rm, but most of the user preferences were lost. I have 3gb of free space now, and the migration from epiphany to firefox 3 was much easier. I feel better now.