aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2011-10-05 05:12:18 -0400
committerJason A. Donenfeld <Jason@zx2c4.com>2011-10-05 05:12:18 -0400
commit2fac6419b42c7bd4bef069afc2a0456491afc0dd (patch)
tree5ebeb5b5daa3b25e262ce103717ed2912d84d25a
parentoopsie. (diff)
downloadCVE-2011-1485-2fac6419b42c7bd4bef069afc2a0456491afc0dd.tar.xz
CVE-2011-1485-2fac6419b42c7bd4bef069afc2a0456491afc0dd.zip
Add targets.
-rw-r--r--polkit-pwnage.c9
1 files changed, 8 insertions, 1 deletions
diff --git a/polkit-pwnage.c b/polkit-pwnage.c
index 9d11ef9..6f513b7 100644
--- a/polkit-pwnage.c
+++ b/polkit-pwnage.c
@@ -52,6 +52,13 @@
* uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm)
* sh-4.2#
*
+ * ** Targets **
+ * This exploit is known to work on polkit-1 <= 0.101. However, Ubuntu, which
+ * as of writing uses 0.101, has backported 0.102's bug fix. A way to check
+ * this is by looking at the mtime of /usr/bin/pkexec -- April 22, 2011 or
+ * later and you're out of luck. It's likely other distributions do the same.
+ * Fortunately, this exploit is clean enough that you can try it out without
+ * too much collateral.
*
*
* greets to djrbliss and davidz25.
@@ -69,7 +76,7 @@
#include <sys/types.h>
#include <sys/inotify.h>
-int main(int argc, char **argv)
+int main(int argc, char **argv)
{
printf("=============================\n");
printf("= PolicyKit Pwnage =\n");