Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Does not work on Redhat 7. #3

Open
hackdefendr opened this issue Mar 8, 2022 · 3 comments
Open

Does not work on Redhat 7. #3

hackdefendr opened this issue Mar 8, 2022 · 3 comments

Comments

@hackdefendr
Copy link

Tested on a vanilla VM and a configured image, both running Redhat 7.
Authentication fails for both, so the exploit does not work.

Note: Any claims that CrowdStrike allows this exploit are 100% false.

@Arinerron
Copy link
Owner

Can you send the output of uname -a and head -n1 /etc/passwd after running the exploit please?

@hackdefendr
Copy link
Author

hackdefendr commented Mar 9, 2022

I'm thinking that because RHEL 7 still runs a v3 Kernel is why this is not working.

$ ./exploit

Backing up /etc/passwd to /tmp/passwd.bak ...
Setting root password to "aaron"...
Password: su: Authentication failure

$ uname -a
Linux 3.10.0-1160.53.1.el7.x86_64 #1 SMP Thu Dec 16 10:19:28 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux

$ head -n1 /etc/passwd
root:x:0:0:root:/root:/bin/bash

@rewks
Copy link

rewks commented Mar 9, 2022

Yes, your kernel version is not vulnerable. The vulnerability affects kernel releases from 5.8 onwards.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants