Is there a readable version of the exploit readily available by any chance? Gotta admit that I failed binary-zip-interpretation-with-naked-eye class twice
Is there a readable version of the exploit readily available by any chance? Gotta admit that I failed binary-zip-interpretation-with-naked-eye class twice
Go version came in handy https://github.com/badsectorlabs/copyfail-go especially for systems without the very latest python (os.slice)
Slightly more readable Python version at https://gist.github.com/grenkoca/b82281a4706e936072979acf54b...
The binary "zip" isn't the exploit, it's the shellcode. The exploit is the rest, which changes the code of a SUID executable (su).
I have a C translation here that should be pretty readable https://github.com/tgies/copy-fail-c
The call to zlib basically overwrites a minimal ELF into a portion of the `su` binary, which exceve's /bin/sh.
To be specific, the zlib'd binary basically does this (except that it directly uses Linux syscalls to do so rather then C wrappers):