Subject: Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)
From: Jean Weisbuch <jean@phpnet.org>
Date: Wed, 15 May 2013 00:10:18 +0200

ps: this very exploit can be blocked by setting the sysctl 
kernel.perf_event_paranoid value to 2.

Le 15/05/2013 00:04, Jean Weisbuch a écrit :
> Hi,
>
> The semtex.c exploit released today permit any user on the host to 
> gain root privileges, i confirm that it works on a 
> 3.2.42-vs2.3.2.16-beng kernel but it doesnt work (at least not "out of 
> the box") on a VServer guest with "normal" capabilities/flags used.
>
> Note that the exploit must be compiled with -O2 in order to work.
>
> More infos and the exploit code : 
> http://packetstormsecurity.com/files/121616/semtex.c
>
> Regards,
>         Jean Weisbuch