Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The call to zlib basically overwrites a minimal ELF into a portion of the `su` binary, which exceve's /bin/sh.
 help



To be specific, the zlib'd binary basically does this (except that it directly uses Linux syscalls to do so rather then C wrappers):

    setuid(0);
    execve("/bin/sh", NULL, NULL);
    exit(0);



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: