Exploit: http://seclists.org/fulldisclosure/2010/Sep/268
public exploit: http://seclists.org/fulldisclosure/2010/Sep/268
Statement: More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.
A workaround for this issue is to run this command echo ':32bits:M:0:\x7fELF\x01::/bin/echo:' > /proc/sys/fs/binfmt_misc/register It disable 32-bit ELF support. The workaround was written by Terje Malmedal. [Source: http://seclists.org/fulldisclosure/2010/Sep/273]
(In reply to comment #13) > [Source: http://seclists.org/fulldisclosure/2010/Sep/273] One report suggests this won't always work: http://www.h-online.com/open/news/forum/S-workaround-DOES-NOT-PREVENT-EXPLOIT/forum-116020/msg-14370942/read/
The 'robert_you_suck' exploit mentioned in the post Mike cites is an exploit for CVE-2010-3080, which is a distinct issue discovered at the same time as this issue. RHEL 5 is not affected by that issue.