Anyways it called the shell. Now I am stuck with what to do next: go to return-to-libc, format strings, disassemble a C program and construct the shellcode.
 Now with all these security measures, how can something like the conflicker worm happen???
Well if you've been able to spawn a shell then you've successfully achieved your goal as an attacker. Namely that of comprising the intended system and having complete access/control of that system with administrator (root) privileges (i.e. as if you were sitting at the keyboard). So you really wouldn't need to do anything next...