Exploit Linux Kernel 2.4/2.6 (Fedora 11) - 'sock_sendpage()' Local Privilege Escalation (2)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
9598
Проверка EDB
  1. Пройдено
Автор
RAMON DE C VALLE
Тип уязвимости
LOCAL
Платформа
LINUX
CVE
cve-2009-2692
Дата публикации
2009-09-09
Код:
This is the second version of Linux sock_sendpage() NULL pointer
dereference exploit. Now, it also works with Linux kernel versions
which implements COW credentials (e.g. Fedora 11). For SELinux enforced
systems, it automatically searches in the SELinux policy rules for
types with mmap_zero permission it can transition, and tries to exploit
the system with that types.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9598.tar.gz (2009-linux-sendpage2.tar.gz)

# milw0rm.com [2009-09-09]
 
Источник
www.exploit-db.com

Похожие темы