Exploit Grsecurity Kernel Patch 1.9.4 (Linux Kernel) - Memory Protection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
21458
Проверка EDB
  1. Пройдено
Автор
GUILLAUME PELAT
Тип уязвимости
LOCAL
Платформа
LINUX
CVE
cve-2002-1826
Дата публикации
2002-05-17
Код:
source: https://www.securityfocus.com/bid/4762/info

An attacker with root access may be able to write to kernel memory in spite of the security patch provided by grsecurity. The patch operates by redirecting the write() system call, when it is being used to write to a memory device. Unfortunately, there are other methods that can be used to write to kernel memory (such as mapping the device to memory using mmap()). 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21458.tgz
 
Источник
www.exploit-db.com

Похожие темы