Quantcast
Channel: privilege escalation – Linux Feed
Browsing all 29 articles
Browse latest View live

Linux Apport/Abrt Local Root Exploit

#define _GNU_SOURCE #include <stdio.h> #include <unistd.h> #include <stdlib.h> #include <fcntl.h> #include <signal.h> #include <elf.h> #include <err.h>...

View Article


Linux Abrt / Apport Race Condition / Symlink

Hello, this is CVE-2015-1318 and CVE-2015-1862 (essentially the same bugs in two different implementations, apport and abrt respectively). These were discussed on the vendors list last week.   If the...

View Article


Cumulus Linux’s Switch clcmd_server Local Privilege Escalation

Title =================== Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, Vulnerable to Local Privilege Escalation   Summary =================== Cumulus Linux's Switch Configuration...

View Article

Image may be NSFW.
Clik here to view.

CentOS 7.1 / Fedora 22 abrt Local Root

#!/usr/bin/python # CVE-2015-5273 + CVE-2015-5287 # CENTOS 7.1/Fedora22 local root (probably works on SL and older versions too) # abrt-hook-ccpp insecure open() usage + abrt-action-install-debuginfo...

View Article

RHEL 7.0 / 7.1 abrt / sosreport Local Root

#!/usr/bin/python # CVE-2015-5287 (?) # abrt/sosreport RHEL 7.0/7.1 local root # rebel 09/2015   # [user@localhost ~]$ python sosreport-rhel7.py # crashing pid 19143 # waiting for dump directory #...

View Article


Image may be NSFW.
Clik here to view.

Imparare a sfruttare vulnerabilità: Kioptrix Livello 3

Ed eccoci al penultimo livello! Come al solito, la macchina virtuale si trova a questo indirizzo. Per chi si fosse perso i livelli precedenti, nel livello 1 sono entrato nel dispositivo utilizzando...

View Article

Linux BPF Local Privilege Escalation

#include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifndef __NR_bpf # if...

View Article

Linux Kernel Dirty COW PTRACE_POKEDATA Privilege Escalation

// // This exploit uses the pokemon exploit as a base and automatically // generates a new passwd line. The original /etc/passwd is then // backed up to /tmp/passwd.bak and overwritten with the new...

View Article


Image may be NSFW.
Clik here to view.

Da WordPress a root con Hackademic

Imparare a sfruttare le vulnerabilità su macchine di prova permette di potersi allenare e poter, in un futuro, riuscire a trovarle su dispositivi reali, con tutte le difficoltà collegate ad esse. In...

View Article

Browsing all 29 articles
Browse latest View live