Linux Privilege Escelation 2016 - 2017 + Exploits

The Stack Clash - CVE-2017-1000364

Details: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt

Exploits:

  • solaris: https://www.qualys.com/2017/06/19/stack-clash/solaris_rsh.c
  • obenbsd: https://www.qualys.com/2017/06/19/stack-clash/openbsd_at.c
  • netbsd: https://www.qualys.com/2017/06/19/stack-clash/netbsd_cve-2017-1000375.c
  • freebsd: https://www.qualys.com/2017/06/19/stack-clash/freebsd_cve-2017-fgpu.c
  • freebsd: https://www.qualys.com/2017/06/19/stack-clash/freebsd_cve-2017-fgpe.c
  • https://www.qualys.com/2017/06/19/stack-clash/freebsd_cve-2017-1085.c


Sudo's get_process_ttyname() CVE-2017-1000367

Details: https://www.qualys.com/2017/05/30/cve-2017-1000367/cve-2017-1000367.txt

Exploit: https://www.qualys.com/2017/05/30/cve-2017-1000367/linux_sudo_cve-2017-1000367.c


Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation

Details:  https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html

Exploit: https://www.exploit-db.com/exploits/41994/


Linux Kernel 4.8.0 udev 232 - Privilege Escalation CVE-2017-7874

Details: https://www.exploit-db.com/exploits/41886/

Exploit: https://www.exploit-db.com/exploits/41886/


Linux Kernel 3.11 < 4.8 0 - 'SO_SNDBUFFORCE' & 'SO_RCVBUFFORCE'

Details: https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793

Exploit: https://www.exploit-db.com/exploits/41995/


Dirty C0W CVE-2016-5195

Details: http://securityaffairs.co/wordpress/52521/hacking/dirty-cow-exploit.html

Exploit: https://github.com/dirtycow/dirtycow.github.io/raw/master/dirtyc0w.c

H2
H3
H4
3 columns
2 columns
1 column
Join the conversation now