Lucene search

K
exploitdbRamon de C ValleEDB-ID:9598
HistorySep 09, 2009 - 12:00 a.m.

Linux Kernel 2.4/2.6 (Fedora 11) - 'sock_sendpage()' Local Privilege Escalation (2)

2009-09-0900:00:00
Ramon de C Valle
www.exploit-db.com
386
linux kernel
fedora 11
sock_sendpage()
local privilege escalation
selinux

AI Score

7.4

Confidence

Low

This is the second version of Linux sock_sendpage() NULL pointer
dereference exploit. Now, it also works with Linux kernel versions
which implements COW credentials (e.g. Fedora 11). For SELinux enforced
systems, it automatically searches in the SELinux policy rules for
types with mmap_zero permission it can transition, and tries to exploit
the system with that types.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9598.tar.gz (2009-linux-sendpage2.tar.gz)

# milw0rm.com [2009-09-09]