Linux Kernel 2.6.30 - tun_chr_pool() Null Pointer Dereference

2009-06-17T00:00:00
ID EXPLOITPACK:D261E870A4BCE847DDA74DB70816871E
Type exploitpack
Reporter Christian Borntraeger
Modified 2009-06-17T00:00:00

Description

Linux Kernel 2.6.30 - tun_chr_pool() Null Pointer Dereference

                                        
                                            source: https://www.securityfocus.com/bid/35724/info

The Linux kernel is prone to a local NULL-pointer dereference vulnerability.

A local attacker can exploit this issue to execute arbitrary code with superuser privileges or crash an affected kernel, denying service to legitimate users.

This issue was introduced in Linux kernel 2.6.30. 

https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33088-1.tgz
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33088-2.tgz