vendor:
Linux Kernel
by:
Sunix
7,2
CVSS
HIGH
Local Privilege Escalation
264
CWE
Product Name: Linux Kernel
Affected Version From: 2.6.13
Affected Version To: 2.6.17.4, 2.6.9-22.ELsmp
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Intel(R) Xeon(TM) CPU 3.20GHz
2006
PRCTL local root exp By: Sunix
This exploit is a local privilege escalation vulnerability in the Linux kernel. It affects systems with kernel versions 2.6.13 to 2.6.17.4 and 2.6.9-22.ELsmp. The exploit uses the prctl() system call to set the dumpable flag to 2, which allows the attacker to create a core dump file of the process. The attacker then kills the process with a SIGSEGV signal, which causes the kernel to create a core dump file in the /etc/cron.d directory. The attacker then creates a cron job to execute a setuid shell in the /tmp directory. This allows the attacker to gain root privileges.
Mitigation:
The best way to mitigate this vulnerability is to upgrade to a newer version of the Linux kernel.