vendor:
Linux Kernel
by:
sd@fucksheep.org
7,2
CVSS
HIGH
Privilege Escalation
269
CWE
Product Name: Linux Kernel
Affected Version From: 3.3
Affected Version To: 3.7
Patch Exists: YES
Related CWE: N/A
CPE: o:linux:linux_kernel
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2012
Archer.c
Archer.c is a privilege escalation exploit for Linux systems. It works reliably against x86-64 3.3-3.7 architectures. The exploit uses a technique called return-oriented programming (ROP) to bypass non-executable memory protections. It uses the mmap() system call to map a page of memory with read, write, and execute permissions. It then copies a function called patch_current() to the mapped page and uses a loop to overwrite the uid and gid values in the current process. Finally, it calls setuid() to gain root privileges.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all systems are running the latest version of the Linux kernel and that all security patches are applied.