vendor:
Linux 2.6
by:
kcope
7,2
CVSS
HIGH
Local Privilege Escalation
264
CWE
Product Name: Linux 2.6
Affected Version From: Linux 2.6
Affected Version To: Linux 2.6
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Debian-Etch, Ubuntu, Gentoo
2009
Linux 2.6 Local Privilege Escalation Vulnerability
This exploit is a local privilege escalation vulnerability in Linux 2.6. It was discovered by Sebastian Krahmer in 2009 and tested on Debian-Etch, Ubuntu, and Gentoo. The exploit uses the LD technique and requires the user to do a 'cat /proc/net/netlink' and set the first argument to the script to the PID of the netlink socket. The exploit is written in C and requires the user to compile it. It is possible that the exploit may need some fixup to work flawlessly.
Mitigation:
The user should update their system to the latest version of Linux 2.6 to ensure that the vulnerability is patched.