vendor:
Linux Kernel
by:
Joe Sylve
7.5
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Linux Kernel
Affected Version From: Kernel version >= 2.6.34 (untested on earlier versions)
Affected Version To: Kernel version not provided
Patch Exists: NO
Related CWE: CVE not provided
CPE: o:linux:linux_kernel
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2023-22024/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-20212/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2022-24834/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-22325/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-27395/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-3326/, https://www.rapid7.com/db/vulnerabilities/apple-osx-cups-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-1825/, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=2, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=3, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=4, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=2
Platforms Tested: Ubuntu 10.10 64-bit and Ubuntu 10.10 32-bit
2011
Linux Kernel CAP_SYS_ADMIN to Root Exploit 2 (32 and 64-bit)
This exploit takes advantage of an underflow vulnerability in the Linux kernel to escalate privileges from CAP_SYS_ADMIN to root. It uses a different approach than the original exploit, by underflowing to static values inside the kernel that are referenced as pointers to userspace. This method is simple and reliable.
Mitigation:
Upgrade to a patched version of the Linux kernel.