vendor:
N/A
by:
Mark Seaborn
8.2
CVSS
HIGH
Rowhammer Exploit
119
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2015
DRAM Rowhammer Exploit to Gain Kernel Privileges
This is a proof-of-concept exploit that is able to gain kernel privileges on machines that are susceptible to the DRAM 'rowhammer' problem. It runs as an unprivileged userland process on x86-64 Linux. It works by inducing bit flips in page table entries (PTEs). For development purposes, the exploit program has a test mode in which it induces a bit flip by writing to /dev/mem.
Mitigation:
Disable the CONFIG_STRICT_DEVMEM option in the Linux kernel image.