vendor:
N/A
by:
Milen Rangelov
7.2
CVSS
HIGH
CAP_KILL verification bug
264
CWE
Product Name: N/A
Affected Version From: Linux kernel <2.6.29
Affected Version To: Linux kernel <2.6.29
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2009
gw-notexit.sh: Linux kernel <2.6.29 exit_notify() local root exploit
This exploit is based on the 'exit_notify()' CAP_KILL verification bug found by Oleg Nestorov. It allows an attacker to send arbitrary signals to a privileged (suidroot) parent process. Due to a bad check, the child process with appropriate exit signal already set can first execute a suidroot binary then exit() and thus bypass in-kernel privilege checks. The attacker uses chfn and gpasswd for that purpose.
Mitigation:
Set /proc/sys/fs/suid_dumpable to 0