vendor:
Linux Kernel
by:
gat3way
7.2
CVSS
HIGH
open/ftruncate local exploit
264
CWE
Product Name: Linux Kernel
Affected Version From: Linux kernel < 2.6.22
Affected Version To: Linux kernel < 2.6.22
Patch Exists: YES
Related CWE: CVE-2008-4210
CPE: o:linux:linux_kernel
Metasploit:
https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-3833/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2008-3833/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2008-4210/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-4210/, https://www.rapid7.com/db/vulnerabilities/vmsa-2009-0014-cve-2008-4210/, https://www.rapid7.com/db/vulnerabilities/vmsa-2009-0015-cve-2008-4210/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0973/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0787/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-0001/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2008
Linux kernel < 2.6.22 open/ftruncate local exploit
This exploit allows a local user to gain root privileges by exploiting a vulnerability in the open/ftruncate system call. The vulnerability is present in Linux kernel versions prior to 2.6.22. The exploit works by creating a file with the setgid bit set, and then using the open/ftruncate system call to overwrite the file with malicious code. The malicious code is then executed with root privileges.
Mitigation:
Upgrade to Linux kernel version 2.6.22 or later.