vendor:
by:
iSEC Security Research
7.5
CVSS
HIGH
Kernel Exploit
CWE
Product Name:
Affected Version From: <= 2.2.25, <= 2.4.24, <= 2.6.2
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Linux
2004
mremap missing do_munmap return check kernel exploit
This is a kernel exploit that takes advantage of the missing do_munmap return check in the mremap function. It allows an attacker to gain elevated privileges on vulnerable systems. The exploit works by exploiting a vulnerability in the mremap function of the Linux kernel, specifically in versions <= 2.2.25, <= 2.4.24, and <= 2.6.2. By exploiting this vulnerability, an attacker can execute arbitrary code with root privileges. This exploit requires the suid permission on the target binary /bin/ping. The exploit code is written in C and requires compilation with gcc. The exploit can be executed by running the compiled binary with optional arguments for suid and shell.
Mitigation:
Upgrade to a non-vulnerable version of the Linux kernel.