vendor:
N/A
by:
karol@wiesek.pl
7,2
CVSS
HIGH
Local Privilege Escalation
269
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2006
mtink libXm local root exploit
This exploit uses a setuid binary, mtink, to create a shared library file, lib.so, which is then loaded by the dynamic linker. This shared library contains a function, _init(), which is executed when the library is loaded. This function checks if the real user ID is not 0 and the effective user ID is 0, and if so, it sets the real user ID to 0 and executes a shell. The exploit then creates a file, /etc/ld.so.preload, which contains the path to the shared library, and then executes the setuid binary, which causes the dynamic linker to load the shared library.
Mitigation:
Remove the setuid bit from the mtink binary, or remove the mtink binary from the system.