vendor:
Linux Kernel
by:
milw0rm.com
7.2
CVSS
HIGH
Symlink Re-Jiggler
362
CWE
Product Name: Linux Kernel
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2008
Symlink Re-Jiggler
This exploit is a proof of concept for a vulnerability in the Linux kernel. It allows an attacker to gain root access by exploiting a race condition in the kernel's handling of symbolic links. The exploit works by creating a symbolic link to a file that the attacker has write access to, and then repeatedly creating and deleting the link until the kernel assigns the same inode number to the link and the file. The attacker can then use the link to gain access to the file.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all users have the least privilege necessary to perform their tasks. This will limit the damage that can be done if an attacker is able to exploit this vulnerability.