Linux Privilege Escelation 2016 - 2017 + Exploits

in #linux7 years ago (edited)

The Stack Clash - CVE-2017-1000364

Details: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt

Exploits:


Sudo's get_process_ttyname() CVE-2017-1000367

Details: https://www.qualys.com/2017/05/30/cve-2017-1000367/cve-2017-1000367.txt

Exploit: https://www.qualys.com/2017/05/30/cve-2017-1000367/linux_sudo_cve-2017-1000367.c


Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation

Details:  https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html

Exploit: https://www.exploit-db.com/exploits/41994/


Linux Kernel 4.8.0 udev 232 - Privilege Escalation CVE-2017-7874

Details: https://www.exploit-db.com/exploits/41886/

Exploit: https://www.exploit-db.com/exploits/41886/


Linux Kernel 3.11 < 4.8 0 - 'SO_SNDBUFFORCE' & 'SO_RCVBUFFORCE'

Details: https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793

Exploit: https://www.exploit-db.com/exploits/41995/


Dirty C0W CVE-2016-5195

Details: http://securityaffairs.co/wordpress/52521/hacking/dirty-cow-exploit.html

Exploit: https://github.com/dirtycow/dirtycow.github.io/raw/master/dirtyc0w.c