Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2015-3636
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 权限许可和访问控制问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。NFSv4 implementation是其中的一个分布式文件系统协议。 Linux kernel 4.0.3之前版本的net/ipv4/ping.c文件中的‘ping_unhash’函数存在安全漏洞,该漏洞源于程序执行unhash操作时没有初始化列表数据结构。本地攻击者可通过执行IPPROTO_ICMP或IPPROTO_ICMPV6的SOCK_DGRAM socket系统调用,然后在断开连接后执行connect系统调
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2015-3636
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/betalphafai/cve-2015-3636_crashPOC Details
2CVE-2015-3636 exploithttps://github.com/askk/libping_unhash_exploit_POCPOC Details
3Nonehttps://github.com/ludongxu/cve-2015-3636POC Details
4PoC code for 32 bit Android OShttps://github.com/fi01/CVE-2015-3636POC Details
5CVE-2015-3636 exploit https://github.com/android-rooting-tools/libpingpong_exploitPOC Details
6root with CVE-2015-3636https://github.com/debugfan/rattle_rootPOC Details
7Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.https://github.com/a7vinx/CVE-2015-3636POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2015-3636
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2015-3636

No comments yet


Leave a comment