目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2019-13272 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 权限许可和访问控制问题漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。 Linux kernel 5.1.17之前版本中存在安全漏洞,该漏洞源于kernel/ptrace.c文件的ptrace_link没有正确处理对凭证的记录。攻击者可利用该漏洞获取root访问权限。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
-n/a n/a -
二、漏洞 CVE-2019-13272 的公开POC
#POC 描述源链接神龙链接
1Linux 4.10 < 5.1.17 PTRACE_TRACEME local roothttps://github.com/jas502n/CVE-2019-13272POC详情
2The exploit for CVE-2019-13272https://github.com/Cyc1eC/CVE-2019-13272POC详情
3提权漏洞https://github.com/bigbigliang-malwarebenchmark/cve-2019-13272POC详情
4linux 提权https://github.com/oneoy/CVE-2019-13272POC详情
55.1.17之前的Linux内核中普通用户执行文件提权为root用户https://github.com/Huandtx/CVE-2019-13272POC详情
6CVE-2019-13272https://github.com/polosec/CVE-2019-13272POC详情
7Nonehttps://github.com/sumedhaDharmasena/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272POC详情
8Local Root vulnerability- CVE-2019-13272 / Security Bypass Vulnerability – CVE-2019-14287https://github.com/Tharana/Exploiting-a-Linux-kernel-vulnerabilityPOC详情
9Nonehttps://github.com/RashmikaEkanayake/Privilege-Escalation-CVE-2019-13272-POC详情
10Nonehttps://github.com/teddy47/CVE-2019-13272---DocumentationPOC详情
11Nonehttps://github.com/datntsec/CVE-2019-13272POC详情
12Local Privilege Escalation is a way to take advantage of flaws in code or service administration that can manage regular or guest users for particular device activities or transfer root user privileges to master or client. User rights admin. The licenses or privileges may be violated by such undesired amendments, as the system may be disrupted by frequent users unless they have shell or root authorization. So, someone, someone, it may become dangerous and be used to obtain access to a higher level. https://github.com/jana30116/CVE-2019-13272-Local-Privilege-EscalationPOC详情
13Nonehttps://github.com/babyshen/CVE-2019-13272POC详情
14fall2022 secure coding CVE-2019-13272 : Linux Kernel Improper Privilege Management Vulnerabilityhttps://github.com/GgKendall/secureCodingDemoPOC详情
15Nonehttps://github.com/asepsaepdin/CVE-2019-13272POC详情
16Es una vulnerabilidad para escalar privilegios en linux.https://github.com/MDS1GNAL/ptrace_scope-CVE-2019-13272-privilege-escalationPOC详情
17This is a Python 3 version of this exploit. Hope it works!!!https://github.com/josemlwdf/CVE-2019-13272POC详情
18To check for vulnerability CVE-2019-13272https://github.com/Chinmay1743/ptrace-vulnPOC详情
19Nonehttps://github.com/letsr00t/CVE-2019-13272POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2019-13272 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2019-13272

暂无评论


发表评论