Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2019-13272
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 权限许可和访问控制问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。 Linux kernel 5.1.17之前版本中存在安全漏洞,该漏洞源于kernel/ptrace.c文件的ptrace_link没有正确处理对凭证的记录。攻击者可利用该漏洞获取root访问权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2019-13272
#POC DescriptionSource LinkShenlong Link
1Linux 4.10 < 5.1.17 PTRACE_TRACEME local roothttps://github.com/jas502n/CVE-2019-13272POC Details
2The exploit for CVE-2019-13272https://github.com/Cyc1eC/CVE-2019-13272POC Details
3提权漏洞https://github.com/bigbigliang-malwarebenchmark/cve-2019-13272POC Details
4linux 提权https://github.com/oneoy/CVE-2019-13272POC Details
55.1.17之前的Linux内核中普通用户执行文件提权为root用户https://github.com/Huandtx/CVE-2019-13272POC Details
6CVE-2019-13272https://github.com/polosec/CVE-2019-13272POC Details
7Nonehttps://github.com/sumedhaDharmasena/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272POC Details
8Local Root vulnerability- CVE-2019-13272 / Security Bypass Vulnerability – CVE-2019-14287https://github.com/Tharana/Exploiting-a-Linux-kernel-vulnerabilityPOC Details
9Nonehttps://github.com/RashmikaEkanayake/Privilege-Escalation-CVE-2019-13272-POC Details
10Nonehttps://github.com/teddy47/CVE-2019-13272---DocumentationPOC Details
11Nonehttps://github.com/datntsec/CVE-2019-13272POC Details
12Local Privilege Escalation is a way to take advantage of flaws in code or service administration that can manage regular or guest users for particular device activities or transfer root user privileges to master or client. User rights admin. The licenses or privileges may be violated by such undesired amendments, as the system may be disrupted by frequent users unless they have shell or root authorization. So, someone, someone, it may become dangerous and be used to obtain access to a higher level. https://github.com/jana30116/CVE-2019-13272-Local-Privilege-EscalationPOC Details
13Nonehttps://github.com/babyshen/CVE-2019-13272POC Details
14fall2022 secure coding CVE-2019-13272 : Linux Kernel Improper Privilege Management Vulnerabilityhttps://github.com/GgKendall/secureCodingDemoPOC Details
15Nonehttps://github.com/asepsaepdin/CVE-2019-13272POC Details
16Es una vulnerabilidad para escalar privilegios en linux.https://github.com/MDS1GNAL/ptrace_scope-CVE-2019-13272-privilege-escalationPOC Details
17This is a Python 3 version of this exploit. Hope it works!!!https://github.com/josemlwdf/CVE-2019-13272POC Details
18To check for vulnerability CVE-2019-13272https://github.com/Chinmay1743/ptrace-vulnPOC Details
19Nonehttps://github.com/letsr00t/CVE-2019-13272POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2019-13272
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2019-13272

No comments yet


Leave a comment