# N/A
## 概述
Linux内核中的overlayfs实现没有正确验证用户命名空间中底层文件系统文件上文件能力设置。攻击者可以利用这一点获得提升的权限。
## 影响版本
Ubuntu内核中的补丁允许未授权的overlay挂载。
## 细节
- Linux内核中的overlayfs实现存在漏洞。
- 用户命名空间中的文件能力设置未被正确验证。
- 由于未授权用户命名空间的组合以及Ubuntu内核中的补丁允许未授权overlay挂载,导致该漏洞。
## 影响
攻击者可以利用此漏洞提升权限。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Ubuntu OverlayFS Local Privesc | https://github.com/briskets/CVE-2021-3493 | POC详情 |
| 2 | None | https://github.com/oneoy/CVE-2021-3493 | POC详情 |
| 3 | None | https://github.com/Abdennour-py/CVE-2021-3493 | POC详情 |
| 4 | None | https://github.com/Ishan3011/CVE-2021-3493 | POC详情 |
| 5 | CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered) | https://github.com/inspiringz/CVE-2021-3493 | POC详情 |
| 6 | CVE-2021-3493 Ubuntu漏洞 | https://github.com/derek-turing/CVE-2021-3493 | POC详情 |
| 7 | 2021 kernel vulnerability in Ubuntu. | https://github.com/cerodah/overlayFS-CVE-2021-3493 | POC详情 |
| 8 | None | https://github.com/puckiestyle/CVE-2021-3493 | POC详情 |
| 9 | None | https://github.com/Senz4wa/CVE-2021-3493 | POC详情 |
| 10 | None | https://github.com/fei9747/CVE-2021-3493 | POC详情 |
| 11 | Exploit For OverlayFS | https://github.com/pmihsan/OverlayFS-CVE-2021-3493 | POC详情 |
| 12 | None | https://github.com/smallkill/CVE-2021-3493 | POC详情 |
| 13 | None | https://github.com/ptkhai15/OverlayFS---CVE-2021-3493 | POC详情 |
| 14 | None | https://github.com/fathallah17/OverlayFS---CVE-2021-3493 | POC详情 |
| 15 | Exploit a 2021 Kernel vulnerability in Ubuntu to become root almost instantly! | https://github.com/fathallah17/OverlayFS-CVE-2021-3493 | POC详情 |
| 16 | None | https://github.com/Sornphut/OverlayFS---CVE-2021-3493 | POC详情 |
| 17 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20kernel%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2021-3493.md | POC详情 |
| 18 | A penetration test of Ubuntu Touch 16.04 that identified 7 vulnerabilities, including a critical kernel exploit (CVE-2021-3493) allowing root access. This report provides findings and actionable hardening recommendations. | https://github.com/spideyctf/UbuntuTouchSecurityVAPTReport | POC详情 |
| 19 | root Privileges | https://github.com/cyberx-1/OverlayFS-CVE-2021-3493 | POC详情 |
| 20 | CVE-2021-3493 OverlayFS privilege escalation exploit framework with advanced red team features. Includes persistence mechanisms, post-exploitation modules, stealth capabilities, and comprehensive documentation. For authorized testing only. | https://github.com/George-Yanni/DeepRoot | POC详情 |
暂无评论