Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-0056 PoC — Linux kernel 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Linux kernel 权限许可和访问控制问题漏洞 (CVE-2012-0056)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 2.6.39以及其他版本的mem_write函数中存在权限许可和访问控制问题漏洞,该漏洞源于当ASLR被禁用时,在写入到/proc/<pid>/mem时未正确检查权限。本地用户可利用该漏洞通过修改进程内存提升权限。该漏洞已在Mempodipper中被证实。
Description
Mempodipper, a linux local root exploit.
Readme
CVE-2012-0056
=============

Mempodipper, a linux local root exploit.

[Clone From]
http://git.zx2c4.com/CVE-2012-0056
ssh://gitcode@zx2c4.com/CVE-2012-0056
File Snapshot

[4.0K] /data/pocs/34d4ee4336673ce71418c5c5a12c2bf3327bcf43 ├── [ 93] build-and-run-exploit.sh ├── [ 507] build-and-run-shellcode.sh ├── [ 187] maps.c ├── [6.9K] mempodipper.c ├── [1.3K] ptrace-offset-finder.c ├── [ 157] README.md ├── [1.1K] shellcode-32.s └── [1.1K] shellcode-64.s 0 directories, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.