Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-1000112 PoC — Linux kernel 安全漏洞

Source
Associated Vulnerability
Title:Linux kernel 安全漏洞 (CVE-2017-1000112)
Description:Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。 Linux kernel中存在本地内存损坏漏洞。本地攻击者可利用该漏洞在应用程序的上下文中以root权限执行任意代码,损坏内核内存,或造成拒绝服务。
Description
Exploit work Privilege Escalation CVE-2017-1000112
Readme
# SNP-Assignment
Exploit work Privilege Escalation CVE-2017-1000112
as the privilege escalation is the mile stone of an attakers view,i try to do a little research on loval privilege escalation which is the basic step of whole privilege escalation unit. while im reading some articles 2016 and 2017 are the years with most no of privilege escalation reports on local and also remote. so i did try to exploit a vulurability with my knowledge with the help of intrnet to understand how these exploits happened not even by a n expert attaker. in the linux os system because of the open source , i can understant what is realy happening, and the teminal can directly run any c program which written by us. i searched for a vulnurebility which use c program and i found one which is easy to gain root access by running the program. all i need is to write a perfect c program and run it.
File Snapshot

[4.0K] /data/pocs/862784c77780eec8432ee499abbeb9719ea2c547 ├── [ 26K] 47169 (copy).c ├── [1.5M] IT19083124.pdf └── [ 882] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.