Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-3153 PoC — Linux kernel 提权漏洞

Source
Associated Vulnerability
Title:Linux kernel 提权漏洞 (CVE-2014-3153)
Description:Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。NFSv4 implementation是其中的一个分布式文件系统协议。 Linux kernel 3.14.5及之前版本的kernel/futex.c文件中的‘futex_requeue’函数存在安全漏洞,该漏洞源于程序没有正确处理futex系统调用。本地攻击者可借助特制的FUTEX_REQUEUE命令利用该漏洞获取特权。
Description
Study on Linux kernel code injection via CVE-2014-3153 (Towelroot)
File Snapshot

[4.0K] /data/pocs/8a7e882b58ceb40fb12da3996209671b754d1db9 ├── [4.0K] android │   ├── [ 191] makefile │   └── [ 52K] towelroot_inject_code.c ├── [4.0K] futex │   └── [1.3K] futex.c ├── [4.0K] module │   ├── [4.0K] copy │   │   └── [ 535] copy.c │   ├── [4.0K] current_task │   │   ├── [ 106] code_injected │   │   ├── [ 433] current.c │   │   ├── [239K] hexdump │   │   ├── [ 361] Makefile │   │   ├── [ 363] Makefile-bak │   │   ├── [ 706] readelf.py │   │   └── [4.0K] test │   │   ├── [ 4] arm-opcode │   │   ├── [ 18] asm-args │   │   ├── [ 55] asm-printk │   │   ├── [ 128] injected_code │   │   ├── [ 106] injected_code-bak │   │   ├── [ 4] jump-printk-opcode │   │   └── [ 20] printk-opcode │   ├── [4.0K] exploit │   │   ├── [ 128] injected_code │   │   ├── [ 183] makefile │   │   └── [ 51K] towelroot_inject_code.c │   ├── [4.0K] myscan │   │   ├── [ 361] Makefile │   │   └── [ 795] myscan.c │   └── [4.0K] scanprocess │   ├── [2.5K] disk.c │   ├── [1.8K] lime.h │   ├── [6.7K] main.c │   ├── [ 896] Makefile │   └── [ 787] ptrace.c ├── [4.0K] tools │   ├── [ 302] asm.sh │   ├── [ 482] calc_offset.py │   ├── [ 189] dump_code.sh │   ├── [5.2K] evil_code_generator.py │   ├── [ 727] extract_text_data.py │   ├── [ 204] extract_text.sh │   └── [ 550] tools.py └── [4.0K] zedboard ├── [ 281] call_getpgid.c ├── [ 183] makefile ├── [4.0K] test-module │   ├── [ 183] makefile │   └── [ 52K] towelroot_inject_code.c └── [ 50K] towelroot_inject_code.c 12 directories, 39 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.