This repository provides a modified version of the original CVE-2017-6074 exploit (use-after-free in the Linux kernel DCCP subsystem), designed only to demonstrate Denial of Service (DoS) impact. An authenticated local user can trigger a kernel panic, causing a total loss of system availability.# CVE-2017-6074 - DoS-Only Exploit (Linux DCCP kernel panic)
This repository provides a modified version of the original CVE-2017-6074 exploit (use-after-free in the Linux kernel DCCP subsystem), designed only to demonstrate **Denial of Service (DoS)** impact.
An authenticated local user can trigger a **kernel panic**, causing a total loss of system availability.
- **No privilege escalation** is attempted or achieved.
- Exploit requires local user access (e.g., via SSH).
- For security research, PoC demonstration, and controlled testing environments only.
## References
- [CVE-2017-6074](https://nvd.nist.gov/vuln/detail/CVE-2017-6074)
- [CWE-416: Use After Free](https://cwe.mitre.org/data/definitions/416.html)
## Disclaimer
⚠️ **Run this code ONLY on authorized test systems. This program will immediately crash the kernel.**
_Use it at your personal risks, i'm not responsible for bad usages._
[4.0K] /data/pocs/9c6e6b7cf9363cce1b7956053f67a23395b0db76
├── [9.8K] cve-2017-6074-dos-only_Version2.c
└── [ 927] README.md
0 directories, 2 files