Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-3636 PoC — Linux kernel 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Linux kernel 权限许可和访问控制问题漏洞 (CVE-2015-3636)
Description:Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。NFSv4 implementation是其中的一个分布式文件系统协议。 Linux kernel 4.0.3之前版本的net/ipv4/ping.c文件中的‘ping_unhash’函数存在安全漏洞,该漏洞源于程序执行unhash操作时没有初始化列表数据结构。本地攻击者可通过执行IPPROTO_ICMP或IPPROTO_ICMPV6的SOCK_DGRAM socket系统调用,然后在断开连接后执行connect系统调
Description
root with CVE-2015-3636
File Snapshot

[4.0K] /data/pocs/c776e6ddd9ea4968ece39ce340188b94bde744e8 ├── [ 41K] aclocal.m4 ├── [7.2K] compile ├── [ 789] config.h ├── [ 625] config.h.in ├── [ 12K] config.log ├── [ 32K] config.status ├── [155K] configure ├── [ 189] configure.ac ├── [3.4K] crusty.h ├── [ 23K] depcomp ├── [ 13K] exploit.c ├── [ 517] exploit_utils.h ├── [ 517] hack_addr_limit.c ├── [2.7K] hack_cred.c ├── [ 181] hack_data.h ├── [ 14K] install-sh ├── [ 941] kernel_memory_by_pipe.c ├── [ 36K] Makefile ├── [ 233] Makefile.am ├── [ 39K] Makefile.in ├── [6.7K] missing ├── [1.3K] pingpong.c ├── [ 642] pingpong.h ├── [ 495] protect_from_oom_killer.c ├── [1.7K] rattle_root.c └── [ 23] stamp-h1 0 directories, 26 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.