Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-1318 PoC — Ubuntu Apport 安全漏洞

Source
Associated Vulnerability
Title:Ubuntu Apport 安全漏洞 (CVE-2015-1318)
Description:Ubuntu是英国科能(Canonical)公司和Ubuntu基金会共同开发的一套以桌面应用为主的GNU/Linux操作系统。Apport是其中的一个用于收集并反馈错误信息(当应用程序崩溃时操作系统认为有用的信息)的工具包。 Ubuntu Apport 2.13版本至2.17.1之前2.17.x版本的崩溃报告功能中存在安全漏洞。本地攻击者可借助命名空间(容器)中特制的usr/share/apport/apport文件利用该漏洞获取权限。
Description
Exploit I used to claim 10% final-grade extra credit in Matthew Might's Compilers class.
Readme
# CVE-2015-1318

Exploit I used to claim 10% final-grade extra credit in Matthew Might's Compilers class.
https://bugs.launchpad.net/apport/+bug/1438758

Bonus opportunities (http://matt.might.net/teaching/compilers/spring-2015/)

Use an exploit on vulcan to gain root access: +10% for a local user exploit; +15% for a remote exploit (e.g. breaking in via apache). You must exploit a vulnerability (e.g. buffer overflow) for Ubuntu on vulcan to gain root; that is, you can't steal my laptop while it has an open ssh connection to vulcan to claim the prize. You must write up a short summary of the vulnerability and how you exploited it. (You may use a prepackaged tool for exploitation.) Mail the summary to me for approval and then to the class. Each individual exploit may only be claimed once, and the first to exploit wins. To signal that you have claimed root, modify the message of the day.

File Snapshot

[4.0K] /data/pocs/c834afb88f7a087cf4a9f7ac4d92eae3781f439f ├── [4.4K] CVE-2015-1318.c ├── [ 899] README.md ├── [ 277] rootyTooty.c └── [ 564] rootyTooty_setuid.c 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.