Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-2692 PoC — Linux Kernel sock_sendpage()函数空指针引用漏洞

Source
Associated Vulnerability
Title:Linux Kernel sock_sendpage()函数空指针引用漏洞 (CVE-2009-2692)
Description:Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。NFSv4 implementation是其中的一个分布式文件系统协议。 在Linux内核中,每个套接字都有一个名为proto_ops的相关操作结构,其中包含有用于实现各种功能(如接受、绑定、关闭等)的函数指针。如果对特定套接字的操作没有实现,就应将相关的函数指针指向预定义的存根。例如,如果没有定义accept功能,就应指向sock_no_accept()。但是,如果某些指针没有初始化,就可能出现其他情况。例如,soc
Description
Linux Null pointer dereference
Readme
# CVE-2009-2692
Linux Null pointer dereference

This is just the compiled binary of the code available in https://www.exploit-db.com/exploits/9545/

Compiled for education purposes

It was compiled under CentOS 4.8
File Snapshot

[4.0K] /data/pocs/cffec25911bca16d91a82ee655043ed2f8d1656c ├── [6.6K] 9545 ├── [ 34K] LICENSE └── [ 215] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.