10 lines
No EOL
540 B
Text
10 lines
No EOL
540 B
Text
This is the second version of Linux sock_sendpage() NULL pointer
|
|
dereference exploit. Now, it also works with Linux kernel versions
|
|
which implements COW credentials (e.g. Fedora 11). For SELinux enforced
|
|
systems, it automatically searches in the SELinux policy rules for
|
|
types with mmap_zero permission it can transition, and tries to exploit
|
|
the system with that types.
|
|
|
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9598.tar.gz (2009-linux-sendpage2.tar.gz)
|
|
|
|
# milw0rm.com [2009-09-09] |