Skip to content

Villaquiranm/security_information_systems

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

security_information_systems

The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.

Contents

  • Vagrantfile
  • script.sh

Instructions

Getting all prepared

git clone https://github.com/Villaquiranm/security_information_systems.git
cd security_information_systems

Building Vagrant box

vagrant up

If during the build the message "default: A newer version of the box 'ubuntu/xenial64' is available! You currently" is diplayed, you will need to run this command.

vagrant box update

At this point it is necessary to wait because last instruction was to make a reboot in order to update all changes. This delay is approximately one minute after a successful build.

Accessing to vagrant box

vagrant ssh

If connexion is refused, it is because the box is still rebooting, wait some time and retry.

Checking everything

If you follow all steps correctly, now you can see something like this:

Last login: Sun Nov 25 20:00:11 2018 from 10.0.2.2
vagrant@ubuntu-xenial:~$

Your kernel version is "4.4.0-116-generic", you can consult your kernel version with:

uname -r

Using the exploit

First we need to compile our exploit with gcc compiler

gcc upstream44.c -o hack

That will create an executable file called hack. Execute it to become sudo.

./hack

Normally the results should be:

task_struct = ffff880036b38000
uidptr = ffff880036f44784
spawning root shell
root@ubuntu-xenial:~#

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages