Overblog Tous les blogs Top blogs Musique & Divertissements Tous les blogs Musique & Divertissements
Editer l'article Suivre ce blog linux 3.13.0-32-generic exploit Administration + Créer mon blog
MENU

UN "BLOG NOTE" CULTUREL SUR L'ACTUALITÉ DE LA MUSIQUE, DU CINEMA, DES SÉRIES TV ET DES CONCERTS.

Linux — 3.13.0-32-generic Exploit

char opts[256]; snprintf(opts, sizeof(opts), "lowerdir=%s,upperdir=%s,workdir=%s", lower, upper, work); mount("overlay", merged, "overlayfs", 0, opts); Now, inside /tmp/merged , the file file appears. If you edit it, the changes actually go to /tmp/upper/file . This is where the exploit deviates from normal behavior. The attacker creates a second thread. Thread A tries to rename the file from the overlay to a protected location (e.g., /etc/cron.d/exploit ). Thread B constantly churns the filesystem by creating and deleting files in the upper directory.

Posted by: Security Research Team Date: October 26, 2023 (Updated) Difficulty: Advanced Introduction If you have been in the cybersecurity space for a while, you have likely stumbled upon a vulnerability report or an exploit script mentioning a specific kernel string: linux 3.13.0-32-generic . linux 3.13.0-32-generic exploit

For penetration testers: Enjoy the easy win, but document it thoroughly. A root shell via a 9-year-old bug is a clear sign of a broken patch management policy. The attacker creates a second thread

Commenter cet article

Archives

À propos

linux 3.13.0-32-generic exploit

UN "BLOG NOTE" CULTUREL SUR L'ACTUALITÉ DE LA MUSIQUE, DU CINEMA, DES SÉRIES TV ET DES CONCERTS.