User-Mode Linux内核内存访问漏洞

User-Mode Linux内核内存访问漏洞

漏洞ID 1105978 漏洞类型 设计错误
发布时间 2000-08-25 更新时间 2005-10-20
图片[1]-User-Mode Linux内核内存访问漏洞-安全小百科CVE编号 CVE-2002-2016
图片[2]-User-Mode Linux内核内存访问漏洞-安全小百科CNNVD-ID CNNVD-200212-352
漏洞平台 Linux CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/21248
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200212-352
|漏洞详情
User-modeLinux(UML)2.4.17-8不限制内核地址空间的访问,本地用户可以利用该漏洞执行任意代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/3973/info

User-Mode Linux (UML) is a patch which allows the Linux Kernel to run as a user space process. It is currently available for the Linux operating system. It may be used as an efficient tool for kernel development, as well as for virtual networking, honeypots, and experimentation.

UML does not correctly protect kernel address space from user programs within the UML environment. It may be possible to execute arbitrary code within the kernel and gain root access. Additionally, it may be possible to use this vulnerability to escape the UML environment, leading to local access on the hosting system.

This is a known problem with the current UML implementation. Memory protection may be partially implemented at this time.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21248.tgz
|参考资料

来源:XF
名称:uml-kernel-memory-access(8005)
链接:http://www.iss.net/security_center/static/8005.php
来源:BID
名称:3973
链接:http://www.securityfocus.com/bid/3973
来源:BUGTRAQ
名称:20020128user-mode-linuxproblems
链接:http://archives.neohapsis.com/archives/bugtraq/2002-01/0338.html

相关推荐: Oracle9iAS Web Cache代码执行漏洞

Oracle9iAS Web Cache代码执行漏洞 漏洞ID 1106505 漏洞类型 缓冲区溢出 发布时间 2001-10-18 更新时间 2005-05-02 CVE编号 CVE-2001-0836 CNNVD-ID CNNVD-200112-071 漏…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享