Android get_user/put_user Exploit

Discussion in 'News Aggregator' started by Packet Storm, 26 Dec 2016.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits a missing check in the get_user and put_user API functions in the linux kernel before 3.5.5. The missing checks on these functions allow an unprivileged user to read and write kernel memory. This exploit first reads the kernel memory to identify the commit_creds and ptmx_fops address, then uses the write primitive to execute shellcode as uid 0. The exploit was first discovered in the wild in the vroot rooting application.

    Continue reading...
     

Share This Page

Loading...