Files
CVEs-PoC/2016/CVE-2016-4557.md
T
2024-07-25 21:25:12 +00:00

29 lines
1.3 KiB
Markdown

### [CVE-2016-4557](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4557)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
### POC
#### Reference
- https://www.exploit-db.com/exploits/40759/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits
- https://github.com/chreniuc/CTF
- https://github.com/dylandreimerink/gobpfld
- https://github.com/kkamagui/linux-kernel-exploits
- https://github.com/meobeongok/kernels
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/oneoy/cve-
- https://github.com/ostrichxyz7/kexps
- https://github.com/s0nk3y/php-kernel-exploit