ASAN/SUID Local Root Exploit...

- AV AC AU C I A
发布: 2016-02-29
修订: 2025-04-13

This script exploits er, unsanitized env var passing in ASAN which leads to file clobbering as root when executing setuid root binaries compiled with ASAN. It uses an overwrite of /etc/ld.so.preload to get root on a vulnerable system. You can supply your own target binary to use for exploitation.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息