KisMAC has been reported prone to multiple local privilege escalation vulnerabilities. The vulnerabilities present themselves because the affected shell scripts may be influenced into using an attacker controlled directory rather than a system directory, if an attacker hardlinks to any of the affected shell scripts. It has been reported that these vulnerabilities maybe exploited by a local user to: execute arbitrary binaries with elevated privileges, change ownership of privileged files, load arbitrary kernel modules, change ownership of attacker specified files and install an arbitrary kernel.
KisMAC has been reported prone to multiple local privilege escalation vulnerabilities. The vulnerabilities present themselves because the affected shell scripts may be influenced into using an attacker controlled directory rather than a system directory, if an attacker hardlinks to any of the affected shell scripts. It has been reported that these vulnerabilities maybe exploited by a local user to: execute arbitrary binaries with elevated privileges, change ownership of privileged files, load arbitrary kernel modules, change ownership of attacker specified files and install an arbitrary kernel.