PaX VMA Mirroring Privilege...

- AV AC AU C I A
发布: 2005-03-05
修订: 2025-04-13

It is reported that PaX contains a privilege escalation vulnerability. Local unprivileged users may exploit this vulnerability to execute arbitrary code with the privileges of any targeted user. It is also conjectured that remote attackers may also be able to exploit this vulnerability, but exploitability depends on the ability of an attacker to control the executable file mappings of a targeted application. This issue is only exploitable if SEGMEXEC or RANDEXEC are enabled in the kernel configuration. This vulnerability is reported to affect all versions of PaX since September, 2003, when VMA mirroring was introduced.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息