Linux kernels prior to and including 2.4.18, for intel x86 architecture, can be made to disregard user privileges when handling IPC signals. This relates to intel binary compatibility standard (iBCS) routines in arch/i386/kernel/traps.c. Successfully exploiting this vulnerability allows an attacker to send signals such as SIGKILL to arbitrary processes, including system processes.
Linux kernels prior to and including 2.4.18, for intel x86 architecture, can be made to disregard user privileges when handling IPC signals. This relates to intel binary compatibility standard (iBCS) routines in arch/i386/kernel/traps.c. Successfully exploiting this vulnerability allows an attacker to send signals such as SIGKILL to arbitrary processes, including system processes.