Skip to content

Commit 2a4e04f

Browse files
committed
automatic module_metadata_base.json update
1 parent 1ff925e commit 2a4e04f

File tree

1 file changed

+16
-5
lines changed

1 file changed

+16
-5
lines changed

db/modules_metadata_base.json

Lines changed: 16 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -60470,16 +60470,21 @@
6047060470
"type": "exploit",
6047160471
"author": [
6047260472
"h00die <mike@stcyrsecurity.com>",
60473-
"vnik"
60473+
"vnik",
60474+
"Jesse Hertz",
60475+
"Tim Newsham"
6047460476
],
60475-
"description": "This module attempts to exploit a netfilter bug on Linux Kernels before 4.6.3, and currently\n only works against Ubuntu 16.04 (not 16.04.1) with kernel\n 4.4.0-21-generic.\n Several conditions have to be met for successful exploitation:\n Ubuntu:\n 1. ip_tables.ko (ubuntu), iptable_raw (fedora) has to be loaded (root running iptables -L will do such)\n 2. libc6-dev-i386 (ubuntu), glibc-devel.i686 & libgcc.i686 (fedora) needs to be installed to compile\n Kernel 4.4.0-31-generic and newer are not vulnerable.\n\n We write the ascii files and compile on target instead of locally since metasm bombs for not\n having cdefs.h (even if locally installed)",
60477+
"description": "This module attempts to exploit a netfilter bug on Linux Kernels before 4.6.3, and currently\n only works against Ubuntu 16.04 (not 16.04.1) with kernel 4.4.0-21-generic.\n\n Several conditions have to be met for successful exploitation:\n Ubuntu:\n 1. ip_tables.ko (ubuntu), iptable_raw (fedora) has to be loaded (root running iptables -L will do such)\n 2. libc6-dev-i386 (ubuntu), glibc-devel.i686 & libgcc.i686 (fedora) needs to be installed to compile\n Kernel 4.4.0-31-generic and newer are not vulnerable. This exploit does not bypass SMEP/SMAP.\n\n We write the ascii files and compile on target instead of locally since metasm bombs for not\n having cdefs.h (even if locally installed)",
6047660478
"references": [
6047760479
"EDB-40049",
6047860480
"CVE-2016-4997",
60479-
"URL-http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c"
60481+
"CVE-2016-4998",
60482+
"URL-https://www.openwall.com/lists/oss-security/2016/06/24/5",
60483+
"URL-http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c",
60484+
"URL-https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91"
6048060485
],
6048160486
"platform": "Linux",
60482-
"arch": "x86",
60487+
"arch": "x86, x64",
6048360488
"rport": null,
6048460489
"autofilter_ports": [
6048560490

@@ -60490,14 +60495,20 @@
6049060495
"targets": [
6049160496
"Ubuntu"
6049260497
],
60493-
"mod_time": "2018-10-10 14:12:29 +0000",
60498+
"mod_time": "2019-12-15 07:17:42 +0000",
6049460499
"path": "/modules/exploits/linux/local/netfilter_priv_esc_ipv4.rb",
6049560500
"is_install_path": true,
6049660501
"ref_name": "linux/local/netfilter_priv_esc_ipv4",
6049760502
"check": true,
6049860503
"post_auth": false,
6049960504
"default_credential": false,
6050060505
"notes": {
60506+
"Reliability": [
60507+
"unreliable-session"
60508+
],
60509+
"Stability": [
60510+
"crash-os-down"
60511+
]
6050160512
},
6050260513
"needs_cleanup": true
6050360514
},

0 commit comments

Comments
 (0)