View Single Post
Community Council | Posts: 4,920 | Thanked: 12,867 times | Joined on May 2012 @ Southerrn Finland
#17
Originally Posted by nieldk View Post
In case you want to experiment, this PoC can help identify if vulnerable.

https://github.com/dirtycow/dirtycow...ter/dirtyc0w.c
Thanks.

I just quickly tested it on my main workstation running 4.4.0-36, Jolla sbj1 running 3.4.0 and a fedora cloud image running 4.6.4-301 kernels using the above demo exploit.

On all of those devices the result was as expected, the user process was able to gain root using the leaking CoW.

Same thing applies as always; do not run unknown binaries in your system. Fortunately this is an exploit not easily used remotely.
 

The Following 6 Users Say Thank You to juiceme For This Useful Post: