• <ul id="mayc0"></ul>
    <ul id="mayc0"><center id="mayc0"></center></ul>
    <strike id="mayc0"><input id="mayc0"></input></strike>
    <ul id="mayc0"></ul>
  • 始創于2000年 股票代碼:831685
    咨詢熱線:0371-60135900 注冊有禮 登錄
    • 掛牌上市企業
    • 60秒人工響應
    • 99.99%連通率
    • 7*24h人工
    • 故障100倍補償
    您的位置: 網站首頁 > 幫助中心>文章內容

    linux各版本對應溢出漏洞總結(溢出代碼) (1)

    發布時間:  2012/8/15 17:57:00

    2.4.17
    newlocal
    kmod


    2.4.18
    brk
    brk2
    newlocal
    kmod
    km.2


    2.4.19
    brk
    brk2
    newlocal
    kmod
    km.2


    2.4.20
    ptrace
    kmod
    ptrace-kmod
    km.2
    brk
    brk2


    2.4.21
    km.2
    brk
    brk2
    ptrace
    ptrace-kmod


    2.4.22
    km.2
    brk2
    brk
    ptrace
    ptrace-kmod


    2.4.22-10
    loginx
    ./loginx


    2.4.23
    mremap_pte


    2.4.24
    mremap_pte
    Uselib24


    2.4.25-1
    uselib24


    2.4.27
    Uselib24


    2.6.0
    REDHAT 6.2
    REDHAT 6.2 (zoot)
    SUSE 6.3
    SUSE 6.4
    REDHAT 6.2 (zoot)
    all top from rpm
    -------------------------
    FreeBSD 3.4-STABLE from port
    FreeBSD 3.4-STABLE from packages
    freeBSD 3.4-RELEASE from port
    freeBSD 4.0-RELEASE from packages
    ----------------------------
    all with wuftpd 2.6.0;
    =
    wuftpd
    h00lyshit


    2.6.2
    mremap_pte
    krad
    h00lyshit


    2.6.5 to 2.6.10
    krad
    krad2
    h00lyshit


    2.6.8-5
    krad2
    ./krad x
    x = 1..9
    h00lyshit


    2.6.9-34
    r00t
    h00lyshit


    2.6.13-17
    prctl
    h00lyshit

    -------------------

    2.4.17 -> newlocal, kmod, uselib24
    2.4.18 -> brk, brk2, newlocal, kmod
    2.4.19 -> brk, brk2, newlocal, kmod
    2.4.20 -> ptrace, kmod, ptrace-kmod, brk, brk2
    2.4.21 -> brk, brk2, ptrace, ptrace-kmod
    2.4.22 -> brk, brk2, ptrace, ptrace-kmod
    2.4.22-10 -> loginx
    2.4.23 -> mremap_pte
    2.4.24 -> mremap_pte, uselib24
    2.4.25-1 -> uselib24
    2.4.27 -> uselib24
    2.6.2 -> mremap_pte, krad, h00lyshit
    2.6.5 -> krad, krad2, h00lyshit
    2.6.6 -> krad, krad2, h00lyshit
    2.6.7 -> krad, krad2, h00lyshit
    2.6.8 -> krad, krad2, h00lyshit
    2.6.8-5 -> krad2, h00lyshit
    2.6.9 -> krad, krad2, h00lyshit
    2.6.9-34 -> r00t, h00lyshit
    2.6.10 -> krad, krad2, h00lyshit
    2.6.13 -> raptor, raptor2, h0llyshit, prctl
    2.6.14 -> raptor, raptor2, h0llyshit, prctl
    2.6.15 -> raptor, raptor2, h0llyshit, prctl
    2.6.16 -> raptor, raptor2, h0llyshit, prctl
    -----------------------------------------------------

    Linux
    Common
    Linux 2.2.x ->Linux kernel ptrace/kmod local root exploit (http://milw0rm.com/exploits/3)
    Linux 2.2.x (on exported files, should be vuln) (http://milw0rm.com/exploits/718)
    Linux <= 2.2.25 ->Linux Kernel 2.x mremap missing do_munmap Exploit (http://milw0rm.com/exploits/160)

    Linux 2.4.x ->Linux kernel ptrace/kmod local root exploit (http://milw0rm.com/exploits/3)
    Linux 2.4.x -> pwned.c - Linux 2.4 and 2.6 sys_uselib local root exploit (http://milw0rm.com/exploits/895)
    Linux 2.4.x ->Linux kernel 2.4 uselib() privilege elevation exploit (http://milw0rm.com/exploits/778)
    Linux 2.4.20 ->Linux Kernel Module Loader Local R00t Exploit (http://milw0rm.com/exploits/12)
    Linux <= 2.4.22 ->Linux Kernel <= 2.4.22 (do_brk) Local Root Exploit (http://milw0rm.com/exploits/131)
    Linux 2.4.22 ->Linux Kernel 2.4.22 "do_brk()" local Root Exploit (PoC) (http://milw0rm.com/exploits/129)
    Linux <= 2.4.24 ->Linux Kernel 2.x mremap missing do_munmap Exploit (http://milw0rm.com/exploits/160)
    Linux 2.4.x < 2.4.27-rc3 (on nfs exported files) (http://milw0rm.com/exploits/718)

    Linux <= 2.6.2 ->Linux Kernel 2.x mremap missing do_munmap Exploit (http://milw0rm.com/exploits/160)
    Linux 2.6.11 -> Linux Kernel <= 2.6.11 (CPL 0) Local Root Exploit (k-rad3.c) (http://milw0rm.com/exploits/1397)
    Linux 2.6.13 <= 2.6.17.4 -> Linux Kernel 2.6.13 <= 2.6.17.4 prctl() Local Root Exploit (logrotate) (http://milw0rm.com/exploits/2031)
    Linux 2.6.13 <= 2.6.17.4 -> Linux Kernel 2.6.13 <= 2.6.17.4 sys_prctl() Local Root Exploit (http://milw0rm.com/exploits/2011)
    Linux 2.6.11 <= 2.6.17.4 -> h00lyshit.c -Linux Kernel <= 2.6.17.4 (proc) Local Root Exploit (http://milw0rm.com/exploits/2013)
    Linux 2.6.x < 2.6.7-rc3 (default configuration) (


    億恩科技地址(ADD):鄭州市黃河路129號天一大廈608室 郵編(ZIP):450008 傳真(FAX):0371-60123888
       聯系:億恩小凡
       QQ:89317007
       電話:0371-63322206


    本文出自:億恩科技【www.vbseamall.com】

    服務器租用/服務器托管中國五強!虛擬主機域名注冊頂級提供商!15年品質保障!--億恩科技[ENKJ.COM]

  • 您可能在找
  • 億恩北京公司:
  • 經營性ICP/ISP證:京B2-20150015
  • 億恩鄭州公司:
  • 經營性ICP/ISP/IDC證:豫B1.B2-20060070
  • 億恩南昌公司:
  • 經營性ICP/ISP證:贛B2-20080012
  • 服務器/云主機 24小時售后服務電話:0371-60135900
  • 虛擬主機/智能建站 24小時售后服務電話:0371-60135900
  • 專注服務器托管17年
    掃掃關注-微信公眾號
    0371-60135900
    Copyright© 1999-2019 ENKJ All Rights Reserved 億恩科技 版權所有  地址:鄭州市高新區翠竹街1號總部企業基地億恩大廈  法律顧問:河南亞太人律師事務所郝建鋒、杜慧月律師   京公網安備41019702002023號
      0
     
     
     
     

    0371-60135900
    7*24小時客服服務熱線