Sun Solaris 2.6/7.0/8/9 - vfs_getvfssw function Privilege Escalation

EDB-ID:

23874


Author:

Sinan Eren

Type:

local


Platform:

Solaris

Date:

2004-03-23


Become a Certified Penetration Tester

Enroll in Penetration Testing with Kali Linux , the course required to become an Offensive Security Certified Professional (OSCP)

GET CERTIFIED

source: https://www.securityfocus.com/bid/9962/info

It has been reported that Sun Solaris may be prone to a local privilege escalation vulnerability that may allow an attacker to gain root access to a vulnerable system. The issue exists due to insufficient sanitization of user-supplied data via the vfs_getvfssw() function in the Solaris kernel. An attacker can load a user-specified kernel module by using directory traversal sequences and employing the mount() or sysfs() system calls.

https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23874.tar