Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-0056 PoC — Linux kernel 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Linux kernel 权限许可和访问控制问题漏洞 (CVE-2012-0056)
Description:The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
Description
Mempodipper, a linux local root exploit.
Readme
CVE-2012-0056
=============

Mempodipper, a linux local root exploit.

[Clone From]
http://git.zx2c4.com/CVE-2012-0056
ssh://gitcode@zx2c4.com/CVE-2012-0056
File Snapshot

[4.0K] /data/pocs/34d4ee4336673ce71418c5c5a12c2bf3327bcf43 ├── [ 93] build-and-run-exploit.sh ├── [ 507] build-and-run-shellcode.sh ├── [ 187] maps.c ├── [6.9K] mempodipper.c ├── [1.3K] ptrace-offset-finder.c ├── [ 157] README.md ├── [1.1K] shellcode-32.s └── [1.1K] shellcode-64.s 0 directories, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →