Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-5195 PoC — Linux kernel 竞争条件问题漏洞

Source
Associated Vulnerability
Title:Linux kernel 竞争条件问题漏洞 (CVE-2016-5195)
Description:Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Description
Dirtycow also is known as CVE-2016-5195
Readme
Dirtycow also known as CVE-2016-5195 and it's very populer vulnerability of past time.
First of all choose the fitted Linux version for that vulnerability.
then install or run it on VBOX or VMWare .
after install it follow those instructions.
1.	Create a user without having root access.
2.	Log into that created user.
3.	Create directory.
4.	Create root access to ‘.txt’ document and give to it read only permission.
5.	Compile and run the ‘.c’ file in where the ‘.txt’ file created.
6.	Then run it., 
before it running there are two arguments want to give to it.


./compile_name_of_file_created r-only file  write_here_something
File Snapshot

[4.0K] /data/pocs/c6a074bfb898bc1f6ec8af4e46dff17fabdd8ac7 ├── [2.8K] dirty.c ├── [1.3M] IT19154640 SNP.pdf ├── [ 644] README.md └── [ 601] readme.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →