Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-3636 PoC — Linux kernel 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Linux kernel 权限许可和访问控制问题漏洞 (CVE-2015-3636)
Description:The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.
Description
root with CVE-2015-3636
File Snapshot

[4.0K] /data/pocs/c776e6ddd9ea4968ece39ce340188b94bde744e8 ├── [ 41K] aclocal.m4 ├── [7.2K] compile ├── [ 789] config.h ├── [ 625] config.h.in ├── [ 12K] config.log ├── [ 32K] config.status ├── [155K] configure ├── [ 189] configure.ac ├── [3.4K] crusty.h ├── [ 23K] depcomp ├── [ 13K] exploit.c ├── [ 517] exploit_utils.h ├── [ 517] hack_addr_limit.c ├── [2.7K] hack_cred.c ├── [ 181] hack_data.h ├── [ 14K] install-sh ├── [ 941] kernel_memory_by_pipe.c ├── [ 36K] Makefile ├── [ 233] Makefile.am ├── [ 39K] Makefile.in ├── [6.7K] missing ├── [1.3K] pingpong.c ├── [ 642] pingpong.h ├── [ 495] protect_from_oom_killer.c ├── [1.7K] rattle_root.c └── [ 23] stamp-h1 0 directories, 26 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →