Email address | private |
---|---|
First Active | 2007-12-18 |
Last Active | 2014-10-18 |
A race condition flaw was found in the PolicyKit pkexec utility and polkitd daemon. A local user could use this flaw to appear as a privileged user to pkexec, allowing them to execute arbitrary commands as root by running those commands with pkexec. Those vulnerable include RHEL6 prior to polkit-0.96-2.el6_0.1 and Ubuntu libpolkit-backend-1 prior to 0.96-2ubuntu1.1 (10.10) 0.96-2ubuntu0.1 (10.04 LTS) and 0.94-1ubuntu1.1 (9.10).
44c67bccd61b94ba8480766e3dc865358c7d2a64baf47923660508bc28f920c4
pkexec race condition privilege escalation exploit.
055dfe828e2174149cd6a6f47e2e9872df8b0c0a1d7903ed1d201259fe0bf81c
132 bytes of Linux x86-64 bindshell shellcode that binds to port 4444.
ef198bbead2c90ea935df966bc848938545d87d4d2757df3f887b2ac76f4de93
logtamper is a modified version of wtmpclean that also modifies UTMP and lastlog related entries.
3b91e179a45b5eacb1d5fa151035d3156b4042052dfe386d70c8b77d932f4611
logtamper is a modified version of wtmpclean that also modifies UTMP and lastlog related entries.
5dbf4006c99bb31134bc547b72082e90998cd71495487da8ef3897aefd71d69f
This patch backdoors and logs credentials into /tmp/.X11-map-enGB for OpenSSH 4.6p1. It is an update to the incSTK_ssh_client_trojan.
9f2909091cd02ea54266393bb947b6d0d6ed8c57886efd5197db154b5e3a4a5c