|  
  2.4.17 
newlocal 
kmod 
 
2.4.18 
brk 
brk2 
newlocal 
kmod 
km.2 
 
2.4.19 
brk 
brk2 
newlocal 
kmod 
km.2 
 
2.4.20 
ptrace 
kmod 
ptrace-kmod 
km.2 
brk 
brk2 
 
2.4.21 
km.2 
brk 
brk2 
ptrace 
ptrace-kmod 
 
2.4.22 
km.2 
brk2 
brk 
ptrace 
ptrace-kmod 
 
2.4.22-10 
loginx 
./loginx 
 
2.4.23 
mremap_pte 
 
2.4.24 
mremap_pte 
Uselib24 
 
2.4.25-1 
uselib24 
 
2.4.27 
Uselib24 
 
2.6.0 
REDHAT 6.2 
REDHAT 6.2 (zoot) 
SUSE 6.3 
SUSE 6.4 
REDHAT 6.2 (zoot) 
all top from rpm 
------------------------- 
FreeBSD 3.4-STABLE from port 
FreeBSD 3.4-STABLE from packages 
freeBSD 3.4-RELEASE from port 
freeBSD 4.0-RELEASE from packages 
---------------------------- 
all with wuftpd 2.6.0; 
= 
wuftpd 
h00lyshit 
 
2.6.2 
mremap_pte 
krad 
h00lyshit 
 
2.6.5 to 2.6.10 
krad 
krad2 
h00lyshit 
 
2.6.8-5 
krad2 
./krad x 
x = 1..9 
h00lyshit 
 
2.6.9-34 
r00t 
h00lyshit 
 
2.6.13-17 
prctl 
h00lyshit 
------------------- 
2.4.17 -> newlocal, kmod, uselib24 
2.4.18 -> brk, brk2, newlocal, kmod 
2.4.19 -> brk, brk2, newlocal, kmod 
2.4.20 -> ptrace, kmod, ptrace-kmod, brk, brk2 
2.4.21 -> brk, brk2, ptrace, ptrace-kmod 
2.4.22 -> brk, brk2, ptrace, ptrace-kmod 
2.4.22-10 -> loginx 
2.4.23 -> mremap_pte 
2.4.24 -> mremap_pte, uselib24 
2.4.25-1 -> uselib24 
2.4.27 -> uselib24 
2.6.2 -> mremap_pte, krad, h00lyshit 
2.6.5 -> krad, krad2, h00lyshit 
2.6.6 -> krad, krad2, h00lyshit 
2.6.7 -> krad, krad2, h00lyshit 
2.6.8 -> krad, krad2, h00lyshit 
2.6.8-5 -> krad2, h00lyshit 
2.6.9 -> krad, krad2, h00lyshit 
2.6.9-34 -> r00t, h00lyshit 
2.6.10 -> krad, krad2, h00lyshit 
2.6.13 -> raptor, raptor2, h0llyshit, prctl 
2.6.14 -> raptor, raptor2, h0llyshit, prctl 
2.6.15 -> raptor, raptor2, h0llyshit, prctl 
2.6.16 -> raptor, raptor2, h0llyshit, prctl  
----------------------------------------------------- 
Linux  
Common  
Linux 2.2.x ->Linux kernel ptrace/kmod local root exploit (http://milw0rm.com/exploits/3)  
Linux 2.2.x (on exported files, should be vuln) (http://milw0rm.com/exploits/718)  
Linux <= 2.2.25 ->Linux Kernel 2.x mremap missing do_munmap Exploit (http://milw0rm.com/exploits/160) 
Linux 2.4.x ->Linux kernel ptrace/kmod local root exploit (http://milw0rm.com/exploits/3)  
Linux 2.4.x -> pwned.c - Linux 2.4 and 2.6 sys_uselib local root exploit (http://milw0rm.com/exploits/895)  
Linux 2.4.x ->Linux kernel 2.4 uselib() privilege elevation exploit (http://milw0rm.com/exploits/778)  
Linux 2.4.20 ->Linux Kernel Module Loader Local R00t Exploit (http://milw0rm.com/exploits/12)  
Linux <= 2.4.22 ->Linux Kernel <= 2.4.22 (do_brk) Local Root Exploit (http://milw0rm.com/exploits/131)  
Linux 2.4.22 ->Linux Kernel 2.4.22 "do_brk()" local Root Exploit (PoC) (http://milw0rm.com/exploits/129)  
Linux <= 2.4.24 ->Linux Kernel 2.x mremap missing do_munmap Exploit (http://milw0rm.com/exploits/160)  
Linux 2.4.x < 2.4.27-rc3 (on nfs exported files) (http://milw0rm.com/exploits/718) 
Linux <= 2.6.2 ->Linux Kernel 2.x mremap missing do_munmap Exploit (http://milw0rm.com/exploits/160)  
Linux 2.6.11 -> Linux Kernel <= 2.6.11 (CPL 0) Local Root Exploit (k-rad3.c) (http://milw0rm.com/exploits/1397)  
Linux 2.6.13 <= 2.6.17.4 -> Linux Kernel 2.6.13 <= 2.6.17.4 prctl() Local Root Exploit (logrotate) (http://milw0rm.com/exploits/2031)  
Linux 2.6.13 <= 2.6.17.4 -> Linux Kernel 2.6.13 <= 2.6.17.4 sys_prctl() Local Root Exploit (http://milw0rm.com/exploits/2011)  
Linux 2.6.11 <= 2.6.17.4 -> h00lyshit.c -Linux Kernel <= 2.6.17.4 (proc) Local Root Exploit (http://milw0rm.com/exploits/2013)  
Linux 2.6.x < 2.6.7-rc3 (default configuration) ( 
 
亿恩科技地址(ADD):郑州市黄河路129号天一大厦608室 邮编(ZIP):450008 传真(FAX):0371-60123888 
   联系:亿恩小凡 
   QQ:89317007 
   电话:0371-63322206
  本文出自:亿恩科技【www.enkj.com】 
      
      
		服务器租用/服务器托管中国五强!虚拟主机域名注册顶级提供商!15年品质保障!--亿恩科技[ENKJ.COM] 
       |