![]() Msf5 exploit(solaris/local/xscreensaver_log_priv_esc) > set lhost 172.16.191.165 Msf5 exploit(solaris/local/xscreensaver_log_priv_esc) > set session 1 Solaris 11.3 (x86) msf5 > use exploit/solaris/local/xscreensaver_log_priv_esc Do: use exploit/solaris/local/xscreensaver_log_priv_esc.xscreensaver version 5.15 on Solaris 11.3 (x86).xscreensaver version 5.15 on Solaris 11.1 (x86).This module has been tested successfully on: More information about ranking can be found here. No typical memory corruption exploits should be given this ranking unless there are extraordinary circumstances. This is the case for SQL Injection, CMD execution, RFI, LFI, etc. excellent: The exploit will never crash the service.Tested successfully on: xscreensaver version 5.15 on Solarisġ1.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 Log file in /usr/lib/secure/, overwrites the log file withĪ shared object, and executes the shared object using the This module uses xscreensaver to create a Users to create a user-owned file at any location on theįilesystem using the -log command line argument introduced Versions since 5.06 on unpatched Solaris 11 systems whichĪllows users to gain root privileges. This module exploits a vulnerability in xscreensaver ![]() This module is also known as raptor_xscreensaver. Source code: modules/exploits/solaris/local/xscreensaver_log_priv_esc.rb Module: exploit/solaris/local/xscreensaver_log_priv_esc Name: Solaris xscreensaver log Privilege Escalation
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |