I. Overview of Vulnerabilities
In Ubuntu 16.04, there is a right to exploit if the unprivileged_bpf_disable permission is not turned off.
How to view:
1,cat/proc/version Viewing the system version
2, see if there is a unprivileged_bpf_disable file, if the file exists, to see if the file content is 1, if not 1, there is a vulnerability
Second, the vulnerability verification
1. Download POC file upstream44.c
: Http://cyseclabs.com/exploits/up ... mp;isappinstalled=0
2. Compile the executable file and give the executable permission
Gcc-o Upstream upstream44.c
chmod a+x Upstream
3, in the normal user interface, the execution of the upstream program, will directly become the root user
III. Defence programmes
1, the current defense mode is to enable the unprivileged_bpf_disable feature
Echo 1 >/proc/sys/kernel/unprivileged_bpf_disabled
2, when the above features are enabled, execute upstream again to find the right to fail
The process of Ubuntu16.04 local right-of-access vulnerability re-testing