Apport kernel_crashdump symlink vulnerability exploitation

Posted by halfdog on Sep 27

Hello List,

Here [1] is a short write-up of the Ubuntu Apport kernel_crashdump
symlink vulnerabilities fixed today including some POCs.

While symlink exploitation itself is not really exiting, the creation
of a suitable payload is more interesting: logfile data has to be
crafted, so that after splitting in chunks, compression and base64
encoding, the result string must resemble a path to an
attacker-controllable executable. See [1] to read…

Leave a Reply