1 Star 0 Fork 0

fanyangchu/CVE-2016-5195

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
该仓库未声明开源许可证文件(LICENSE),使用请关注具体项目描述及其代码上游依赖。
克隆/下载
changelog 1.55 KB
一键复制 编辑 原始数据 按行查看 历史
BG 提交于 2017-03-21 14:26 . Ver. 0.3.10 - see changelog for info.
0.1.0 First release
0.2.0 Debugging: now is guaranteed that the credentials of root, the current user and sshd user,
are placed the first lines of /etc/passwd. Corrected parameter size error in madvise. Tested on Ununt 14.04 LTS.
0.2.2 Minor changing: delete heap allocated vars, O2 optimizer. Tested on Mint 17.2.
0.2.4 Removed redundant fstat, removed depracated getlogin() and replaced with getpwuid() and getuid(),
reduced the timeout to a more realistic value, added the notification "Running..." when the exploit
start. Debugging, wrong condition on timeout check.
0.2.6 Removed unnecessary code.
0.2.8 Removed unnecessary code.
0.3.2 Major improvements: in case of successful exploiting, the kernel flusher threads will be disabled
to avoid kernel cashes on some distros. Now it's possible to open automatically a root shell specifying
the -s parameter:
./dcow -s
Minor: a -h parameter with the synopsis is present.
0.3.4 Now if specified -s, the password file will be immediately restored when the root shell appears.
A -n parameter is added to prevent this behaviour. If -n is specified with -s, a backup of the
password file will be created int the home othe the unprivileged user.
0.3.6 Forced the unalias of cp and rm commands. Debugging -n/no param passwd backup behaviour
for retrocompatibility.
0.3.8 Added a version of the program that can be compiled using compilers without c++11 support.
Minor cleaning of the original c++11 version.
0.3.10 Added golang version of this exploit
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
1
https://gitee.com/fanych/CVE-2016-5195.git
git@gitee.com:fanych/CVE-2016-5195.git
fanych
CVE-2016-5195
CVE-2016-5195
master

搜索帮助