I received this on bugtraq, does anyone know what kind of exploit this is? Root access? DoS? Buffer Overflow?
And how serious is this exploit?
Here is what bugtraq had:
I've released an exploit for the Linux sock_sendpage() NULL pointer dereference[1], discovered by Tavis Ormandy and Julien Tinnes. This exploit was written to illustrate the exploitability of this vulnerability on Power/Cell BE architecture.
...
Linux kernel versions from 2.4.4 to 2.4.37.4, and from 2.6.0 to 2.6.30.4 are vulnerable.
The exploit was tested on:
* CentOS 5.3 (2.6.18-128.7.1.el5) is not vulnerable
* CentOS 5.3 (2.6.18-128.4.1.el5)
* CentOS 5.3 (2.6.18-128.2.1.el5)
...
* Red Hat Enterprise Linux 5.3 (2.6.18-128.7.1.el5) is not vulnerable
* Red Hat Enterprise Linux 5.3 (2.6.18-128.4.1.el5)
* Red Hat Enterprise Linux 5.3 (2.6.18-128.2.1.el5)
...
Best regards,
Ramon
The code is available here:
http://www.risesecurity.org/exploits/linux-sendpage.c
It doesn't look like a buffer overload, because I don't see any shell code.
TIA