Linux 3.13.0-32-generic Exploit 2021 -

This output tells the attacker that the system has against a family of race condition bugs in the Overlay Filesystem. The Vulnerability: CVE-2015-1328 (Overlayfs) The 3.13.0 kernel introduced Overlayfs as a union filesystem. It allows one directory (lower) to be overlaid on top of another (upper) to create a merged view. Docker uses similar concepts.

# Compile the exploit gcc overlayfs.c -o exploit -lpthread id uid=1001(bob) gid=1001(bob) groups=1001(bob) linux 3.13.0-32-generic exploit

The bug resided in the overlayfs implementation regarding the rename operation. Specifically, when renaming a file across directories on an overlayfs mount, the kernel failed to properly check permissions on the upper directory. A local attacker could exploit this race condition to rename a file from a world-writable location to a protected location (like /etc/passwd or /etc/sudoers ). In a normal filesystem, renaming a file requires write permissions on the source and target directories. However, in the buggy overlayfs code, the kernel performed the rename operation using the lower filesystem's credentials (which are privileged) instead of the calling user's credentials. This output tells the attacker that the system

For defenders, it serves as a stark reminder: If an attacker can tell you your exact kernel version and then drop to root in under 5 seconds, you have a problem. Docker uses similar concepts

owen:$6$salt$hash:0:0:root:/root:/bin/bash After a successful exploit, the attacker runs su owen (no password needed depending on the crafted hash) and becomes root. Disclaimer: Only run this on systems you own or have explicit written permission to test.