ASAN/SUID Local Root Exploit
Posted by deepcore on March 1, 2016 – 3:41 pm
This script exploits er, unsanitized env var passing in ASAN which leads to file clobbering as root when executing setuid root binaries compiled with ASAN. It uses an overwrite of /etc/ld.so.preload to get root on a vulnerable system. You can supply your own target binary to use for exploitation.
Post a reply
You must be logged in to post a comment.