Linux Kernel 4.4 (Ubuntu 16.04) snd_timer_user_ccallback() Kernel Pointer Leak
Linux Kernel version 4.4 (Ubuntu 16.04) suffers from a snd_timer_user_ccallback() kernel pointer leak vulnerability.
Linux Kernel version 4.4 (Ubuntu 16.04) suffers from a snd_timer_user_ccallback() kernel pointer leak vulnerability.
This Metasploit module uses the Liferay CE Portal Groovy script console to execute OS commands. The Groovy script can execute commands on the system via a [command].execute() call. Valid credentials for an application administrator user account are required. This module has been tested successfully with Liferay CE Portal Tomcat 7.1.2 ga3 on Debian 4.9.18-1kali1 system.
http://www.huorua.go.th/d_finance/new_finance/ooo.jpg notified by KURD ELECTRONIC TEAM
Tags: defacementhttp://www.nongsangwapi.go.th/f_rules/new_rules/ooo.jpg notified by KURD ELECTRONIC TEAM
Tags: defacementLinux/x86 – MMX-XOR Encoder / Decoder execve(/bin/sh) Shellcode (44 bytes)
Tags: 0day, remote exploitLinux Kernel 4.4 (Ubuntu 16.04) – ‘snd_timer_user_ccallback()’ Kernel Pointer Leak
Tags: 0day, remote exploit