Rapid7 Vulnerability & Exploit Database

Linux Kernel recvmmsg Privilege Escalation

Back to Search

Linux Kernel recvmmsg Privilege Escalation

Disclosed
02/02/2014
Created
05/30/2018

Description

This module attempts to exploit CVE-2014-0038, by sending a recvmmsg system call with a crafted timeout pointer parameter to gain root. This exploit has offsets for 3 Ubuntu 13 kernels: 3.8.0-19-generic (13.04 default); 3.11.0-12-generic (13.10 default); 3.11.0-15-generic (13.10). This exploit may take up to 13 minutes to run due to a decrementing (1/sec) pointer which starts at 0xff*3 (765 seconds)

Author(s)

  • h00die <mike@shorebreaksecurity.com>
  • rebel

Platform

Linux

Architectures

x86, x64

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/local/recvmmsg_priv_esc
msf exploit(recvmmsg_priv_esc) > show targets
    ...targets...
msf exploit(recvmmsg_priv_esc) > set TARGET < target-id >
msf exploit(recvmmsg_priv_esc) > show options
    ...show and set options...
msf exploit(recvmmsg_priv_esc) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;