Dirty Cow (CVE-2016-5195) Privilege Escalation Demo

Dirty Cow (CVE-2016-5195) Privilege Escalation Demo.

Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel.
A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.

Lets move to the demo:

Step 1:
Download the cowroot and save it as cowroot.c
cowroot

Check username you logged in as using command whoami. you can see in pic i am logged in as juniour.
whoami

Step 2:
Check you system arch, using command uname -a.
you can see in setp 1 screenshot mine arch is x86_64.

According to the arch your system arch un-comment unsigned char sc[] ….. as show in screenshot below and save it.
cowroot_arch_uncomment

Step 4:
Compile the cowroot.c and save it as cowroot.
$ gcc cowroot.c -o cowroot -pthread
compile cowroot

Step 5:
Time to get root privilege.
$./cowroot
dirty cow root privilege
Type whoami to check you got root or not.

I hope you enjoyed Dirty COW (CVE-2016-5195) demo.

Credit: dirtycow.ninja

Plz Share Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someoneShare on RedditShare on TumblrDigg thisBuffer this pagePrint this pagePin on PinterestShare on StumbleUponFlattr the author
Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *