激情五月天婷婷,亚洲愉拍一区二区三区,日韩视频一区,a√天堂中文官网8

<ul id="buwfs"><strike id="buwfs"><strong id="buwfs"></strong></strike></ul>
    <output id="buwfs"></output>
  • <dfn id="buwfs"><source id="buwfs"></source></dfn>
      <dfn id="buwfs"><td id="buwfs"></td></dfn>
      <div id="buwfs"><small id="buwfs"></small></div>
      <dfn id="buwfs"><source id="buwfs"></source></dfn>
      1. <dfn id="buwfs"><td id="buwfs"></td></dfn>
        始創(chuàng)于2000年 股票代碼:831685
        咨詢熱線:0371-60135900 注冊有禮 登錄
        • 掛牌上市企業(yè)
        • 60秒人工響應(yīng)
        • 99.99%連通率
        • 7*24h人工
        • 故障100倍補(bǔ)償
        全部產(chǎn)品
        您的位置: 網(wǎng)站首頁 > 幫助中心>文章內(nèi)容

        linux各版本對應(yīng)溢出漏洞總結(jié)(溢出代碼) (1)

        發(fā)布時(shí)間:  2012/8/15 17:57:00

        2.4.17
        newlocal
        kmod


        2.4.18
        brk
        brk2
        newlocal
        kmod
        km.2


        2.4.19
        brk
        brk2
        newlocal
        kmod
        km.2


        2.4.20
        ptrace
        kmod
        ptrace-kmod
        km.2
        brk
        brk2


        2.4.21
        km.2
        brk
        brk2
        ptrace
        ptrace-kmod


        2.4.22
        km.2
        brk2
        brk
        ptrace
        ptrace-kmod


        2.4.22-10
        loginx
        ./loginx


        2.4.23
        mremap_pte


        2.4.24
        mremap_pte
        Uselib24


        2.4.25-1
        uselib24


        2.4.27
        Uselib24


        2.6.0
        REDHAT 6.2
        REDHAT 6.2 (zoot)
        SUSE 6.3
        SUSE 6.4
        REDHAT 6.2 (zoot)
        all top from rpm
        -------------------------
        FreeBSD 3.4-STABLE from port
        FreeBSD 3.4-STABLE from packages
        freeBSD 3.4-RELEASE from port
        freeBSD 4.0-RELEASE from packages
        ----------------------------
        all with wuftpd 2.6.0;
        =
        wuftpd
        h00lyshit


        2.6.2
        mremap_pte
        krad
        h00lyshit


        2.6.5 to 2.6.10
        krad
        krad2
        h00lyshit


        2.6.8-5
        krad2
        ./krad x
        x = 1..9
        h00lyshit


        2.6.9-34
        r00t
        h00lyshit


        2.6.13-17
        prctl
        h00lyshit

        -------------------

        2.4.17 -> newlocal, kmod, uselib24
        2.4.18 -> brk, brk2, newlocal, kmod
        2.4.19 -> brk, brk2, newlocal, kmod
        2.4.20 -> ptrace, kmod, ptrace-kmod, brk, brk2
        2.4.21 -> brk, brk2, ptrace, ptrace-kmod
        2.4.22 -> brk, brk2, ptrace, ptrace-kmod
        2.4.22-10 -> loginx
        2.4.23 -> mremap_pte
        2.4.24 -> mremap_pte, uselib24
        2.4.25-1 -> uselib24
        2.4.27 -> uselib24
        2.6.2 -> mremap_pte, krad, h00lyshit
        2.6.5 -> krad, krad2, h00lyshit
        2.6.6 -> krad, krad2, h00lyshit
        2.6.7 -> krad, krad2, h00lyshit
        2.6.8 -> krad, krad2, h00lyshit
        2.6.8-5 -> krad2, h00lyshit
        2.6.9 -> krad, krad2, h00lyshit
        2.6.9-34 -> r00t, h00lyshit
        2.6.10 -> krad, krad2, h00lyshit
        2.6.13 -> raptor, raptor2, h0llyshit, prctl
        2.6.14 -> raptor, raptor2, h0llyshit, prctl
        2.6.15 -> raptor, raptor2, h0llyshit, prctl
        2.6.16 -> raptor, raptor2, h0llyshit, prctl
        -----------------------------------------------------

        Linux
        Common
        Linux 2.2.x ->Linux kernel ptrace/kmod local root exploit (http://milw0rm.com/exploits/3)
        Linux 2.2.x (on exported files, should be vuln) (http://milw0rm.com/exploits/718)
        Linux <= 2.2.25 ->Linux Kernel 2.x mremap missing do_munmap Exploit (http://milw0rm.com/exploits/160)

        Linux 2.4.x ->Linux kernel ptrace/kmod local root exploit (http://milw0rm.com/exploits/3)
        Linux 2.4.x -> pwned.c - Linux 2.4 and 2.6 sys_uselib local root exploit (http://milw0rm.com/exploits/895)
        Linux 2.4.x ->Linux kernel 2.4 uselib() privilege elevation exploit (http://milw0rm.com/exploits/778)
        Linux 2.4.20 ->Linux Kernel Module Loader Local R00t Exploit (http://milw0rm.com/exploits/12)
        Linux <= 2.4.22 ->Linux Kernel <= 2.4.22 (do_brk) Local Root Exploit (http://milw0rm.com/exploits/131)
        Linux 2.4.22 ->Linux Kernel 2.4.22 "do_brk()" local Root Exploit (PoC) (http://milw0rm.com/exploits/129)
        Linux <= 2.4.24 ->Linux Kernel 2.x mremap missing do_munmap Exploit (http://milw0rm.com/exploits/160)
        Linux 2.4.x < 2.4.27-rc3 (on nfs exported files) (http://milw0rm.com/exploits/718)

        Linux <= 2.6.2 ->Linux Kernel 2.x mremap missing do_munmap Exploit (http://milw0rm.com/exploits/160)
        Linux 2.6.11 -> Linux Kernel <= 2.6.11 (CPL 0) Local Root Exploit (k-rad3.c) (http://milw0rm.com/exploits/1397)
        Linux 2.6.13 <= 2.6.17.4 -> Linux Kernel 2.6.13 <= 2.6.17.4 prctl() Local Root Exploit (logrotate) (http://milw0rm.com/exploits/2031)
        Linux 2.6.13 <= 2.6.17.4 -> Linux Kernel 2.6.13 <= 2.6.17.4 sys_prctl() Local Root Exploit (http://milw0rm.com/exploits/2011)
        Linux 2.6.11 <= 2.6.17.4 -> h00lyshit.c -Linux Kernel <= 2.6.17.4 (proc) Local Root Exploit (http://milw0rm.com/exploits/2013)
        Linux 2.6.x < 2.6.7-rc3 (default configuration) (


        億恩科技地址(ADD):鄭州市黃河路129號天一大廈608室 郵編(ZIP):450008 傳真(FAX):0371-60123888
           聯(lián)系:億恩小凡
           QQ:89317007
           電話:0371-63322206


        本文出自:億恩科技【mszdt.com】

        服務(wù)器租用/服務(wù)器托管中國五強(qiáng)!虛擬主機(jī)域名注冊頂級提供商!15年品質(zhì)保障!--億恩科技[ENKJ.COM]

      2. 您可能在找
      3. 億恩北京公司:
      4. 經(jīng)營性ICP/ISP證:京B2-20150015
      5. 億恩鄭州公司:
      6. 經(jīng)營性ICP/ISP/IDC證:豫B1.B2-20060070
      7. 億恩南昌公司:
      8. 經(jīng)營性ICP/ISP證:贛B2-20080012
      9. 服務(wù)器/云主機(jī) 24小時(shí)售后服務(wù)電話:0371-60135900
      10. 虛擬主機(jī)/智能建站 24小時(shí)售后服務(wù)電話:0371-60135900
      11. 專注服務(wù)器托管17年
        掃掃關(guān)注-微信公眾號
        0371-60135900
        Copyright© 1999-2019 ENKJ All Rights Reserved 億恩科技 版權(quán)所有  地址:鄭州市高新區(qū)翠竹街1號總部企業(yè)基地億恩大廈  法律顧問:河南亞太人律師事務(wù)所郝建鋒、杜慧月律師   京公網(wǎng)安備41019702002023號
          0
         
         
         
         

        0371-60135900
        7*24小時(shí)客服服務(wù)熱線