PoC for Dirty COW (CVE-2016-5195).
This PoC relies on ptrace (instead of /proc/self/mem
) to patch vDSO. It has a
few advantages over PoCs modifying filesystem binaries:
- no setuid binary required
- SELinux bypass
- container escape
- no kernel crash because of filesystem writeback
And a few cons:
- architecture dependent (since the payload is written in assembly)
- doesn't work on every Linux version
- subject to vDSO changes
The current payload is almost the same as in
The Sea Watcher and is executed
whenever a process makes a call to clock_gettime()
. It forks and executes a
Python one-liner which creates a TCP reverse shell to the exploit. It isn't
elegant but it could be used for container escape.
- payload improvement
- release of the tool for vDSO payloads testing
Detecting if vDSO is successfuly patched isn't bulletproof. During the restore step, the vDSO is effectively restored but the exploit fails to report it correctly. Indeed, the vDSO changes don't seem to affect the exploit process.