Skip to content

Guezennec/CVE-2016-5195

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Description:

dcow is a possible exploit of the vulnerability CVE-2016-5195. Running the program as unprivileged user on a vulnerable system, it'll modify the /etc/passwd file, forcing the password "dirtyCowFun" (SHA-512, but could be modified for older standards). In case of successful execution, doing a "su" with that password, a root shell will be available. A backup of the original /etc/passwd will be created in the current directory as .ssh_bak.

Prerequisites:

A CVE-2016-5195 vulnerable system.

The program was successfully used with:

  • RHEL7 Linux x86_64;
  • Debian 7 ("wheezy");
  • Ubuntu 14.04.5 LTS
  • Linux Mint 17.2

and compiled with:

  • clang version 4.0.0;
  • gcc version 4.8.5 20150623 (Red Hat 4.8.5-4) (GCC);
  • gcc version 4.8.4 (Ubuntu 4.8.4);
  • gcc version 4.8.2 (Ubuntu 4.8.2-19ubuntu1)
  • gcc version 4.7.2 (Debian 4.7.2-5);

Installation:

  • Compile the program: make
  • Start the program: ./dcow

About

A CVE-2016-5195 exploit example.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C++ 97.7%
  • Makefile 2.3%