Sun Solaris 2.6/7.0/8/9 - vfs_getvfssw function Privilege Escalation
Author: Sinan Eren
type: local
platform: solaris
port:
date_added: 2004-03-23
date_updated: 2013-01-09
verified: 1
codes: CVE-2004-2686;OSVDB-60301
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/9962/info
It has been reported that Sun Solaris may be prone to a local privilege escalation vulnerability that may allow an attacker to gain root access to a vulnerable system. The issue exists due to insufficient sanitization of user-supplied data via the vfs_getvfssw() function in the Solaris kernel. An attacker can load a user-specified kernel module by using directory traversal sequences and employing the mount() or sysfs() system calls.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23874.tar