mirror of https://gitee.com/openkylin/genmai.git
update data/KernelPocs/CVE-2022-1679/CVE-2022-1679.yaml.
Signed-off-by: candychips <by2239109_lmh@buaa.edu.cn>
This commit is contained in:
parent
130c00f3c2
commit
d0fb94a713
|
@ -1,26 +1,51 @@
|
|||
FormatVer: 20220517
|
||||
id: CVE-2022-1679
|
||||
source: https://github.com/EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679
|
||||
info:
|
||||
name: Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
|
||||
severity: high
|
||||
description: |
|
||||
Linux kernel 存在安全漏洞,该漏洞源于在Athero无线适配器驱动程序发现了一个释放后重用缺陷,用户强制 ath9k_htc_wait_for_target 函数失败并显示一些输入消息。攻击者利用该漏洞提升系统上的权限。
|
||||
scope-of-influence:
|
||||
Linux kernel 5.10
|
||||
reference:
|
||||
- https://security.netapp.com/advisory/ntap-20220629-0007/
|
||||
- https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-1679
|
||||
- https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 7.8
|
||||
cve-id: CVE-2022-1679
|
||||
cwe-id: CWE-416
|
||||
cnvd-id: None
|
||||
KveId: None
|
||||
tags:
|
||||
- 非法权限提升
|
||||
- 重用缺陷
|
||||
|
||||
Id: CVE-2022-1679
|
||||
Belong: kernel
|
||||
PocHazardLevel: high
|
||||
Source: https://github.com/EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679
|
||||
SiteInfo:
|
||||
Name: Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核
|
||||
Severity: High
|
||||
Description: Linux kernel 存在安全漏洞,该漏洞源于在Athero无线适配器驱动程序发现了一个释放后重用缺陷,用户强制 ath9k_htc_wait_for_target 函数失败并显示一些输入消息。攻击者利用该漏洞提升系统上的权限。
|
||||
ScopeOfInfluence:
|
||||
Linux kernel 5.10
|
||||
References:
|
||||
- https://security.netapp.com/advisory/ntap-20220629-0007/
|
||||
- https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-1679
|
||||
- https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/
|
||||
SiteClassification:
|
||||
CvssMetrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
||||
CvssScore: 7.8
|
||||
CveId: CVE-2022-1679
|
||||
CweId: CWE-416
|
||||
CnvdId: None
|
||||
KveId: None
|
||||
Tags:
|
||||
- 权限提升
|
||||
- 重用缺陷
|
||||
SiteRequests:
|
||||
Implement:
|
||||
ImArray:
|
||||
- Inter:
|
||||
InterArgs :
|
||||
Exec : CVE2022-1679.sh
|
||||
Args :
|
||||
ExpireTime: 30 #second
|
||||
|
||||
# < input
|
||||
# > output
|
||||
# . wait
|
||||
# ? condition
|
||||
# : content
|
||||
#
|
||||
#组合起来
|
||||
# >. 等待直到输出
|
||||
# << 输入字符
|
||||
# >?判断条件
|
||||
Inter:
|
||||
- ">.:Enjoy root!"
|
||||
- "<<:whoami\n"
|
||||
- ">.:\n"
|
||||
- ">?:root"
|
||||
Condition: None
|
Loading…
Reference in New Issue