|
You are here |
reverse.put.as | ||
| | | | |
beny23.github.io
|
|
| | | | | Pwnkit is a vulnerability that uses a bug in polkit to elevate permissions to root. This write-up shows how to reproduce it using Ubuntu and what to do to check whether a system is vulnerable. What went wrong? Quoting from the original researchers: This vulnerability is an attacker's dream come true: pkexec is installed by default on all major Linux distributions; pkexec is vulnerable since its creation, in May 2009; any unprivileged local user can exploit this vulnerability to obtain full root privileges; although this vulnerability is technically a memory corruption, it is exploitable instantly, reliably, in an architecture-independent way; and it is exploitable even if the polkit daemon itself is not running. | |
| | | | |
malgregator.com
|
|
| | | | | Ubiquiti network devices are being remotely exploited, via port 10001 discovery service. Results in loss of device management, also being used as a weak UDP DDoS amplification attack: 56 bytes in, 206 bytes out. | |
| | | | |
allelesecurity.com
|
|
| | | | | Want to keep your systems secure against advanced threat actors? Linux Livepatch is the solution. | |
| | | | |
shyamjos.com
|
|
| | | Kubernetes provides container lifecycle hook framework to run code triggered by events during their management lifecycle called PostStart and PreStop hooks | ||