Become a patron and gain access to the dashboard, Schedule scans, API and Search patron
Author
"Marco Ivaldi"
Platform
windows
Release date
2007-04-04
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 | # $Id: raptor_truecrypt,v 1.1.1.1 2007/04/04 11:31:56 raptor Exp $ # # raptor_truecrypt - setuid truecrypt privilege escalation # Copyright (c) 2007 Marco Ivaldi <[email protected]> # # TrueCrypt 4.3, when installed setuid root, allows local users to cause a # denial of service (filesystem unavailability) or gain privileges by mounting # a crafted TrueCrypt volume, as demonstrated using (1) /usr/bin or (2) another # user's home directory, a different issue than CVE-2007-1589 (CVE-2007-1738). # # WARNING: THIS IS A PROOF OF CONCEPT EXPLOIT TAKING ADVANTAGE OF NPTL THREAD # LOCAL STORAGE DYNAMIC LINKING MODEL, DO NOT USE IT IF YOU DON'T KNOW HOW IT # WORKS! YEAH, IT *DOES* REQUIRE SOME TWEAKINGS TO EXPLOIT NON-TLS PLATFORMS! # # Other possible attack vectors: /etc/cron.{d,hourly,daily,weekly,monthly}, at # (/var/spool/atjobs/), xinetd (/etc/xinetd.d), /etc/logrotate.d, and more... http://www.0xdeadbeef.info/exploits/raptor_truecrypt.tgz https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3664.tgz # milw0rm.com [2007-04-04] |
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/3664/?format=json')
For full documentation follow the link above