Skip to content
This repository was archived by the owner on Dec 18, 2019. It is now read-only.

CVE-2018-4407 PoC docs: Advice to use linux capabilities instead of running with full root privileges#3

Merged
sj merged 1 commit into
Semmle:masterfrom
RULCSoft:master
Nov 26, 2018
Merged

CVE-2018-4407 PoC docs: Advice to use linux capabilities instead of running with full root privileges#3
sj merged 1 commit into
Semmle:masterfrom
RULCSoft:master

Conversation

@altmas5
Copy link
Copy Markdown
Contributor

@altmas5 altmas5 commented Nov 25, 2018

Added a small advice at the end of README for giving the CAP_NET_RAW capability required for opening a raw socket instead of running the binaries with sudo (temporary root privileges).

Once the capability is granted any user can run direct_attack or crash_all with their privileges.

Let's break up with the root model :)

@kevinbackhouse
Copy link
Copy Markdown
Contributor

Thanks!

@sj sj merged commit e04254a into Semmle:master Nov 26, 2018
@jmdh
Copy link
Copy Markdown

jmdh commented Feb 15, 2019

Hi @altmas5 and thanks again for this contribution! Owing to an oversight on our part, the Semmle CLA had not been added to this repository at the time of your contribution. So that we can keep your contribution, we would appreciate it if you could sign our CLA, here https://cla.semmle.com/Semmle/SecurityExploits?pullRequest=3

Thanks again.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants