Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2016-2779

Description

runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

POC

Reference

No PoCs from references.

Github

- https://github.com/ARPSyndicate/cvemon

- https://github.com/KorayAgaya/TrivyWeb

- https://github.com/Mohzeela/external-secret

- https://github.com/aquasecurity/starboard-aqua-csp-webhook

- https://github.com/broadinstitute/dsp-appsec-trivy-cicd

- https://github.com/crazy-max/yasu

- https://github.com/flyrev/security-scan-ci-presentation

- https://github.com/garethr/findcve

- https://github.com/gp47/xef-scan-ex02

- https://github.com/hartwork/antijack

- https://github.com/hilbix/suid

- https://github.com/khulnasoft/starboard-khulnasoft-csp-webhook

- https://github.com/loong64/gosu

- https://github.com/lucky-sideburn/secpod_wrap

- https://github.com/sergeichev-vitaly/gosu

- https://github.com/siddharthraopotukuchi/trivy

- https://github.com/simiyo/trivy

- https://github.com/t31m0/Vulnerability-Scanner-for-Containers

- https://github.com/tednespippi/gosu

- https://github.com/tianon/gosu

- https://github.com/umahari/security

- https://github.com/vivek-kyndryl/gosu

- https://github.com/wojiushixiaobai/gosu-loongarch64

- https://github.com/xlong-xlong/gosu

- https://github.com/yfoelling/yair

- https://github.com/yonixw/gosu