Linux Kernel IA32 Syscall Emulation Privilege Escalation Exploit

This module exploits a vulnerability in Linux for x86-64. The IA32 system call emulation functionality does not zero-extend the EAX register after the 32bit entry path to ptrace is used, which might allow local users to trigger an out-of-bounds access to the system call table using the RAX register and escalate privileges. This vulnerability is a regression of CVE-2007-4573.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Thursday, August 23, 2012 - 00:00