Linux Kernel UFO Memory Corruption Privilege Escalation Exploit

This module exploits a memory corruption vulnerability in the Linux kernel. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption that can be used by an attacker to escalate privileges. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Exploit type: 
Platform: 
Vulnerabilty ID: 
CVE-2017-1000112
Product Version: 
2017_R2
Released Date: 
Monday, August 14, 2017 - 00:00