Linux Kernel IA32 Syscall Emulation Privilege Escalation Exploit

This module exploits a vulnerability in Linux for x86-64. The IA32 system call emulation functionality does not zero-extend the EAX register after the 32bit entry path to ptrace is used, which might allow local users to trigger an out-of-bounds access to the system call table using the RAX register and escalate privileges.



This vulnerability is a regression of CVE-2007-4573.
Exploit Type - Old
Exploits/Local
Exploit Platform
Exploit Type
Product Name