{"uuid": "97ecd8eb-662b-4bb2-8336-ca9b2542add0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0435", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/161", "content": "Writing a Linux Kernel Remote [Exploit] in 2022\n\nAn article by Samuel Page @sam4k1 about writing an exploit for a remotely-triggerable stack-buffer-overflow in TIPC (CVE-2022-0435).\n\nAssuming the absence of KASLR and the Stack Protector, the exploit overwrites the stack with a ROP chain that hooks a syscall to hijack a root process.", "creation_timestamp": "2022-04-24T14:50:16.000000Z"}