Skip to main content
Skip to main content
Microsoft Security Intelligence
6 entries found.
Updated on Mar 10, 2022

Exploit:Linux/CVE-2021-4034.A is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. The vulnerability is a memory corruption vulnerability, specifically this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component. 

Alert level: severe
Updated on Apr 06, 2022

Exploit:Linux/CVE-2021-4034!rfn is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. Vulnerability is a memory corruption vulnerability, this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component. 

Alert level: severe
Updated on Oct 07, 2023

Exploit:Linux/CVE-2021-4034!MTB is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. The vulnerability is a memory corruption vulnerability, specifically this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host.  It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component. 

Alert level: severe
Updated on Feb 14, 2022

Exploit:Linux/CVE-2021-4034.B!MTB is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. Vulnerability is a memory corruption vulnerability; this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component. 

Alert level: severe
Updated on Mar 01, 2022

Exploit:Linux/CVE-2021-4034.A!MTB is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. Vulnerability is a memory corruption vulnerability, specifically this is an out-of-bound read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component. 

Alert level: severe
Updated on Jun 09, 2022

Exploit:Linux/CVE-2021-4034.C!MTB is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. The vulnerability is a memory corruption vulnerability, specifically this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host.  It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component. 

Alert level: severe