Exploit:Linux/CVE-2021-4034.A
Exploit:Linux/CVE-2021-4034.A is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. The vulnerability is a memory corruption vulnerability, specifically this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component.
Exploit:Linux/CVE-2021-4034!rfn
Exploit:Linux/CVE-2021-4034!rfn is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. Vulnerability is a memory corruption vulnerability, this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component.
Exploit:Linux/CVE-2021-4034!MTB
Exploit:Linux/CVE-2021-4034!MTB is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. The vulnerability is a memory corruption vulnerability, specifically this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component.
Exploit:Linux/CVE-2021-4034.B!MTB
Exploit:Linux/CVE-2021-4034.B!MTB is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. Vulnerability is a memory corruption vulnerability; this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component.
Exploit:Linux/CVE-2021-4034.A!MTB
Exploit:Linux/CVE-2021-4034.A!MTB is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. Vulnerability is a memory corruption vulnerability, specifically this is an out-of-bound read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component.
Exploit:Linux/CVE-2021-4034.C!MTB
Exploit:Linux/CVE-2021-4034.C!MTB is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. The vulnerability is a memory corruption vulnerability, specifically this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component.