info
discussion
exploit
solution
references
Rocks Clusters Local Privilege Escalation Vulnerabilities
Attackers can exploit these issues using a Linux command shell.
Sample exploit code has been provided:
/data/vulnerabilities/exploits/rocksmountdirty-priv-escalation.txt
/data/vulnerabilities/exploits/rocksumountdirty-priv-escalation.txt
Privacy Statement
Copyright 2010, SecurityFocus