Files
litterbox/Scanners/Yara/rules/elastic-yara/Linux_Exploit_CVE_2021_3490.yar
T
2026-05-04 08:56:43 -07:00

32 lines
1.1 KiB
Plaintext

rule Linux_Exploit_CVE_2021_3490_d369d615 {
meta:
author = "Elastic Security"
id = "d369d615-d2a3-4f9d-b5c7-eb0fac5d43e7"
fingerprint = "4f8f4c7fabe32a023f8aafb817e2c27c5a5e0e9246ddccacf99a47f2ab850014"
creation_date = "2021-11-12"
last_modified = "2022-01-26"
threat_name = "Linux.Exploit.CVE-2021-3490"
reference_sample = "e65ba616942fd1e893e10898d546fe54458debbc42e0d6826aff7a4bb4b2cf19"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "linux"
strings:
$c1 = "frame_dummy_init_array_entry"
$c2 = "leak_oob_map_ptr"
$c3 = "overwrite_cred"
$c4 = "obj_get_info_by_fd"
$c5 = "kernel_write_uint"
$c6 = "search_init_pid_ns_kstrtab"
$c7 = "search_init_pid_ns_ksymtab"
$msg1 = "failed to leak ptr to BPF map"
$msg2 = "preparing to overwrite creds..."
$msg3 = "success! enjoy r00t"
$msg4 = "Useage: %s <path to program to execute as root>"
$msg5 = "searching for init_pid_ns in ksymtab"
condition:
4 of them
}