Exploitation Summary
EIP tracks 1 public exploit for CVE-2007-4305. PoCs published by Robert N. M. Watson.
AI-analyzed exploit summary This exploit targets a race condition in Systrace's system call wrappers, allowing privilege escalation or auditing bypass by manipulating system call arguments. The PoC demonstrates a fork-based overwrite of a socket address structure during a bind operation.
Description
Multiple race conditions in the (1) Sudo monitor mode and (2) Sysjail policies in Systrace on NetBSD and OpenBSD allow local users to defeat system call interposition, and consequently bypass access control policy and auditing.
Exploits (1)
This exploit targets a race condition in Systrace's system call wrappers, allowing privilege escalation or auditing bypass by manipulating system call arguments. The PoC demonstrates a fork-based overwrite of a socket address structure during a bind operation.