CVE-2016-5195

HIGH KEV

Canonical Ubuntu Linux < 3.2.83 - Race Condition

Title source: rule

Description

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

Exploits (74)

nomisec WORKING POC 991 stars
by timwr · local
https://github.com/timwr/CVE-2016-5195
nomisec WORKING POC 921 stars
by firefart · local
https://github.com/firefart/dirtycow
nomisec WORKING POC 508 stars
by scumjr · local
https://github.com/scumjr/dirtycow-vdso
nomisec WORKING POC 330 stars
by gbonacini · local
https://github.com/gbonacini/CVE-2016-5195
nomisec WORKING POC 280 stars
by r1is · local
https://github.com/r1is/CVE-2022-0847
nomisec WORKING POC 271 stars
by hyln9 · poc
https://github.com/hyln9/VIKIROOT
nomisec SUSPICIOUS 139 stars
by Brucetg · poc
https://github.com/Brucetg/DirtyCow-EXP
nomisec WORKING POC 31 stars
by DavidBuchanan314 · poc
https://github.com/DavidBuchanan314/cowroot
nomisec SCANNER 16 stars
by aishee · poc
https://github.com/aishee/scan-dirtycow
nomisec WORKING POC 13 stars
by xlucas · local
https://github.com/xlucas/dirtycow.cr
nomisec WORKING POC 10 stars
by pgporada · poc
https://github.com/pgporada/ansible-role-cve
nomisec WORKING POC 9 stars
by imust6226 · local
https://github.com/imust6226/dirtcow
nomisec WORKING POC 9 stars
by whu-enjoy · local
https://github.com/whu-enjoy/CVE-2016-5195
github WORKING POC 8 stars
by codecat007 · cpoc
https://github.com/codecat007/cvehub/tree/main/android/kernel/cve-2016-5195
nomisec WORKING POC 7 stars
by sideeffect42 · local
https://github.com/sideeffect42/DirtyCOWTester
nomisec WORKING POC 7 stars
by jas502n · local
https://github.com/jas502n/CVE-2016-5195
nomisec WORKING POC 6 stars
by oleg-fiksel · poc
https://github.com/oleg-fiksel/ansible_CVE-2016-5195_check
nomisec WORKING POC 4 stars
by droidvoider · local
https://github.com/droidvoider/dirtycow-replacer
nomisec WORKING POC 4 stars
by talsim · local
https://github.com/talsim/root-dirtyc0w
nomisec WORKING POC 3 stars
by LinuxKernelContent · local
https://github.com/LinuxKernelContent/DirtyCow
nomisec STUB 3 stars
by esc0rtd3w · poc
https://github.com/esc0rtd3w/org.cowpoop.moooooo
nomisec WORKING POC 3 stars
by arttnba3 · local
https://github.com/arttnba3/CVE-2016-5195
nomisec WORKING POC 2 stars
by FloridSleeves · poc
https://github.com/FloridSleeves/os-experiment-4
nomisec WORKING POC 2 stars
by LiEnby · local
https://github.com/LiEnby/PSSRoot
nomisec NO CODE 1 stars
by malinthag62 · poc
https://github.com/malinthag62/The-exploitation-of-Dirty-Cow-CVE-2016-5195
nomisec SCANNER 1 stars
by titanhp · poc
https://github.com/titanhp/Dirty-COW-CVE-2016-5195-Testing
nomisec WORKING POC 1 stars
by arbll · poc
https://github.com/arbll/dirtycow
nomisec WORKING POC 1 stars
by ASRTeam · local
https://github.com/ASRTeam/CVE-2016-5195
nomisec WORKING POC 1 stars
by DanielEbert · local
https://github.com/DanielEbert/CVE-2016-5195
nomisec WORKING POC 1 stars
by TotallyNotAHaxxer · local
https://github.com/TotallyNotAHaxxer/CVE-2016-5195
nomisec WORKING POC 1 stars
by th3-5had0w · local
https://github.com/th3-5had0w/DirtyCOW-PoC
nomisec WORKING POC 1 stars
by 0x3n19m4 · local
https://github.com/0x3n19m4/CVE-2016-5195
nomisec STUB
by passionchenjianyegmail8 · poc
https://github.com/passionchenjianyegmail8/scumjrs
nomisec STUB
by sakilahamed · poc
https://github.com/sakilahamed/Linux-Kernel-Exploit-LAB
nomisec WRITEUP
by h1n4mx0 · poc
https://github.com/h1n4mx0/Research-CVE-2016-5195
nomisec WORKING POC
by MarioAlejos-Cs · local
https://github.com/MarioAlejos-Cs/dirtycow-lab
nomisec WORKING POC
by mohammadamin382 · poc
https://github.com/mohammadamin382/dirtycow-lab
nomisec WRITEUP
by istenrot · poc
https://github.com/istenrot/centos-dirty-cow-ansible
nomisec STUB
by dulanjaya23 · poc
https://github.com/dulanjaya23/Dirty-Cow-CVE-2016-5195-
github WRITEUP
by OscarYR · poc
https://github.com/OscarYR/CVE_Reproduction/tree/main/Dirty Cow/CVE-2016-5195.md
nomisec WORKING POC
by ramahmdr · local
https://github.com/ramahmdr/dirtycow
nomisec WORKING POC
by zakariamaaraki · local
https://github.com/zakariamaaraki/Dirty-COW-CVE-2016-5195-
nomisec WORKING POC
by theo543 · poc
https://github.com/theo543/OSDS_Paper_CVE-2016-5195
nomisec WRITEUP
by elhaddadalaa788-alt · poc
https://github.com/elhaddadalaa788-alt/kernel-exploit-dirtycow-project-subm
nomisec WORKING POC
by fei9747 · local
https://github.com/fei9747/CVE-2016-5195
nomisec WORKING POC
by ASUKA39 · local
https://github.com/ASUKA39/CVE-2016-5195
gitlab WRITEUP
by nu11secur1ty · poc
https://gitlab.com/nu11secur1ty/Protect-CVE-2016-5195-DirtyCow
nomisec WORKING POC
by ldenevi · local
https://github.com/ldenevi/CVE-2016-5195
nomisec WORKING POC
by sribaba · local
https://github.com/sribaba/android-CVE-2016-5195
nomisec WORKING POC
by Nathanloupy · poc
https://github.com/Nathanloupy/42adv_boot2root
nomisec WORKING POC
by EDLLT · local
https://github.com/EDLLT/CVE-2016-5195-master
nomisec WORKING POC
by xpcmdshell · poc
https://github.com/xpcmdshell/derpyc0w
nomisec WORKING POC
by ZhiQiAnSecFork · local
https://github.com/ZhiQiAnSecFork/DirtyCOW_CVE-2016-5195
nomisec WORKING POC
by KaviDk · local
https://github.com/KaviDk/dirtyCow
nomisec SCANNER
by ndobson · poc
https://github.com/ndobson/inspec_CVE-2016-5195
nomisec SUSPICIOUS
by KasunPriyashan · poc
https://github.com/KasunPriyashan/Y2S1-Project-Linux-Exploitaion-using-CVE-2016-5195-Vulnerability
nomisec WRITEUP
by pardhu045 · poc
https://github.com/pardhu045/linux-privilege-escalation
nomisec WRITEUP
by Samuel-G3 · poc
https://github.com/Samuel-G3/Escalamiento-de-Privilegios-usando-el-Kernel-Exploit-Dirty-Cow
nomisec WORKING POC
by acidburnmi · poc
https://github.com/acidburnmi/CVE-2016-5195-master
nomisec STUB
by shanuka-ashen · poc
https://github.com/shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195-
exploitdb WORKING POC VERIFIED
by FireFart · clocallinux
https://www.exploit-db.com/exploits/40839
exploitdb WORKING POC VERIFIED
by Phil Oester · clocallinux
https://www.exploit-db.com/exploits/40611
exploitdb WORKING POC VERIFIED
by Gabriele Bonacini · c++locallinux
https://www.exploit-db.com/exploits/40847
exploitdb WORKING POC
by Phil Oester · clocallinux
https://www.exploit-db.com/exploits/40838
exploitdb WORKING POC VERIFIED
by Robin Verton · clocallinux
https://www.exploit-db.com/exploits/40616
vulncheck_xdb SUSPICIOUS
local
https://github.com/l0veormiss/l0veormiss.github.io
vulncheck_xdb WORKING POC
local
https://github.com/B1ackCat/cve-2016-5195-DirtyCOW
vulncheck_xdb WORKING POC
local
https://github.com/Jekyll-Hyde2022/PrivEsc-Linux
vulncheck_xdb WORKING POC
local
https://github.com/Danyw24/dirtycow2-

References (128)

... and 108 more

Scores

CVSS v3 7.0
EPSS 0.9418
EPSS Percentile 99.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-03-03
VulnCheck KEV 2016-10-18
InTheWild.io 2016-10-18
ENISA EUVD EUVD-2016-6146

Classification

CWE
CWE-362
Status draft

Affected Products (31)

canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
linux/linux_kernel < 3.2.83
redhat/enterprise_linux
redhat/enterprise_linux
redhat/enterprise_linux
redhat/enterprise_linux_aus
redhat/enterprise_linux_aus
redhat/enterprise_linux_aus
redhat/enterprise_linux_eus
redhat/enterprise_linux_eus
redhat/enterprise_linux_eus
redhat/enterprise_linux_long_life
... and 16 more

Timeline

Published Nov 10, 2016
KEV Added Mar 03, 2022
Tracked Since Feb 18, 2026