Skip to content

This repository provides a modified version of the original CVE-2017-6074 exploit (use-after-free in the Linux kernel DCCP subsystem), designed only to demonstrate Denial of Service (DoS) impact. An authenticated local user can trigger a kernel panic, causing a total loss of system availability.

34zY/CVE-2017-6074-DOS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

CVE-2017-6074 - DoS-Only Exploit (Linux DCCP kernel panic)

This repository provides a modified version of the original CVE-2017-6074 exploit (use-after-free in the Linux kernel DCCP subsystem), designed only to demonstrate Denial of Service (DoS) impact.

An authenticated local user can trigger a kernel panic, causing a total loss of system availability.

  • No privilege escalation is attempted or achieved.
  • Exploit requires local user access (e.g., via SSH).
  • For security research, PoC demonstration, and controlled testing environments only.

References

Disclaimer

⚠️ Run this code ONLY on authorized test systems. This program will immediately crash the kernel.

Use it at your personal risks, i'm not responsible for bad usages.

About

This repository provides a modified version of the original CVE-2017-6074 exploit (use-after-free in the Linux kernel DCCP subsystem), designed only to demonstrate Denial of Service (DoS) impact. An authenticated local user can trigger a kernel panic, causing a total loss of system availability.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages