Dirty COW Vulnerability

 what is dirty cow vulnerability?

Dirty COW was a vulnerability in the Linux kernel. It allowed processes to write read-only files. This exploit made use of a race condition that lived inside the kernel functions which handle the copy-on-write (COW) feature of memory mappings.

CVE number of dirty cow- CVE-2016-5195

·       About CVE-2016-5195 – A race condition was found in the way the Linux kernel’s memory subsystem handles the copy-on-write breakage of private read-only memory mappings.

·       An attacker would first require access to a shell on the device before they could use this exploit.

What does this vulnerability do?

This vulnerability allows the user to bypass the normal file system protections and write to files that are owned by the system.

Consequences

·       Opens up many avenues for attack,

·       which results in the unprivileged user becoming rooted in the system and,

·        able to access any system resources.

How was it fixed?

Dirty Cow was one of the first security issues transparently fixed in Ubuntu by the Canonical Live Patch Service.

Follow Us Here - Twitter

Comments

Popular posts from this blog

Emerging Cyber Crime !!

BlackRock Scam Explained: How a Telecom Giant Fell for a Phishing & Investment Fraud

🚨 Generative AI Phishing Attacks in 2026: How AI is Making Cybercrime More Dangerous