This Metasploit module attempts to gain root privileges by exploiting a vulnerability in ktsuss versions 1.4 and prior. The ktsuss executable is setuid root and does not drop privileges prior to executing user specified commands, resulting in command execution with root privileges. This module has been tested successfully on ktsuss 1.3 on SparkyLinux 6 (2019.08) (LXQT) (x64) and ktsuss 1.3 on SparkyLinux 5.8 (LXQT) (x64).
60b05f9c8dd9618a16984179687837c73ed7d9f5164d7df7821f81dfa103046c
Gentoo Linux Security Advisory 201201-15 - Two vulnerabilities have been found in ktsuss, allowing local attackers to gain escalated privileges. Versions less than or equal to 1.4 are affected.
fd95eac11c4bc9f23b75274c888b9e4bf19d39f9ee6a7d32f8bcdb7d1ad10e5b