<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[#LPE — Local Privilege Escalation.]]></title><description><![CDATA[<p><a href="https://social.wildeboer.net/tags/LPE" rel="tag">#<span>LPE</span></a> — Local Privilege Escalation. A class of vulnerabilities that need a local user account on the target machine to reach higher levels of privilege, up to superuser/root</p><p><a href="https://social.wildeboer.net/tags/RCE" rel="tag">#<span>RCE</span></a> — Remote Code Execution. A class of vulnerabilities that can be exploited over unprivileged network connections, giving the attacker privileged access to the target machine.</p><p><a href="https://social.wildeboer.net/tags/CopyFail" rel="tag">#<span>CopyFail</span></a>, <a href="https://social.wildeboer.net/tags/DirtyFrag" rel="tag">#<span>DirtyFrag</span></a> are LPEs that affect Linux systems. LPEs are typically harder to exploit than RCEs.</p><p>Hope this helps to avoid Clickbait.</p>]]></description><link>https://board.circlewithadot.net/topic/62fe8b51-6f75-40f5-8fc6-30afac0621b3/lpe-local-privilege-escalation.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:25:26 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/62fe8b51-6f75-40f5-8fc6-30afac0621b3.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 10:09:53 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to #LPE — Local Privilege Escalation. on Fri, 08 May 2026 11:03:49 GMT]]></title><description><![CDATA[<p><span><a href="/user/jwildeboer%40social.wildeboer.net">@<span>jwildeboer</span></a></span> CVE-2026-23918 against Apache HTTPD was / is at the same time than CopyFail / DirtyFrag and could have been a good way to execute the POC.</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.gougere.fr/users/bortzmeyer/statuses/116538620624981219</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.gougere.fr/users/bortzmeyer/statuses/116538620624981219</guid><dc:creator><![CDATA[bortzmeyer@mastodon.gougere.fr]]></dc:creator><pubDate>Fri, 08 May 2026 11:03:49 GMT</pubDate></item><item><title><![CDATA[Reply to #LPE — Local Privilege Escalation. on Fri, 08 May 2026 10:52:29 GMT]]></title><description><![CDATA[<p><span><a href="/user/bortzmeyer%40mastodon.gougere.fr">@<span>bortzmeyer</span></a></span> Yes, ultimately an RCE is also an LPE because typically you exploit a networked service that runs as a user process. But let's keep things accessible. When more people understand that from a risk assessment RCE &gt;&gt; LPE, that's already a bit of progress.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.wildeboer.net/users/jwildeboer/statuses/116538576061045626</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.wildeboer.net/users/jwildeboer/statuses/116538576061045626</guid><dc:creator><![CDATA[jwildeboer@social.wildeboer.net]]></dc:creator><pubDate>Fri, 08 May 2026 10:52:29 GMT</pubDate></item><item><title><![CDATA[Reply to #LPE — Local Privilege Escalation. on Fri, 08 May 2026 10:49:48 GMT]]></title><description><![CDATA[<p><span><a href="/user/jwildeboer%40social.wildeboer.net">@<span>jwildeboer</span></a></span> But when you write "need a local user account", many people tend to read that it means "a regular account with a shell". Actually, it can be any daemon process, even unprivileged, with a command injection (see the recent Apache RCE…).</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.gougere.fr/users/bortzmeyer/statuses/116538565518251182</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.gougere.fr/users/bortzmeyer/statuses/116538565518251182</guid><dc:creator><![CDATA[bortzmeyer@mastodon.gougere.fr]]></dc:creator><pubDate>Fri, 08 May 2026 10:49:48 GMT</pubDate></item><item><title><![CDATA[Reply to #LPE — Local Privilege Escalation. on Fri, 08 May 2026 10:43:32 GMT]]></title><description><![CDATA[<p><span><a href="/user/jwildeboer%40social.wildeboer.net">@<span>jwildeboer</span></a></span> Totally, I appreciate your post and meant this as more of a clarification that it's not black and white, and both can apply.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.tinycyber.space/users/jfkimmes/statuses/116538540868835320</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.tinycyber.space/users/jfkimmes/statuses/116538540868835320</guid><dc:creator><![CDATA[jfkimmes@social.tinycyber.space]]></dc:creator><pubDate>Fri, 08 May 2026 10:43:32 GMT</pubDate></item><item><title><![CDATA[Reply to #LPE — Local Privilege Escalation. on Fri, 08 May 2026 10:40:04 GMT]]></title><description><![CDATA[<p><span><a href="https://social.tinycyber.space/@jfkimmes">@<span>jfkimmes</span></a></span> Feel free to read as "a level of access that goes beyond what was intended" or something similar. My point is that many out there fail to mention the current wave is LPE, not RCE and that LPEs have a different risk assessment than RCEs.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.wildeboer.net/users/jwildeboer/statuses/116538527206216236</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.wildeboer.net/users/jwildeboer/statuses/116538527206216236</guid><dc:creator><![CDATA[jwildeboer@social.wildeboer.net]]></dc:creator><pubDate>Fri, 08 May 2026 10:40:04 GMT</pubDate></item><item><title><![CDATA[Reply to #LPE — Local Privilege Escalation. on Fri, 08 May 2026 10:36:09 GMT]]></title><description><![CDATA[<p><span><a href="/user/jwildeboer%40social.wildeboer.net">@<span>jwildeboer</span></a></span> Good distinction to be aware of. Just to clarify, both can apply:</p><p><a href="https://social.tinycyber.space/tags/RCE" rel="tag">#<span>RCE</span></a> must not be privileged. It gives *any* kind of remote capability to run code. Could e.g. be with the highly restricted privileges of the web server process.</p><p>An <a href="https://social.tinycyber.space/tags/LPE" rel="tag">#<span>LPE</span></a> vulnerability like <a href="https://social.tinycyber.space/tags/CopyFail" rel="tag">#<span>CopyFail</span></a> or <a href="https://social.tinycyber.space/tags/DirtyFrag" rel="tag">#<span>DirtyFrag</span></a> could however be chained with such an RCE vulnerability to get full root access to the target.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.tinycyber.space/users/jfkimmes/statuses/116538511829954414</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.tinycyber.space/users/jfkimmes/statuses/116538511829954414</guid><dc:creator><![CDATA[jfkimmes@social.tinycyber.space]]></dc:creator><pubDate>Fri, 08 May 2026 10:36:09 GMT</pubDate></item><item><title><![CDATA[Reply to #LPE — Local Privilege Escalation. on Fri, 08 May 2026 10:20:08 GMT]]></title><description><![CDATA[<p><span><a href="/user/silhouette%40dumbfuckingweb.site">@<span>silhouette</span></a></span> <span><a href="/user/jwildeboer%40social.wildeboer.net">@<span>jwildeboer</span></a></span> </p><p>I was talking about CopyFail, the first one, wasn't the kernel module that had that bug mainly used for handling the encryption in older IPSec implementations?</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/agowa338/statuses/116538448810016404</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/agowa338/statuses/116538448810016404</guid><dc:creator><![CDATA[agowa338@chaos.social]]></dc:creator><pubDate>Fri, 08 May 2026 10:20:08 GMT</pubDate></item><item><title><![CDATA[Reply to #LPE — Local Privilege Escalation. on Fri, 08 May 2026 10:18:29 GMT]]></title><description><![CDATA[<p><span><a href="/user/agowa338%40chaos.social" rel="nofollow noreferrer noopener">@<span>agowa338</span></a></span> <span><a href="/user/jwildeboer%40social.wildeboer.net" rel="nofollow noreferrer noopener">@<span>jwildeboer</span></a></span> dirtyfrag uses the ESP (encapsulating security payload) module that is part of IPSec. Still only exploitable locally.<br /><br />Ofc, exploits can be chained (reverse shell would be an example of getting lesser privilege user rights) but the original post is still correct.</p>]]></description><link>https://board.circlewithadot.net/post/https://dumbfuckingweb.site/users/silhouette/statuses/01KR3HH35JC1W1FEN473SV4SF3</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://dumbfuckingweb.site/users/silhouette/statuses/01KR3HH35JC1W1FEN473SV4SF3</guid><dc:creator><![CDATA[silhouette@dumbfuckingweb.site]]></dc:creator><pubDate>Fri, 08 May 2026 10:18:29 GMT</pubDate></item><item><title><![CDATA[Reply to #LPE — Local Privilege Escalation. on Fri, 08 May 2026 10:12:29 GMT]]></title><description><![CDATA[<p><span><a href="/user/jwildeboer%40social.wildeboer.net">@<span>jwildeboer</span></a></span> </p><p>Do we actually know that CopyFail cannot be exploited remotely for sure though? Isn't it accessible through IPSec or something?</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/agowa338/statuses/116538418724939965</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/agowa338/statuses/116538418724939965</guid><dc:creator><![CDATA[agowa338@chaos.social]]></dc:creator><pubDate>Fri, 08 May 2026 10:12:29 GMT</pubDate></item></channel></rss>