首页 > 其他 > 详细

0ctf 2017 kernel pwn knote write up

时间:2017-04-07 23:10:39      阅读:476      评论:0      收藏:0      [点我收藏+]

UAF due to using hlist_add_behind() without checking.

There is a pair locker(mutex_lock) at delete_note(), but isn’t at edit_note_time().

And it doesn’t check the flag before hlist_add_behind() in insert_note().

    for(;;) {
        /* add before a larger epoch */
        iter = hlist_entry(node, struct note_t, next);
        if (iter->epoch > epoch) {
            hlist_add_before(&(note->next), node);
            flag = true;
            break;
        }

        if (node->next == NULL)
            break;

        node = node->next;
    }

    /* at behind the last node */
    // if (!flag)  <-- patch...
	// it can lead to hlist broken.
    hlist_add_behind(&(note->next), node);

Exploitation:

1. UaF 

  First we could free arbitrary object (eg. tty_struct) via any vulnerabilities,
re-allocate fake object with evil functions or rop gadgets.
Finally we can call related function in user mode.

2. kernel info leak

  should use the kzalloc() instead of kmalloc()

0ctf 2017 kernel pwn knote write up

原文:http://www.cnblogs.com/bittorrent/p/6680249.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!