[OFF-TOPIC] Re: [LUG.ro] Fw: Linux kernel mremap vulnerability

Federico Wiecko lugro@lugro.org.ar
Tue, 06 Jan 2004 16:21:43 -0300


Algo que no llego a entender es porque si habiendo compiladores y
tambien patchs para gcc (ej: stackguard, memguard) para impedir en la
mayoría de los casos que se produzcan ataques por buffer overflow porque
todavía sigue siendo uno de los ataques mas comunes. El compilador gcc y
el kernel van de la mano, me extraña que no hayan hecho algo.

Las soluciones que lei se basan en detectar alteraciones en el return
code de la funcion, o directamente no permitirla en absoluto. Segun
dicen esto genera un overhead de un 6/7% ... muy caro tal vez para el
kernel?, pero no en para aplicaciones comunes en general. Otras
soluciones se basan en impedir ejecutar codigo binario en esa zona del
stack (entre el almacenamiento de variables locales y el return code).

Si alguien tiene mas info. para aportar, bienvenida. 

Salu2,
           Federico :-

El mar, 06-01-2004 a las 07:06, Pablo escribió:
> 2 grandes agujeros en poco tiempo...mmmh
> Sera hora de "tirar" el 2.4 y pasarse al 2.6 ?!
> 
>                                 Saludos. Pablo.
> 
> ----- Original Message -----
> From: "Paul Starzetz" <ihaquer@isec.pl>
> Sent: Monday, January 05, 2004 9:30 AM
> Subject: Linux kernel mremap vulnerability
> 
> 
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> >
> > Synopsis:  Linux kernel do_mremap local privilege escalation vulnerability
> > Product:   Linux kernel
> > Version:   2.2, 2.4 and 2.6 series
> > Vendor:    http://www.kernel.org/
> > URL:       http://isec.pl/vulnerabilities/isec-0012-mremap.txt
> > CVE:       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0985
> > Author:    Paul Starzetz <ihaquer@isec.pl>, Wojciech Purczynski
> >            <cliph@isec.pl>
> > Date:      January 5, 2004
> >
> >
> > Issue:
> > ======
> >
> > A critical security vulnerability has been found  in  the  Linux  kernel
> > memory  management  code in mremap(2) system call due to incorrect bound
> > checks.
> >
> >
> > Details:
> > ========
> >
> > The mremap system call provides functionality of resizing (shrinking  or
> > growing)  as well as moving across process's addressable space of exist­
> > ing virtual memory areas (VMAs) or any of its parts.
> >
> > A typical VMA covers at least one memory page (which is exactly  4kB  on
> > the  i386  architecture). An incorrect bound check discovered inside the
> > do_mremap() kernel code performing remapping of a  virtual  memory  area
> > may lead to creation of a virtual memory area of 0 bytes length.
> >
> > The  problem  bases on the general mremap flaw that remapping of 2 pages
> > from inside a VMA creates a memory hole of only one page in  length  but
> > an  additional  VMA  of two pages. In the case of a zero sized remapping
> > request no VMA hole is created but an additional  VMA  descriptor  of  0
> > bytes in length is created.
> >
> > Such  a malicious virtual memory area may disrupt the operation of other
> > parts of the kernel memory management subroutines finally leading to un­
> > expected behavior.
> >
> > A  typical  process's  memory  layout  showing  invalid VMA created with
> > mremap system call:
> >
> >     08048000-0804c000 r-xp 00000000 03:05 959142     /tmp/test
> >     0804c000-0804d000 rw-p 00003000 03:05 959142     /tmp/test
> >     0804d000-0804e000 rwxp 00000000 00:00 0
> >     40000000-40014000 r-xp 00000000 03:05 1544523    /lib/ld-2.3.2.so
> >     40014000-40015000 rw-p 00013000 03:05 1544523    /lib/ld-2.3.2.so
> >     40015000-40016000 rw-p 00000000 00:00 0
> >     4002c000-40158000 r-xp 00000000 03:05 1544529    /lib/libc.so.6
> >     40158000-4015d000 rw-p 0012b000 03:05 1544529    /lib/libc.so.6
> >     4015d000-4015f000 rw-p 00000000 00:00 0
> > [*] 60000000-60000000 rwxp 00000000 00:00 0
> >     bfffe000-c0000000 rwxp fffff000 00:00 0
> >
> > The broken VMA in the above example has been marked with a [*].
> >
> >
> > Impact:
> > =======
> >
> > Since  no  special  privileges  are required to use the mremap(2) system
> > call any process may misuse its unexpected behavior to disrupt the  ker­
> > nel memory management subsystem. Proper exploitation of this vulnerabil­
> > ity may lead to local privilege escalation including execution of  arbi­
> > trary  code  with kernel level access. Proof-of-concept exploit code has
> > been created and successfully tested giving UID 0  shell  on  vulnerable
> > systems.
> >
> > The exploitability of the discovered vulnerability is possible, although
> > not a trivial one. We have identified at least two different attack vec­
> > tors  for  the  2.4 kernel series. All users are encouraged to patch all
> > vulnerable systems as soon as appropriate vendor patches are released.
> >
> >
> > Credits:
> > ========
> >
> > Paul Starzetz <ihaquer@isec.pl> has  identified  the  vulnerability  and
> > performed  further  research. COPYING, DISTRIBUTION, AND MODIFICATION OF
> > INFORMATION PRESENTED HERE IS ALLOWED ONLY WITH  EXPRESS  PERMISSION  OF
> > ONE OF THE AUTHORS.
> >
> >
> > Disclaimer:
> > ===========
> >
> > This  document and all the information it contains are provided "as is",
> > for educational purposes only, without warranty of any kind, whether ex­
> > press or implied.
> >
> > The  authors reserve the right not to be responsible for the topicality,
> > correctness, completeness or quality of  the  information   provided  in
> > this  document.  Liability  claims regarding damage caused by the use of
> > any information provided, including any kind of information which is in­
> > complete or incorrect, will therefore be rejected.
> >
> > - --
> > Paul Starzetz
> > iSEC Security Research
> > http://isec.pl/
> >
> > -----BEGIN PGP SIGNATURE-----
> > Version: GnuPG v1.0.7 (GNU/Linux)
> >
> > iD8DBQE/+Vj2C+8U3Z5wpu4RApegAKCOkWCWg8Jy/y9S1WtEWxerkkQNbQCgk/X9
> > 8aGjOA7fTT8EynIFw/sgoHU=
> > =Aw61
> > -----END PGP SIGNATURE-----
> >
> >
> 
> _______________________________________________
> Lugro mailing list
> Lugro@lugro.org.ar
> http://www.lugro.org.ar/mailman/listinfo/lugro
>