期刊文献+

Linux内核漏洞异步触发模型的安全分析 被引量:2

Security Analysis on Asynchronous Triggering Model of Linux Kernel Vulnerability
下载PDF
导出
摘要 近年来,由于Linux系统中越来越多防御机制(例如NX,ASLR,Canary)的出现,用户态漏洞的利用已经十分困难,而Linux内核漏洞逐渐受到关注。内核内存破坏是一种典型的内核攻击技术,攻击者通过特定的函数调用控制内核内存,进而达到权限提升的目的。SMEP是一种有效抑制内核内存破坏攻击的安全机制,使传统的ret2usr内核攻击方法失效。现有两种绕过SMEP机制的技术途径,分别为ret2dir技术和清除SMEP标志技术,均具有各自的局限性。文中发现了一种绕过SMEP安全机制的异步触发内核漏洞新模型,该模型利用函数的间接寻址原理异步触发漏洞,对于内存破坏的内核漏洞更具有普遍适用性。应用VMware虚拟机测试Ubuntu 16上的netfilter漏洞,并利用内核崩溃分析工具和VMware远程调试工具分析崩溃现场和调试内核,以验证异步触发模型的有效性。实验结果表明,所发现的新模型是一种危害严重的漏洞利用模型。 In recent years, more and more defense mechanisms like NX, ASLR, Canary make it difficult to exploit user vulnerabilities in Linux system. On the contrary, Linux kernel vulnerabilities have been getting attention. Kernel memory corruption is a typical kernel at- tack technique. Attackers can control kernel memory by calling special functions, even privilege escalation. SMEP security is an effective mechanism to suppress kernel memory corruption attacks, making the traditional rel2usr attack useless. Ret2dir and clear SMEP flag are two kinds of technologies to bypass SMEP, however, they both have their limitation. A new model is found to bypass SMEP, which can exploit the kernel vulnerability asynchronously with the principle of indirect addressing, and it is more effective to the kernel vulnerabili- ties of memory corruption. To verify its effectiveness, the netfilter vulnerability of Ubuntu 16 on VMware is tested, then the crash snapshot and debug kernel are analyze with kernel crash and VMware remote debug tools. The experimental results show that it is a serious exploit model.
作者 刘松 秦晓军
出处 《计算机技术与发展》 2017年第11期123-127,共5页 Computer Technology and Development
基金 国家自然科学基金资助项目(91430214)
关键词 Linux内核漏洞 SMEP 间接寻址 异步触发模型 Linux kernel vulnerability SMEP indirect addressing asynchronous triggering model
  • 相关文献

参考文献7

二级参考文献54

  • 1孙晨,雷英杰,路艳丽.最新Linux内核NX实现技术分析[J].现代电子技术,2006,29(4):30-32. 被引量:2
  • 2RubiniA 聊鸿斌译.Linux设备驱动程序[M].北京:中国电力出版社,1999.. 被引量:1
  • 3MatthewN StonesR 杨晓云 王建桥译.Linux程序设计[M].北京:机械工业出版社,2002.. 被引量:2
  • 4毛德操 胡希明.Linux内核源代码情景分析[M].杭州:浙江大学出版社,2002.. 被引量:15
  • 5Eichin M W, Rochlis J A. With Microscope and Tweezers: An Ana-lysis of the Internet Virus of November 1988[C].Proceedings of the 1989 IEEE Computer Society Symposium on Security and Privacy (SSP 89), Oakland California USA: IEEE Computer Society Press, 1989. 326-344. 被引量:1
  • 6CERT/CC. Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service DLL[EB/OL]. http://www.cert.org/advisories/CA-2001-19.html, 2002. 被引量:1
  • 7eEye Digital Security. UPnP--Multiple Remote Windows XP/ME/98 Vulnerabilities[EB/OL]. http://www.eye.com/html/Research/Advisories/AD20011220.html, 2001. 被引量:1
  • 8Aleph One. Smashing the Stack for Fun and Profit[J/OL]. http://www.phrack.org/show.php? p=49&a=14, 1996. 被引量:1
  • 9Jones R W M, Kelly P H J. Backwards-compatible Bounds Checking for Arrays and Pointers in C Programs[C]. Proceedings of the 3rd International Workshop on Automatic Debugging, Linkping Sweden: Linkoping University Electronic Press, 1997. 81-97. 被引量:1
  • 10Dor N, Rodeh M, Sagiv M. CSSV: Towards a Realistic tool for Statically Detecting all Buffer Overflows in C[EB/OL]. http://www.cs.tau.ac.il/~msagiv/cssv.pdf, 2003. 被引量:1

共引文献30

同被引文献13

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部