oss-sec mailing list archives
Re: Address Sanitizer local root
From: Darren Martyn <darren.martyn () xiphosresearch co uk>
Date: Thu, 18 Feb 2016 23:19:10 +0000
Hi List, Figured I would add this to the thread to keep it amusing. Here is a fully functioning local root by clobbering /etc/ld.so.preload instead of /etc/shadow (which breaks things spectacularly). I am using a fairly messy "symlink spray"/"symlink carpet bombing" technique. Simply point it at a setuid-root binary compiled with asan and away it goes. Video: https://www.youtube.com/watch?v=jhSIm3auQMk PoC Code: https://gist.github.com/0x27/9ff2c8fb445b6ab9c94e Development/Testing was done on a Debian 8.3 VM that was last updated last week. Now, I wonder - what can actually be done to mitigate against this, besides "don't use ASAN in production"? Is there something that can be done ASAN-side? Because due to how ld.so.preload is parsed so, uh, forgivingly, all the attacker needs to control is one line in the output file. Could it check for symlinks before writing the log? Regards, Darren.
Attachment:
signature.asc
Description: OpenPGP digital signature
Current thread:
- Re: Address Sanitizer local root, (continued)
- Re: Address Sanitizer local root Daniel Micay (Feb 17)
- Re: Address Sanitizer local root Konstantin Serebryany (Feb 17)
- Re: Address Sanitizer local root Daniel Micay (Feb 17)
- Re: Address Sanitizer local root Rich Felker (Feb 19)
- Re: Address Sanitizer local root Daniel Micay (Feb 19)
- Re: Address Sanitizer local root Daniel Micay (Feb 17)
- Re: Address Sanitizer local root Hanno Böck (Feb 18)
- Re: Address Sanitizer local root Balint Reczey (Feb 18)
- Re: Address Sanitizer local root Daniel Micay (Feb 18)
- Re: Address Sanitizer local root Gynvael Coldwind (Feb 18)
- Re: Address Sanitizer local root Robert Święcki (Feb 18)
- Re: Address Sanitizer local root Darren Martyn (Feb 18)
- Re: Re: Address Sanitizer local root Rich Felker (Feb 18)
- Re: Re: Address Sanitizer local root Gynvael Coldwind (Feb 18)