{"title":"Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems","authors":"Jinmeng Zhou, Jiayi Hu, Ziyue Pan, Jiaxun Zhu, Guoren Li, Wenbo Shen, Yulei Sui, Zhiyun Qian","doi":"arxiv-2401.17618","DOIUrl":null,"url":null,"abstract":"The widespread deployment of control-flow integrity has propelled non-control\ndata attacks into the mainstream. In the domain of OS kernel exploits, by\ncorrupting critical non-control data, local attackers can directly gain root\naccess or privilege escalation without hijacking the control flow. As a result,\nOS kernels have been restricting the availability of such non-control data.\nThis forces attackers to continue to search for more exploitable non-control\ndata in OS kernels. However, discovering unknown non-control data can be\ndaunting because they are often tied heavily to semantics and lack universal\npatterns. We make two contributions in this paper: (1) discover critical non-control\nobjects in the file subsystem and (2) analyze their exploitability. This work\nrepresents the first study, with minimal domain knowledge, to\nsemi-automatically discover and evaluate exploitable non-control data within\nthe file subsystem of the Linux kernel. Our solution utilizes a custom analysis\nand testing framework that statically and dynamically identifies promising\ncandidate objects. Furthermore, we categorize these discovered objects into\ntypes that are suitable for various exploit strategies, including a novel\nstrategy necessary to overcome the defense that isolates many of these objects.\nThese objects have the advantage of being exploitable without requiring KASLR,\nthus making the exploits simpler and more reliable. We use 18 real-world CVEs\nto evaluate the exploitability of the file system objects using various exploit\nstrategies. We develop 10 end-to-end exploits using a subset of CVEs against\nthe kernel with all state-of-the-art mitigations enabled.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"20 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Operating Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2401.17618","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The widespread deployment of control-flow integrity has propelled non-control
data attacks into the mainstream. In the domain of OS kernel exploits, by
corrupting critical non-control data, local attackers can directly gain root
access or privilege escalation without hijacking the control flow. As a result,
OS kernels have been restricting the availability of such non-control data.
This forces attackers to continue to search for more exploitable non-control
data in OS kernels. However, discovering unknown non-control data can be
daunting because they are often tied heavily to semantics and lack universal
patterns. We make two contributions in this paper: (1) discover critical non-control
objects in the file subsystem and (2) analyze their exploitability. This work
represents the first study, with minimal domain knowledge, to
semi-automatically discover and evaluate exploitable non-control data within
the file subsystem of the Linux kernel. Our solution utilizes a custom analysis
and testing framework that statically and dynamically identifies promising
candidate objects. Furthermore, we categorize these discovered objects into
types that are suitable for various exploit strategies, including a novel
strategy necessary to overcome the defense that isolates many of these objects.
These objects have the advantage of being exploitable without requiring KASLR,
thus making the exploits simpler and more reliable. We use 18 real-world CVEs
to evaluate the exploitability of the file system objects using various exploit
strategies. We develop 10 end-to-end exploits using a subset of CVEs against
the kernel with all state-of-the-art mitigations enabled.