Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems

Jinmeng Zhou, Jiayi Hu, Ziyue Pan, Jiaxun Zhu, Guoren Li, Wenbo Shen, Yulei Sui, Zhiyun Qian
{"title":"Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems","authors":"Jinmeng Zhou, Jiayi Hu, Ziyue Pan, Jiaxun Zhu, Guoren Li, Wenbo Shen, Yulei Sui, Zhiyun Qian","doi":"arxiv-2401.17618","DOIUrl":null,"url":null,"abstract":"The widespread deployment of control-flow integrity has propelled non-control\ndata attacks into the mainstream. In the domain of OS kernel exploits, by\ncorrupting critical non-control data, local attackers can directly gain root\naccess or privilege escalation without hijacking the control flow. As a result,\nOS kernels have been restricting the availability of such non-control data.\nThis forces attackers to continue to search for more exploitable non-control\ndata in OS kernels. However, discovering unknown non-control data can be\ndaunting because they are often tied heavily to semantics and lack universal\npatterns. We make two contributions in this paper: (1) discover critical non-control\nobjects in the file subsystem and (2) analyze their exploitability. This work\nrepresents the first study, with minimal domain knowledge, to\nsemi-automatically discover and evaluate exploitable non-control data within\nthe file subsystem of the Linux kernel. Our solution utilizes a custom analysis\nand testing framework that statically and dynamically identifies promising\ncandidate objects. Furthermore, we categorize these discovered objects into\ntypes that are suitable for various exploit strategies, including a novel\nstrategy necessary to overcome the defense that isolates many of these objects.\nThese objects have the advantage of being exploitable without requiring KASLR,\nthus making the exploits simpler and more reliable. We use 18 real-world CVEs\nto evaluate the exploitability of the file system objects using various exploit\nstrategies. We develop 10 end-to-end exploits using a subset of CVEs against\nthe kernel with all state-of-the-art mitigations enabled.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"20 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Operating Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2401.17618","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The widespread deployment of control-flow integrity has propelled non-control data attacks into the mainstream. In the domain of OS kernel exploits, by corrupting critical non-control data, local attackers can directly gain root access or privilege escalation without hijacking the control flow. As a result, OS kernels have been restricting the availability of such non-control data. This forces attackers to continue to search for more exploitable non-control data in OS kernels. However, discovering unknown non-control data can be daunting because they are often tied heavily to semantics and lack universal patterns. We make two contributions in this paper: (1) discover critical non-control objects in the file subsystem and (2) analyze their exploitability. This work represents the first study, with minimal domain knowledge, to semi-automatically discover and evaluate exploitable non-control data within the file subsystem of the Linux kernel. Our solution utilizes a custom analysis and testing framework that statically and dynamically identifies promising candidate objects. Furthermore, we categorize these discovered objects into types that are suitable for various exploit strategies, including a novel strategy necessary to overcome the defense that isolates many of these objects. These objects have the advantage of being exploitable without requiring KASLR, thus making the exploits simpler and more reliable. We use 18 real-world CVEs to evaluate the exploitability of the file system objects using various exploit strategies. We develop 10 end-to-end exploits using a subset of CVEs against the kernel with all state-of-the-art mitigations enabled.
超越控制:探索用于 Linux 系统数据攻击的新型文件系统对象
控制流完整性的广泛应用推动非控制数据攻击成为主流。在操作系统内核漏洞利用领域,通过破坏关键的非控制数据,本地攻击者可以直接获得root权限或权限升级,而无需劫持控制流。因此,操作系统内核一直在限制此类非控制数据的可用性,这迫使攻击者继续在操作系统内核中寻找更多可利用的非控制数据。然而,发现未知的非控制数据可能会很困难,因为这些数据通常与语义紧密相关,而且缺乏通用模式。我们在本文中有两个贡献:(1) 发现文件子系统中的关键非控制对象;(2) 分析它们的可利用性。这项工作是利用最少的领域知识半自动发现和评估 Linux 内核文件子系统中可利用的非控制数据的首次研究。我们的解决方案利用定制的分析和测试框架,静态和动态地识别有希望的候选对象。此外,我们还将这些发现的对象归类为适合各种利用策略的类型,包括一种新颖的策略,以克服隔离这些对象的防御。我们使用18个真实世界的CVE来评估使用各种利用策略对文件系统对象的可利用性。我们使用 CVE 子集开发了 10 个针对内核的端到端漏洞,并启用了所有最先进的缓解措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信