{"title":"超越控制:探索用于 Linux 系统数据攻击的新型文件系统对象","authors":"Jinmeng Zhou, Jiayi Hu, Ziyue Pan, Jiaxun Zhu, Guoren Li, Wenbo Shen, Yulei Sui, Zhiyun Qian","doi":"arxiv-2401.17618","DOIUrl":null,"url":null,"abstract":"The widespread deployment of control-flow integrity has propelled non-control\ndata attacks into the mainstream. In the domain of OS kernel exploits, by\ncorrupting critical non-control data, local attackers can directly gain root\naccess or privilege escalation without hijacking the control flow. As a result,\nOS kernels have been restricting the availability of such non-control data.\nThis forces attackers to continue to search for more exploitable non-control\ndata in OS kernels. However, discovering unknown non-control data can be\ndaunting because they are often tied heavily to semantics and lack universal\npatterns. We make two contributions in this paper: (1) discover critical non-control\nobjects in the file subsystem and (2) analyze their exploitability. This work\nrepresents the first study, with minimal domain knowledge, to\nsemi-automatically discover and evaluate exploitable non-control data within\nthe file subsystem of the Linux kernel. Our solution utilizes a custom analysis\nand testing framework that statically and dynamically identifies promising\ncandidate objects. Furthermore, we categorize these discovered objects into\ntypes that are suitable for various exploit strategies, including a novel\nstrategy necessary to overcome the defense that isolates many of these objects.\nThese objects have the advantage of being exploitable without requiring KASLR,\nthus making the exploits simpler and more reliable. We use 18 real-world CVEs\nto evaluate the exploitability of the file system objects using various exploit\nstrategies. We develop 10 end-to-end exploits using a subset of CVEs against\nthe kernel with all state-of-the-art mitigations enabled.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"20 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems\",\"authors\":\"Jinmeng Zhou, Jiayi Hu, Ziyue Pan, Jiaxun Zhu, Guoren Li, Wenbo Shen, Yulei Sui, Zhiyun Qian\",\"doi\":\"arxiv-2401.17618\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The widespread deployment of control-flow integrity has propelled non-control\\ndata attacks into the mainstream. In the domain of OS kernel exploits, by\\ncorrupting critical non-control data, local attackers can directly gain root\\naccess or privilege escalation without hijacking the control flow. As a result,\\nOS kernels have been restricting the availability of such non-control data.\\nThis forces attackers to continue to search for more exploitable non-control\\ndata in OS kernels. However, discovering unknown non-control data can be\\ndaunting because they are often tied heavily to semantics and lack universal\\npatterns. We make two contributions in this paper: (1) discover critical non-control\\nobjects in the file subsystem and (2) analyze their exploitability. This work\\nrepresents the first study, with minimal domain knowledge, to\\nsemi-automatically discover and evaluate exploitable non-control data within\\nthe file subsystem of the Linux kernel. Our solution utilizes a custom analysis\\nand testing framework that statically and dynamically identifies promising\\ncandidate objects. Furthermore, we categorize these discovered objects into\\ntypes that are suitable for various exploit strategies, including a novel\\nstrategy necessary to overcome the defense that isolates many of these objects.\\nThese objects have the advantage of being exploitable without requiring KASLR,\\nthus making the exploits simpler and more reliable. We use 18 real-world CVEs\\nto evaluate the exploitability of the file system objects using various exploit\\nstrategies. We develop 10 end-to-end exploits using a subset of CVEs against\\nthe kernel with all state-of-the-art mitigations enabled.\",\"PeriodicalId\":501333,\"journal\":{\"name\":\"arXiv - CS - Operating Systems\",\"volume\":\"20 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Operating Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2401.17618\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Operating Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2401.17618","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
控制流完整性的广泛应用推动非控制数据攻击成为主流。在操作系统内核漏洞利用领域,通过破坏关键的非控制数据,本地攻击者可以直接获得root权限或权限升级,而无需劫持控制流。因此,操作系统内核一直在限制此类非控制数据的可用性,这迫使攻击者继续在操作系统内核中寻找更多可利用的非控制数据。然而,发现未知的非控制数据可能会很困难,因为这些数据通常与语义紧密相关,而且缺乏通用模式。我们在本文中有两个贡献:(1) 发现文件子系统中的关键非控制对象;(2) 分析它们的可利用性。这项工作是利用最少的领域知识半自动发现和评估 Linux 内核文件子系统中可利用的非控制数据的首次研究。我们的解决方案利用定制的分析和测试框架,静态和动态地识别有希望的候选对象。此外,我们还将这些发现的对象归类为适合各种利用策略的类型,包括一种新颖的策略,以克服隔离这些对象的防御。我们使用18个真实世界的CVE来评估使用各种利用策略对文件系统对象的可利用性。我们使用 CVE 子集开发了 10 个针对内核的端到端漏洞,并启用了所有最先进的缓解措施。
Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems
The widespread deployment of control-flow integrity has propelled non-control
data attacks into the mainstream. In the domain of OS kernel exploits, by
corrupting critical non-control data, local attackers can directly gain root
access or privilege escalation without hijacking the control flow. As a result,
OS kernels have been restricting the availability of such non-control data.
This forces attackers to continue to search for more exploitable non-control
data in OS kernels. However, discovering unknown non-control data can be
daunting because they are often tied heavily to semantics and lack universal
patterns. We make two contributions in this paper: (1) discover critical non-control
objects in the file subsystem and (2) analyze their exploitability. This work
represents the first study, with minimal domain knowledge, to
semi-automatically discover and evaluate exploitable non-control data within
the file subsystem of the Linux kernel. Our solution utilizes a custom analysis
and testing framework that statically and dynamically identifies promising
candidate objects. Furthermore, we categorize these discovered objects into
types that are suitable for various exploit strategies, including a novel
strategy necessary to overcome the defense that isolates many of these objects.
These objects have the advantage of being exploitable without requiring KASLR,
thus making the exploits simpler and more reliable. We use 18 real-world CVEs
to evaluate the exploitability of the file system objects using various exploit
strategies. We develop 10 end-to-end exploits using a subset of CVEs against
the kernel with all state-of-the-art mitigations enabled.