| 注册
首页|期刊导航|计算机技术与发展|Linux内核漏洞异步触发模型的安全分析

Linux内核漏洞异步触发模型的安全分析

刘松 秦晓军

计算机技术与发展2017,Vol.27Issue(11):123-127,5.
计算机技术与发展2017,Vol.27Issue(11):123-127,5.DOI:10.3969/j.issn.1673-629X.2017.11.027

Linux内核漏洞异步触发模型的安全分析

Security Analysis on Asynchronous Triggering Model of Linux Kernel Vulnerability

刘松 1秦晓军1

作者信息

  • 1. 江南计算技术研究所,江苏 无锡 214083
  • 折叠

摘要

Abstract

In recent years,more and more defense mechanisms like NX,ASLR,Canary make it difficult to exploit user vulnerabilities in Linux system. On the contrary,Linux kernel vulnerabilities have been getting attention. Kernel memory corruption is a typical kernel at-tack technique. Attackers can control kernel memory by calling special functions,even privilege escalation. SMEP security is an effective mechanism to suppress kernel memory corruption attacks,making the traditional ret2usr attack useless. Ret2dir and clear SMEP flag are two kinds of technologies to bypass SMEP,however,they both have their limitation. A new model is found to bypass SMEP,which can exploit the kernel vulnerability asynchronously with the principle of indirect addressing,and it is more effective to the kernel vulnerabili-ties of memory corruption. To verify its effectiveness,the netfilter vulnerability of Ubuntu 16 on VMware is tested,then the crash snapshot and debug kernel are analyze with kernel crash and VMware remote debug tools. The experimental results show that it is a serious exploit model.

关键词

Linux内核漏洞/SMEP/间接寻址/异步触发模型

Key words

Linux kernel vulnerability/SMEP/indirect addressing/asynchronous triggering model

分类

信息技术与安全科学

引用本文复制引用

刘松,秦晓军..Linux内核漏洞异步触发模型的安全分析[J].计算机技术与发展,2017,27(11):123-127,5.

基金项目

国家自然科学基金资助项目(91430214) (91430214)

计算机技术与发展

OACSTPCD

1673-629X

访问量0
|
下载量0
段落导航相关论文