0ctf 2017 kernel pwn knote write up

UAF due to using hlist_add_behind() without checking.

There is a pair locker(mutex_lock) at delete_note(), but isn’t at edit_note_time().

And it doesn’t check the flag before hlist_add_behind() in insert_note().

    for(;;) {
        /* add before a larger epoch */
        iter = hlist_entry(node, struct note_t, next);
        if (iter->epoch > epoch) {
            hlist_add_before(&(note->next), node);
            flag = true;
            break;
        }

        if (node->next == NULL)
            break;

        node = node->next;
    }

    /* at behind the last node */
    // if (!flag)  <-- patch...
	// it can lead to hlist broken.
    hlist_add_behind(&(note->next), node);

Exploitation:

1. UaF 

  First we could free arbitrary object (eg. tty_struct) via any vulnerabilities,
re-allocate fake object with evil functions or rop gadgets.
Finally we can call related function in user mode.

2. kernel info leak

  should use the kzalloc() instead of kmalloc()

转载于:https://www.cnblogs.com/bittorrent/p/6680249.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值