Notify special task kill using wait* functions
Valdis Kl=?utf-8?Q?=c4=93?=tnieks
valdis.kletnieks at vt.edu
Wed Apr 7 16:38:46 EDT 2021
On Wed, 07 Apr 2021 19:51:51 +0200, John Wood said:
> When brute detects a brute force attack through the fork system call
> (killing p3) it will mark the binary file executed by p3 as "not allowed".
> From now on, any execve that try to run this binary will fail. This way it
> is not necessary to notify nothing to userspace and also we avoid an exec
> brute force attack due to the respawn of processes [2] by a supervisor
> (abused or not by a bad guy).
You're not thinking evil enough. :)
I didn't even finish the line that starts "From now on.." before I started
wondering "How can I abuse this to hang or crash a system?" And it only took
me a few seconds to come up with an attack. All you need to do is find a way to
sigsegv /bin/bash... and that's easy to do by forking, excecve /bin/bash, and
then use ptrace() to screw the child process's stack and cause a sigsegv.
Say goodnight Gracie...
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 832 bytes
Desc: not available
URL: <http://lists.kernelnewbies.org/pipermail/kernelnewbies/attachments/20210407/d67862fb/attachment.sig>
More information about the Kernelnewbies
mailing list