½Ã½ºÅÛ°ü¸®ÀÚÀÇ ½°ÅÍ Ä¿ÇǴнº Ä¿ÇÇÇâÀÌ ³ª´Â *NIX
Ä¿ÇǴнº
½Ã½ºÅÛ/³×Æ®¿÷/º¸¾ÈÀ» ´Ù·ç´Â °÷
 FAQFAQ   °Ë»ö°Ë»ö   ¸â¹ö¸®½ºÆ®¸â¹ö¸®½ºÆ®   »ç¿ëÀÚ ±×·ì»ç¿ëÀÚ ±×·ì   »ç¿ëÀÚ µî·ÏÇϱâ»ç¿ëÀÚ µî·ÏÇϱâ 
 °³ÀÎ Á¤º¸°³ÀÎ Á¤º¸   ºñ°ø°³ ¸Þ½ÃÁö¸¦ È®ÀÎÇÏ·Á¸é ·Î±×ÀÎÇϽʽÿÀºñ°ø°³ ¸Þ½ÃÁö¸¦ È®ÀÎÇÏ·Á¸é ·Î±×ÀÎÇϽʽÿÀ   ·Î±×Àηα×ÀΠ

°¡ÀÔ¾øÀÌ ´©±¸³ª ±ÛÀ» ¾µ ¼ö ÀÖ½À´Ï´Ù. °øÁö»çÇ׿¡ ´ëÇÑ ´ñ±Û±îÁöµµ..




BBS >> ¼³Ä¡, ¿î¿µ Q&A | ³×Æ®¿÷, º¸¾È Q&A | ÀÏ¹Ý Q&A || Á¤º¸¸¶´ç | AWS || ÀÚÀ¯°Ô½ÃÆÇ | ±¸Àα¸Á÷ || °øÁö»çÇ× | ÀǰßÁ¦½Ã
¸ðµç ¸®´ª½º Ä¿³Î¿¡ ¶Ç ´Ù¸¥ º¸¾È °áÇÔ ¹ß°ß

 
±Û ¾²±â   ´äº¯ ´Þ±â    Ä¿ÇǴнº, ½Ã½ºÅÛ ¿£Áö´Ï¾îÀÇ ½°ÅÍ °Ô½ÃÆÇ À妽º -> *NIX / IT Á¤º¸
ÀÌÀü ÁÖÁ¦ º¸±â :: ´ÙÀ½ ÁÖÁ¦ º¸±â  
±Û¾´ÀÌ ¸Þ½ÃÁö
pront40



°¡ÀÔ: 2004³â 8¿ù 18ÀÏ
¿Ã¸° ±Û: 2
À§Ä¡: VVT

¿Ã¸®±â¿Ã·ÁÁü: 2005.1.24 ¿ù, 10:56 am    ÁÖÁ¦: ¸ðµç ¸®´ª½º Ä¿³Î¿¡ ¶Ç ´Ù¸¥ º¸¾È °áÇÔ ¹ß°ß Àοë°ú ÇÔ²² ´äº¯

¾È³çÇϼ¼¿ä
sec-info ¸ÞÀϸµ¸®½ºÆ®¿¡ È«¼®¹ü´ÔÀÌ ¿Ã¸° ±ÛÀÔ´Ï´Ù.

¾Æ·¡ºÎÅÍ ¿ø±ÛÀÔ´Ï´Ù.
------------------------------------------------------
¾È³çÇϽʴϱî? ¿À´Ã°ú³»ÀÏÀÇ È«¼®¹üÀÔ´Ï´Ù.

Áö³­ÁÖ¿¡ uselib() ÇÔ¼ö¿¡¼­ÀÇ º¸¾È Ãë¾à¼ºÀ» ÅëÇØ¼­ ·ÎÄÃÀÇ ÀÏ¹Ý À¯Àú°¡
root ±ÇÇÑÀ» ȹµæÇÒ ¼ö ÀÖ´Â Ãë¾à¼º¿¡ ´ëÇØ ¸ÞÀÏÀ» µå¸° ÀûÀÌ ÀÖ¾ú´Âµ¥,
¸çÄ¥ ÈÄ ´Ù¸¥ Á¾·ùÀÇ ½É°¢ÇÑ Ãë¾à¼ºÀÌ °ø°³µÇ¾ú½À´Ï´Ù.

ÀÌ Ãë¾à¼ºÀº Ä¿³ÎÀÇ page fault handler¿¡¼­ÀÇ race condition ¿¡ ÀÇÇÑ °ÍÀ¸·Î
º» Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ¿© ·ÎÄÃÀÇ ÀÏ¹Ý À¯Àú°¡ root ±ÇÇÑÀ» ½±°Ô ȹµæÇÒ ¼ö ÀÖ½À´Ï´Ù.
ÀÚ¼¼ÇÑ Ãë¾à¼º Á¤º¸´Â ¾Æ·¡¿Í °°½À´Ï´Ù.

* Ãë¾àÇÑ Ä¿³Î
2.4.x ¹öÀü : 2.4.29-rc1 ÀÌÀü ¹öÀü(2.4.28 Æ÷ÇÔ)
2.6.x ¹öÀü : 2.6.10
* Ãë¾àÇÏÁö ¾ÊÀº Ä¿³Î
2.4.x ¹öÀü : 2.4.29-rc2 ¹öÀü ¶Ç´Â 2.4.29
2.6.x ¹öÀü : 1¿ù 12ÀÏ ÀÌÈÄÀÇ -ac³ª -rc ÆÐÄ¡¹öÀü
* Ãë¾àÇÑ ½Ã½ºÅÛ
i386 °è¿­ÀÇ SMP(symmetric multiprocessing) ½Ã½ºÅÛ
Áï, ´ÜÀÏ CPU¸¦ »ç¿ëÇÏ´Â ½Ã½ºÅÛÀº º» Ãë¾à¼º¿¡ ÇØ´çÇÏÁö ¾Ê½À´Ï´Ù.
±×·¯³ª, ´ÜÀÏ CPU¶óµµ hyperthreadingÀÌ Áö¿øµÉ °æ¿ì
º» Ãë¾à¼º¿¡ ÇØ´çÇÕ´Ï´Ù.

* Å×½ºÆ® ÄÚµå

http://packetstormsecurity.nl/0501-exploits/stackgrow.c

À§ Äڵ带 ´Ù¿î·ÎµåÈÄ ÄÄÆÄÀÏÇÏ¿© ½ÇÇàÇϸé Ãë¾àÇÑÁö ¿©ºÎ¸¦ È®ÀÎÇÒ ¼ö ÀÖ½À´Ï´Ù.

## Ãë¾àÇÑ °æ¿ì

$ ./test

[+] in thread 1 (pid = 5791)
[+] in thread 2 (pid = 5792)
[+] rdtsc calibration: 32877
[+] exploiting race, wait...
[+] race won (shift: 572)
[+] kernel might be vulnerable.

## Ãë¾àÇÏÁö ¾ÊÀº °æ¿ì

$ ./test
[+] in thread 1 (pid = 731)
[+] in thread 2 (pid = 732)
[+] rdtsc calibration: 35668
[+] exploiting race, wait...


¾Æ·¡´Â Ä¿³Î 2.4.28ÀÎ SMP ½Ã½ºÅÛ¿¡¼­ ½ÇÁ¦ °ø°ÝÄڵ带 ½ÇÇàÇßÀ» ¶§ÀÇ °á°úÀÔ´Ï´Ù.

$ ./exploit

[+] in thread 1 (pid = 7382)
[+] in thread 2 (pid = 7383)
[+] rdtsc calibration: 32596
[+] exploiting race, wait...
[+] race won (shift: 539)
bash# id
uid=0(root)

¾Æ·¡´Â Ä¿³Î 2.4.29ÀÎ SMP ½Ã½ºÅÛ¿¡¼­ ½ÇÁ¦ °ø°ÝÄڵ带 ½ÇÇàÇßÀ» ¶§ÀÇ °á°úÀÔ´Ï´Ù.

$ ./exploit

[+] in thread 1 (pid = 787)
[+] in thread 2 (pid = 788)
[+] rdtsc calibration: 35626
[+] exploiting race, wait...
[-] unable to exploit race in 30s,
kernel patched or load too high.


* ´ëÀÀ ¹æ¹ý

¾Æ·¡¿Í °°Àº 3°¡Áö ¹æ¹ýÀÌ ÀÖÀ» °Í °°½À´Ï´Ù.

(1) °¡±ÞÀû ÃÖ½ÅÀÇ Ä¿³ÎÀÎ 2.4.29 ³ª 2.6.11-rc-1 µîÀ¸·Î ÆÐÄ¡/¾÷±×·¹À̵å ÇϽʽÿÀ.

(2) ¸¸¾à Ä¿³Î ¾÷±×·¹À̵尡 ¿©ÀÇÄ¡ ¾ÊÀ» °æ¿ì Àӽ÷Π/procÀÇ ÆÛ¹Ì¼ÇÀ» ÀÏ¹Ý À¯Àú°¡
ÀÐÀ» ¼ö ¾øµµ·Ï ¼³Á¤ÇϽʽÿÀ. ÀÌ¿Í °°ÀÌ ¼³Á¤ÇÒ °æ¿ì exploit ½ÇÇàÀ» ¸·À» ¼ö ÀÖ½À´Ï´Ù.
/procÀÇ µð·ºÅ丮¸¦ 700 µîÀ¸·Î ¼³Á¤ÇÏ¸é µË´Ï´Ù.

(3) °ø°Ý Äڵ尡 ½ÇÇà½Ã¿¡´Â root ¼ÒÀ¯ÀÇ suid/sgid ÆÄÀÏÀ» ÇÊ¿ä·Î ÇÕ´Ï´Ù.
µû¶ó¼­ ½Ã½ºÅÛ³» root ¼ÒÀ¯ÀÇ suid/sgid ÆÄÀÏÀÌ ÀÖ´Ù¸é ÀÌ ÆÄÀÏÀÇ sºñÆ®¸¦ Á¦°ÅÇϽʽÿÀ.
suid/sgid´Â find / -type f -perm +6000 -ls ¸¦ ½ÇÇàÇϸé ãÀ» ¼ö ÀÖ½À´Ï´Ù.


º» Ãë¾à¼º¿¡ ´ëÇÑ Á» ´õ ÀÚ¼¼ÇÑ ³»¿ëÀº ¾Æ·¡ÀÇ URL À» Âü°íÇϽñ⠹ٶø´Ï´Ù.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0001




°¨»çÇÕ´Ï´Ù.
_________________
¹è¿ì´Â°ÍÀÌ ³²´Â°ÍÀÔ´Ï´Ù.
À§·Î
»ç¿ëÀÚ Á¤º¸ º¸±â ºñ¹Ð ¸Þ½ÃÁö º¸³»±â MSN ¸Þ½ÅÀú
ÀÌÀü ±Û Ç¥½Ã:   
±Û ¾²±â   ´äº¯ ´Þ±â    Ä¿ÇǴнº, ½Ã½ºÅÛ ¿£Áö´Ï¾îÀÇ ½°ÅÍ °Ô½ÃÆÇ À妽º -> *NIX / IT Á¤º¸ ½Ã°£´ë: GMT + 9 ½Ã°£(Çѱ¹)
ÆäÀÌÁö 1 Áß 1

 
°Ç³Ê¶Ù±â:  
»õ·Î¿î ÁÖÁ¦¸¦ ¿Ã¸± ¼ö ÀÖ½À´Ï´Ù
´ä±ÛÀ» ¿Ã¸± ¼ö ÀÖ½À´Ï´Ù
ÁÖÁ¦¸¦ ¼öÁ¤ÇÒ ¼ö ¾ø½À´Ï´Ù
¿Ã¸° ±ÛÀ» »èÁ¦ÇÒ ¼ö ¾ø½À´Ï´Ù
ÅõÇ¥¸¦ ÇÒ ¼ö ¾ø½À´Ï´Ù


Powered by phpBB © 2001, 2005 phpBB Group