Fun with NULL pointers, part 2
Fun with NULL pointers, part 2
Posted Jul 22, 2009 3:54 UTC (Wed) by spender (guest, #23067)In reply to: Fun with NULL pointers, part 2 by bartoldeman
Parent article: Fun with NULL pointers, part 2
You are correct though that the real problem is any invalid userland access in general. There are many bugs that have existed and will exist that involve (or can involve) userland in ways that simply preventing mappings within the first 64kb won't stop. For instance, in the exploit I developed today that I linked to in this thread, I don't have to worry about how I'll inject arbitrary code into the kernel -- all I need is to get it to execute my already-existing code in userland (allowing for all the auditing/SELinux/AppArmor/LSM disabling code to be reused easily).
With a one-byte write of of 0 (a value I don't control) to an address my technique allows me to 100% reliably control, on x86 I set the highest byte in a function pointer belonging to a module to 0, turning it into a userland address -- game over.
-Brad
