Attacking the kernel via its command line
Attacking the kernel via its command line
Posted Jun 21, 2017 7:36 UTC (Wed) by thestinger (guest, #91827)In reply to: Attacking the kernel via its command line by marcH
Parent article: Attacking the kernel via its command line
The context is the strength of verified boot, which verifies the OS but not persistent state. If an attacker gets root (RCE + LPE) they can modify any persistent state so anything that can be in persistent state (apps, extensions, settings, user media files) is something they can use to persist past a reboot despite verified boot. Since ChromeOS permits unprivileged non OS code, an attacker can persist via that code without a verified boot bypass and then reuse another LPE exploit. If it didn't support extensions and especially the new less well contained Android app support (outside the strong browser renderer sandbox), an attacker couldn't permit code without exploiting verified boot. Alternatively, they could get persistence with something like a persistent media file exploiting something like a thumbnail generation service.
