Fwd: Registration Weakness in Linux Kernel's Binary formats
Jakub Bogusz
qboosh w pld-linux.org
Wto, 3 Paź 2006, 22:20:44 CEST
On Tue, Oct 03, 2006 at 09:39:10PM +0200, Paweł Gołaszewski wrote:
> On Tue, 3 Oct 2006, Paweł Sikora wrote:
> > ---------- Forwarded Message ----------
> >
> > Subject: Registration Weakness in Linux Kernel's Binary formats
> > Date: Tuesday 03 October 2006 21:13
> > From: SHELLCODE Security Research <GoodFellas w shellcode.com.ar>
> > To: undisclosed-recipients:;
> >
> > Hello,
> > The present document aims to demonstrate a design weakness found in the
> > handling of simply
> > linked lists used to register binary formats handled by
> > Linux kernel, and affects all the kernel families
> > (2.0/2.2/2.4/2.6), allowing the insertion of infection modules in
> > kernel space that can be used by malicious users to create infection
> > tools, for example rootkits.
> >
> > POC, details and proposed solution at:
> > English version: http://www.shellcode.com.ar/docz/binfmt-en.pdf
> > Spanish version: http://www.shellcode.com.ar/docz/binfmt-es.pdf
>
> PKP... :-/
Ale o co chodzi? Mając uprawnienia do wczytania modułu i tak można
zrobić z jądrem dużo innych ciekawych rzeczy.
--
Jakub Bogusz http://qboosh.cs.net.pl/
Więcej informacji o liście dyskusyjnej pld-kernel