Article Details
Scrape Timestamp (UTC): 2024-08-07 14:11:48.482
Source: https://thehackernews.com/2024/08/new-linux-kernel-exploit-technique.html
Original Article Text
Click to Toggle View
New Linux Kernel Exploit Technique 'SLUBStick' Discovered by Researchers. Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLUBStick that could be exploited to elevate a limited heap vulnerability to an arbitrary memory read-and-write primitive. "Initially, it exploits a timing side-channel of the allocator to perform a cross-cache attack reliably," a group of academics from the Graz University of Technology said [PDF]. "Concretely, exploiting the side-channel leakage pushes the success rate to above 99% for frequently used generic caches." Memory safety vulnerabilities impacting the Linux kernel have limited capabilities and are a lot more challenging to exploit owing to security features like Supervisor Mode Access Prevention (SMAP), Kernel address space layout randomization (KASLR), and kernel control flow integrity (kCFI). While software cross-cache attacks have been devised as a way to counter kernel hardening strategies like coarse-grained heap separation, studies have shown that existing methods only have a success rate of only 40%. SLUBStick has been demonstrated on versions 5.19 and 6.2 of the Linux kernel using nine security flaws (e.g., double free, use-after-free, and out-of-bounds write) discovered between 2021 and 2023, leading to privilege escalation to root with no authentication and container escapes. The core idea behind the approach is to offer the ability to modify kernel data and obtain an arbitrary memory read-and- write primitive in a manner that reliably surmounts existing defences like KASLR. However for this to work, the threat model assumes the presence of a heap vulnerability in the Linux kernel and that an unprivileged user has code execution capabilities. "SLUBStick exploits more recent systems, including v5.19 and v6.2, for a wide variety of heap vulnerabilities," the researchers said.
Daily Brief Summary
Researchers from the Graz University of Technology have discovered a new Linux kernel exploitation technique named SLUBStick, enhancing the exploitation of heap vulnerabilities.
SLUBStick utilizes a timing side-channel in the heap allocator for cross-cache attacks, achieving over a 99% success rate, significantly higher than previous methods.
The technique targets memory safety vulnerabilities in the Linux kernel, which are typically challenging to exploit due to advanced security features like SMAP, KASLR, and kCFI.
SLUBStick has been tested on Linux kernel versions 5.19 and 6.2 using nine documented security flaws from 2021 to 2023, achieving root privilege escalation and container escapes.
Existing defenses such as KASLR are effectively bypassed using SLUBStick, which allows for arbitrary memory read and write capabilities.
The exploitation method assumes that the operating system has a present heap vulnerability and that the attacker can execute unprivileged code.
This discovery highlights the need for continuous improvement of security measures within Linux environments to guard against advanced exploit techniques.