On Thu, 3 Mar 2005, Adrian Phillips wrote:

> >>>>> "Jim" == Jim Carter <[EMAIL PROTECTED]> writes:
> 
>     Jim> If a very sharp hacker "gets root" on the UML guest, he can...

>     Jim> chroot jail, he can import statically linked tools (using
>     Jim> ports that have to be open for the guest's mission) and
>     Jim> perpetrate the same 'sploit against the host.  The jail makes
>     Jim> this harder but not impossible.
> 
> Okay, this lost me. "import statically linked tools (using ports ...)"
> - what does this mean ? A cracker can run arbitary code as the uml
> user running the uml (inside the chroot). Are you then suggesting he
> could use exploitable daemons running on the host to obtain additional
> "tools" within the chroot ?

No, the tools come first, and then the attack on vulnerable daemons or, 
more likely, the kernel itself.  Generally the hacker puts together one or 
more little programs that perform the exploit, and imports them to the 
victim host.  In the case of a virus, the "tools" are often included in the 
payload, but a number of viruses download additional software from the 
mother ship or from another infected host, keeping the payload small and 
less likely to be spotted.  

If the guy knows how to make life easy for himself, he can use the UML to 
do the TCP/IP transport and store his materials, only influencing the host 
itself when he's ready.  And then the tools wouldn't have to be statically 
linked; he would use the libraries in the UML.

For kernel vulnerabilities, I'm thinking of the MTRR problems from August 
or September 2004.  But there are plenty of patch reports for daemon 
vulnerabilities that are accessible only to local users, i.e. the UML 
special user.  If the user has to open a local UNIX-domain socket, that 
would not be visible in the chroot jail, but if it's a port listened to 
only locally, chroot doesn't affect ports.  Zot.


James F. Carter          Voice 310 825 2897    FAX 310 206 6673
UCLA-Mathnet;  6115 MSA; 405 Hilgard Ave.; Los Angeles, CA, USA  90095-1555
Email: [EMAIL PROTECTED]    http://www.math.ucla.edu/~jimc (q.v. for PGP key)


-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
User-mode-linux-user mailing list
User-mode-linux-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user

Reply via email to