• XSS.stack #1 – первый литературный журнал от юзеров форума

Techniques [OffensiveCon 2023] Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel

weaver

31 c0 bb ea 1b e6 77 66 b8 88 13 50 ff d3
Забанен
Регистрация
19.12.2018
Сообщения
3 301
Решения
11
Реакции
4 622
Депозит
0.0001
Пожалуйста, обратите внимание, что пользователь заблокирован

Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel​

In this work, we will present an exploit for a unique Binder kernel use-after-free (UAF) vulnerability (CVE-2022-20421) which was disclosed recently. Through this vulnerability, we examine the exploitability of a spinlock use-after-free, containing no other memory corruption primitive. We devised an innovative and generic technique for exploiting such limited use-after-free vulnerabilities, assuming a queued spinlock implementation (the default implementation on Android since kernel version 4.19).

Our technique includes constructing a primitive to corrupt a kernel pointer. This corruption is then further developed into a type confusion and eventually, arbitrary kernel read/write, including kASLR bypass and all other relevant mitigations. We successfully demonstrated a robust and stable exploitation on 3 Android devices (Samsung Galaxy S21 Ultra, Samsung Galaxy S22, and Google Pixel 6), assuming code execution from the untrusted_app SELinux context.

writeup

slides

PoC for CVE-2022-20421

video
youtube.com/watch?v=E3CVDOlcHC4&list=PLYvhPWR_XYJmh-qBNKUrlyjQYKBpCDZzB
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх