首页> 外文会议>2010 Network and distributed system security symposium >Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation
【24h】

Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation

机译:您今天想去哪里?通过路径名操作提升特权

获取原文
获取原文并翻译 | 示例

摘要

We analyze filename-based privilege escalation attacks, where an attacker creates filesystem links, thereby "tricking" a victim program into opening unintended files. We develop primitives for a POSIX environment, providing assurance that files in "safe directories" (such as /etc/passwd) cannot be opened by looking up a file by an "unsafe pathname " (such as a pathname that resolves through a symbolic link in a world-writable directory). In today's UNIX systems, solutions to this problem are typically built into (some) applications and use application-specific knowledge about (un)safety of certain directories. In contrast, we seek solutions that can be implemented in the filesystem itself (or a library on top of it), thus providing protection to all applications.rnOur solution is built around the concept of pathname manipulators, which are roughly the users that can influence the result of a file lookup operation. For each user, we distinguish unsafe pathnames from safe pathnames according to whether or not the pathname has any manipulators other than that user or root. We propose a safe-open procedure that keeps track of the safety of the current pathname as it resolves it, and that takes extra precautions while opening files with unsafe pathnames. We prove that our solution can prevent a common class of filename-based privilege escalation attacks, and describe our implementation of the safe-open procedure as a library function over the POSIX filesystem interface. We tested our implementation on several UNIX variants to evaluate its implications for systems and applications. Our experiments suggest that this solution can be deployed in a portable way without breaking existing systems, and that it is effective against this class of pathname resolution attacks.
机译:我们分析了基于文件名的特权升级攻击,其中攻击者创建了文件系统链接,从而“诱使”受害程序打开了意想不到的文件。我们为POSIX环境开发了原语,以确保不能通过“不安全路径名”(例如通过符号链接解析的路径名)查找文件来打开“安全目录”中的文件(例如/ etc / passwd)。在世界可写目录中)。在当今的UNIX系统中,通常会在(某些)应用程序中内置针对此问题的解决方案,并使用有关某些目录(不安全)的特定于应用程序的知识。相比之下,我们寻求可以在文件系统本身(或位于其顶部的库)中实现的解决方案,从而为所有应用程序提供保护。rn我们的解决方案基于路径名操纵器的概念构建,而路径名操纵器的概念大致可以影响用户文件查找操作的结果。对于每个用户,我们根据路径名是否具有除该用户或root以外的任何操纵器,将不安全的路径名与安全的路径名区分开。我们提出了一个安全打开过程,该过程在解析当前路径名时会跟踪其安全性,并且在打开使用不安全路径名的文件时要采取额外的预防措施。我们证明了我们的解决方案可以防止常见的基于文件名的特权升级攻击,并且将安全打开过程的实现描述为通过POSIX文件系统接口的库函数。我们在几种UNIX变体上测试了实现,以评估其对系统和应用程序的影响。我们的实验表明,该解决方案可以在不破坏现有系统的情况下以可移植的方式进行部署,并且可以有效地抵抗此类路径名解析攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号