[13110] in bugtraq
Re: Announcement: Solaris loadable kernel module backdoor
daemon@ATHENA.MIT.EDU (Kragen Sitaker)
Mon Dec 27 18:06:50 1999
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.GSO.4.10.9912271526250.12349-100000@kirk.dnaco.net>
Date: Mon, 27 Dec 1999 15:29:58 -0500
Reply-To: Kragen Sitaker <kragen@POBOX.COM>
From: Kragen Sitaker <kragen@POBOX.COM>
X-To: bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
Ralf-P. Weinmann writes:
> However I'd like to point out that you could add call a routine to
> compute the MD5 or SHA-1 hash of the data copied with copy_from_user()
> in sys_init_module() and reject it if it doesn't match a precomputed
> value (which has to be securely stored somewhere in kernel space for
> each and every module that the is allowed to be loaded).
However I'd like to point out that if modprobe is actually resolving
unresolved symbols in the module before it loads it, the MD5 or SHA-1
won't match, which is the case with Linux, according to a previous post
on this thread.
However I'd like to point out that you wouldn't win anything even if it
worked, without removing the numerous other ways root can subvert the
running kernel --- or, equivalently, all running processes (e.g. with
ptrace).
--
<kragen@pobox.com> Kragen Sitaker <http://www.pobox.com/~kragen/>
The Internet stock bubble didn't burst on 1999-11-08. Hurrah!
<URL:http://www.pobox.com/~kragen/bubble.html>