[35429] in bugtraq

home help back first fref pref prev next nref lref last post

Re: exploiting overflowed kmalloc() memory?

daemon@ATHENA.MIT.EDU (infamous42md@hotpop.com)
Tue Jun 22 18:40:27 2004

Date: Mon, 21 Jun 2004 23:42:06 -0400
From: infamous42md@hotpop.com
To: bugtraq@securityfocus.com
Message-Id: <20040621234206.11404ca6.infamous42md@hotpop.com>
In-Reply-To: <20040618135347.36c3a3f4.infamous41md@hotpop.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

On Fri, 18 Jun 2004 13:53:47 -0400
infamous41md@hotpop.com wrote:

> 
> has anyone done any research on exploiting overflows with memory returned by kmalloc()?  after briefly looking at source, i see that internally it relies on the kmem_cache_alloc() functions.  i didn't see any sort of coalescing as with dlmalloc, so maybe it's not even possible?  anyone have any links/info about this? 
> 

	well i did a bit of research this weekend, here are my results: http://www.1nfamus.netfirms.com/Kmalloc_Internals.html . in short is nearly impossible to exploit in any reliable fashion. the control data is stored at lower addresses than the memory returned by kmalloc(), so you would need an underflow.  and even in that situation, you need some serious luck and need to perform some magic to restore the state u overwrite.

-- 
-sean


home help back first fref pref prev next nref lref last post