期刊文献+

AIX5.3/6.1堆溢出漏洞利用原理分析

AIX5.3/6.1 Heap Exploitation Mechanisms Analysis
下载PDF
导出
摘要 文章通过深入分析Rightmost和Leftmost所利用的AIX5.3/6.1堆溢出漏洞原理,提出了一种新AIX堆溢出漏洞利用机制,通过CDE ToolTalk数据文件解析堆溢出漏洞,对该机制进行了有效性实证,同时从系统内核层面给出弥补漏洞的建议。 This paper puts forward a new AIX heap exploitation mechanism by analyzing the algorithms of rightmost and leftmost function in AIX 5.3/6.1, and demonstrated it by successful exploitation of the CDE ToolTalk vulnerability, which can be triggered by creating a fake database(.rec file) on the system. At the same time, this paper gives an advice on AIX kernel system to make up for exploitation.
作者 劳伟
出处 《信息网络安全》 2012年第5期36-38,91,共4页 Netinfo Security
关键词 AIX 堆溢出漏洞 leftmost函数 rightmost函数 AIX heap exploitation leftmost function rightmost function
  • 相关文献

参考文献6

  • 1David Litchfield.An Introduction to Heap overflows on AIX 5.3L[EB/ OL]. http://www.ouah.org/aix-heap.pdf, 2005-08-25/2012-03-11.
  • 2Tim Shelton.Advanced IBM AIX Heap Exploitation[EB/OL]. https:// media.blackhat.com/bh-us- 10/whitepapers/Shelton/BlackHat-USA- 2010-Shelton-IBM-AIX-Heap-Overflow-Methods-wp.pdf,2010-07 -17/2012-03-11.
  • 3UreaChandolu,GargiSrinivas.AIX中的内存分配机制[EB/OL].http://www.ibm.com/developerworks/cn/aix/library/au-memoryallocation/.2011-02-14/2012-03-11.
  • 4IBM SECURITY ADVISORY.UPDATED- ToolTalk rpc.ttdbserver database parser vulnerability (Doc Number=5147)[EB/OL]. http://www-01.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SE CUR081505_109,2010-07-16/2012-03-11.
  • 5Rodrigo Rubira Branco. IBM AIX, Oracle Sun Solaris, HP HP-UX Remote Vulnerability - CVE-2010-0083[EB/OL].http://seclists.org/ fulldisclosure/2010/Jui/199,2010- 07 - 13/2012- 03-11.
  • 6Rodrigo Rubira Branco. rpc.ttdbserverd x86 Proof Of Concept Exploit[EB/OL]. http://packetstormsecurity.org/files/92793/rpc. ttdbserverd-x86-Proof-Of-Concept-Exploit.html,2010-08-17/2012- 03-11.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部