Cambridge Researcher Breaks OpenBSD Systrace 194
An anonymous reader writes "University of Cambridge researcher Robert Watson has published a paper at the First USENIX Workshop On Offensive Technology in which he describes serious vulnerabilities in OpenBSD's Systrace, Sudo, Sysjail, the TIS GSWTK framework, and CerbNG. The technique is also effective against many commercially available anti-virus systems. His slides include sample exploit code that bypasses access control, virtualization, and intrusion detection in under 20 lines of C code consisting solely of memcpy() and fork(). Sysjail has now withdrawn their software, recommending against any use, and NetBSD has disabled Systrace by default in their upcoming release."
Re:Brace for impact... (Score:1, Interesting)
He also doesn't get upset about problems being found in software, like any sane person, he's more afraid of the problems he's not finding out about.
Re:Why??? (Score:5, Interesting)
Because the fastest way to learn about something is to break it. Why do you think physicists spend all that time and money on particle accelerators?
Re:Article? (Score:1, Interesting)
Or have I just been lucky?
Re:Linux? (Score:4, Interesting)
(It's a straight forward time-of-use vs. time-of-check attack. And we were at least partially aware of it when we wrote GSWTK. The problem is that the original system calls require memory in the processes space, so you can't just copy in the string after you validate it to keep the process from changing it. I wrote some methods for Linux that allocated extra pages in the processes memory space so we could copy in the string, but that just makes the attack harder via obscurity. It doesn't address the fundamental issue at all.)