Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2015, Vol. 32 ›› Issue (3): 384-390.DOI: 10.7523/j.issn.2095-6134.2015.03.014

Previous Articles     Next Articles

Automatically exploiting system of kernel privilege escalation vulnerabilities based on imitating attack

LI Xiaoqi, LIU Qixu, ZHANG Yuqing   

  1. National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing 101408, China
  • Received:2014-07-28 Revised:2014-10-13 Online:2015-05-15

Abstract:

This paper focuses on the Linux kernel-level privilege escalation vulnerabilities. Based on vulnerability detection thoughts of imitating attack, we design and develop an automated privilege escalation vulnerabilities exploiting system KernelPET. It reveals the typical process of exploiting privilege escalation vulnerabilities, and provides support to vulnerabilities defense. KernelPET is developed with today's mainstream vulnerability databases: exploit-db, securityfocus, etc. We test nearly one hundred of privilege escalation vulnerabilities by simulated attack, select 30 classic Linux kernel privilege escalation vulnerabilities, and load them into KernelPET exploiting code libraries. The system is tested on different cores and releases of the Linux platform. Experimental results show that KernelPET runs in multi-class releases of Linux system with good results.

Key words: Linux kernel, privilege escalation vulnerabilities, exploits, system security

CLC Number: