Heap Exploitation
The glibc
library provides functions such as free
and malloc
to help developers manage the heap memory according to their use cases. It is the responsibility of the developer to:
free
any memory he/she has obtained usingmalloc
.- Do not
free
the same memory more than once. - Ensure that memory usage does not go beyond the amount of memory requested, in other terms, prevent heap overflows.
Failing to do makes the software vulnerable to various kinds of attacks. Shellphish, a famous Capture the Flag team from UC Santa Barbara, has done a great job in listing a variety of heap exploitation techniques in how2heap. Attacks described in “The Malloc Maleficarum” by “Phantasmal Phantasmagoria” in an email to the “Bugtraq” mailing list are also described.
A summary of the attacks has been described below:
Attack | Target | Technique |
---|---|---|
First Fit | This is not an attack, it just demonstrates the nature of glibc’s allocator | —- |
Double Free | Making malloc return an already allocated fastchunk |
Disrupt the fastbin by freeing a chunk twice |
Forging chunks | Making malloc return a nearly arbitrary pointer |
Disrupting fastbin link structure |
Unlink Exploit | Getting (nearly)arbitrary write access | Freeing a corrupted chunk and exploiting unlink |
Shrinking Free Chunks | Making malloc return a chunk overlapping with an already allocated chunk |
Corrupting a free chunk by decreasing its size |
House of Spirit | Making malloc return a nearly arbitrary pointer |
Forcing freeing of a crafted fake chunk |
House of Lore | Making malloc return a nearly arbitrary pointer |
Disrupting smallbin link structure |
House of Force | Making malloc return a nearly arbitrary pointer |
Overflowing into top chunk’s header |
House of Einherjar | Making malloc return a nearly arbitrary pointer |
Overflowing a single byte into the next chunk |
当前内容版权归 DhavalKapil 或其关联方所有,如需对内容或内容相关联开源项目进行关注与资助,请访问 DhavalKapil .