office politics
It's all just 1s and 0s
- Messages
- 6,555
- Location
- in the lab
The Invisible Things Lab's blog: Skeletons Hidden in the Linux Closet: r00ting your Linux Desktop for Fun and Profit
Tuesday, August 17, 2010
Skeletons Hidden in the Linux Closet: r00ting your Linux Desktop for Fun and Profit
A couple of months ago, while working on Qubes GUI virtualization, Rafal has come up with an interesting privilege escalation attack on Linux (a user-to-root escalation), that exploits a bug in... well, actually it doesn't exploit any concrete bug, which makes it so much more interesting.
The attack allows a (unpriviliged) user process that has access to the X server (so, any GUI application) to unconditionally escalate to root (but again, it doesn't take advantage of any bug in the X server!). In other words: any GUI application (think e.g. sandboxed PDF viewer), if compromised (e.g. via malicious PDF document) can bypass all the Linux fancy security mechanisms, and escalate to root, and compromise the whole system. The attack allows even to escape from the SELinux's "sandbox -X" jail. To make it worse, the attack has been possible for at least several years, most likely since the introduction of kernel 2.6.