Am-I-affected-by-Meltdown icon indicating copy to clipboard operation
Am-I-affected-by-Meltdown copied to clipboard

Support systems without /proc/kallsyms and unmounted /boot

Open AllanWegan opened this issue 7 years ago • 3 comments

My box runs a custom-built Gentoo hardened monolithic kernel with most GRSEC protections enabled (so root doesn't see /proc/kallsyms), but no SELinux or other MAC. It also does not have /boot mounted while running (because i have KASLR enabled).

I already know from Intel's list of affected CPU that my Ivybridge i7 exhibits the behaviour, that is exploited by Meltdown. But it would be nice to know, whether exploiting the bug on my system would need a tailored exploit in practice or if a further improved generic exploit could do it.

AllanWegan avatar Jan 06 '18 12:01 AllanWegan

I think we'll need to implement ideas presented here: https://gruss.cc/files/kaiser.pdf

It's said that meltdown can be used to bypass KASLR, and from there, we could figure out some places in kernel which would allows us to check it. Remove the dependency on /proc/kallsyms will be a great achievement for this project

raphaelsc avatar Jan 07 '18 21:01 raphaelsc

Why rely on external information/ bypass KASLR? We could inject a small module which either provides some "strings" to find or it can dump the current address of the syscall table.

Injecting some strings is probably easier than the second idea. I implemented the extraction of the address of the syscall table for a PoC/training rootkit some years ago. Unfortunately the pattern I used to match within the syscall handler is not valid any more. The old code is uploaded here.

bw0x00 avatar Jan 07 '18 22:01 bw0x00

Very good idea @bw0x00. I'll add it to my list of things to do. I could add a run script that will guide the user through it if it finds /proc/kallsyms cannot be used.

raphaelsc avatar Jan 07 '18 22:01 raphaelsc