[Info-vax] Malware in kernel mode, was: Re: Android development Was Re: OT: Larry Ellison takes retirement as CEO of Oracle
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Fri Sep 26 08:28:42 EDT 2014
On 2014-09-26 11:00:39 +0000, VAXman- @SendSpamHere.ORG said:
> In article <7f2740f3-f749-4b52-9da2-22f8ad416f62 at googlegroups.com>,
> John Reagan <xyzzy1959 at gmail.com> writes:
>> Now you are talking malware that is VMS-specific, not general-purpose
>> x86 malware (which isn't very common).
>>
>> What privs does Apache normally have on VMS? (I've never looked)
>
> 26-SEP-2014 06:59:42.19 User: APACHE$WWW ...
> Authorized privileges:
> NETMBX TMPMBX
>
> Process privileges:
> NETMBX may create network device
> TMPMBX may create temporary mailbox
Web server attacks are seldom specifically targeting enhanced web
server process privileges — Apache isn't configured and running as root
on any sane Unix platform, either. These attacks generally seek the
ability to execute an attacker's code in the context of the target
server, which can then allow further exploration, exploitation and
(potentially) privilege escalation.
Apache often has enough access to run code (hopefully you've already
reviewed your Unix servers for web-facing bash scripts; but I digress),
and more than a few servers have Apache-writable web server directories
configured. If an attacker can upload or can create a program and then
invoke it on the target server, it's "%SYSTEM-F-GAMEOVER, all your base
are belong to us".
Apache also has enough access to view and variously modify data stored
in web-facing databases, and more than a few folks still don't
parameterize their SQL processing, for instance.
VMS defenses against local stack and heap smashing attacks are
comparatively weak, with no-execute stack and heap available only on
OpenVMS I64 V8.2 and later, and with VMS entirely lacking ASLR and
jails/sandboxes. While neither no-execute nor ASLR nor jails/sandboxes
are particularly reliable defenses, they do make it more likely the
attacker will crash something and the activities then be logged and/or
detected, or that the attacker will require knowledge of several
different vulnerabilities.
Arguably, the Itanium separation of program control and user data and
its associated register-spilling shenanigans are a better defense
against typical sorts of stack smashing than the mixed-usage stack
within the architectures of Alpha and VAX, too.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list