[Info-vax] How dangerous is it to be able to get into DCL supervisor mode ?

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Wed Jul 5 20:07:23 EDT 2017


On 2017-07-03 14:23:52 +0000, John Reagan said:

> 
> There is no direct way from user-mode to supervisor-mode.  You have to 
> change to kernel or exec mode and then "downgrade" to supervisor.  
> Kernel and exec mode access is controlled by the CMKRNL and CMEXEC 
> privileges and you get into them from the SYS$CMKRNL and SYS$CMEXEC 
> services.  Steve's comment is that once in K,E, or S modes, you have 
> the ability to turn on any privilege you like which will stay enabled 
> even after you return back to user mode.
> 
> Taking out the process with DCL bugs has happened from time to time.  
> You don't get to take out the whole system or access data/files that 
> you don't have access to.  It pretty much is a "you can shoot yourself 
> in the foot, but can't shoot anyone else's feet".

What Simon is referencing may be that path into supervisor mode.    An 
access violation points to a condition in the code that was not 
expected by the developer.   An access violation can sometimes be 
exploited to provide additional access, such as reading or writing to 
otherwise protected memory.   That might expose sensitive data, or it 
might allow the attacker to modify the data or even the code of the 
process.   Attacks on various platforms increasingly involve chaining 
several vulnerabilities together too, which is why there've been 
mentions of ASLR/NX, sandboxes/jails, static and dynamic code coverage 
tools, looking at the programming languages involved, etc.



-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list