- Code: Select all
Anonymous mapping randomisation test : 18 bits (guessed)
Heap randomisation test (ET_EXEC) : 13 bits (guessed)
Heap randomisation test (ET_DYN) : 24 bits (guessed)
Main executable randomisation (ET_EXEC) : 18 bits (guessed)
Main executable randomisation (ET_DYN) : 18 bits (guessed)
Shared library randomisation test : 18 bits (guessed)
Stack randomisation test (SEGMEXEC) : 24 bits (guessed)
Stack randomisation test (PAGEEXEC) : 24 bits (guessed)
Below are the vulnerabilities left I see - Would these also have something to do with not enabling mprotect?
- Code: Select all
Executable anonymous mapping : Vulnerable
Executable bss : Vulnerable
Executable data : Vulnerable
Executable heap : Vulnerable
Executable stack : Vulnerable
Executable shared library bss : Vulnerable
Writable text segments : Vulnerable
Below is the paxtest un-modified - I know about the options that have mprotect so I have no questions regarding those as I know that since I didn't enable mprotect those would be vulnerable.
- Code: Select all
PaXtest - Copyright(c) 2003,2004 by Peter Busser <peter@adamantix.org>
Released under the GNU Public Licence version 2 or later
Writing output to paxtest.log
It may take a while for the tests to complete
Test results:
PaXtest - Copyright(c) 2003,2004 by Peter Busser <peter@adamantix.org>
Released under the GNU Public Licence version 2 or later
Mode: blackhat
Linux botnetgodalphamale 2.6.24.7-botnetgodalphamale-grsec #1 Mon Jun 23 14:13:25 PDT 2008 i686 GNU/Linux
Executable anonymous mapping : Vulnerable
Executable bss : Vulnerable
Executable data : Vulnerable
Executable heap : Vulnerable
Executable stack : Vulnerable
Executable anonymous mapping (mprotect) : Vulnerable
Executable bss (mprotect) : Vulnerable
Executable data (mprotect) : Vulnerable
Executable heap (mprotect) : Vulnerable
Executable shared library bss (mprotect) : Vulnerable
Executable shared library data (mprotect): Vulnerable
Executable stack (mprotect) : Vulnerable
Anonymous mapping randomisation test : 18 bits (guessed)
Heap randomisation test (ET_EXEC) : 13 bits (guessed)
Heap randomisation test (ET_DYN) : 24 bits (guessed)
Main executable randomisation (ET_EXEC) : 18 bits (guessed)
Main executable randomisation (ET_DYN) : 18 bits (guessed)
Shared library randomisation test : 18 bits (guessed)
Stack randomisation test (SEGMEXEC) : 24 bits (guessed)
Stack randomisation test (PAGEEXEC) : 24 bits (guessed)
Return to function (strcpy) : Libsafe version 2.0.16
Detected an attempt to write across stack boundary.
Terminating /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc1.
uid=1000 euid=1000 pid=17397
Call stack:
0xa8f81871 /lib/libsafe.so.2.0.16
0xa8f8197a /lib/libsafe.so.2.0.16
0x8048805 /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc1
0x80489d1 /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc1
0xa8e3704b /lib/libc-2.6.1.so
Overflow caused by strcpy()
Killed
Return to function (strcpy, RANDEXEC) : Libsafe version 2.0.16
Detected an attempt to write across stack boundary.
Terminating /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc1x.
uid=1000 euid=1000 pid=17400
Call stack:
0xa4775871 /lib/libsafe.so.2.0.16
0xa477597a /lib/libsafe.so.2.0.16
0x80489c5 /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc1x
0x8048971 /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc1x
0xa462b04b /lib/libc-2.6.1.so
Overflow caused by strcpy()
Killed
Return to function (memcpy) : Libsafe version 2.0.16
Detected an attempt to write across stack boundary.
Terminating /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc2.
uid=1000 euid=1000 pid=17403
Call stack:
0xae444871 /lib/libsafe.so.2.0.16
0xae444c5d /lib/libsafe.so.2.0.16
0x804876c /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc2
0x8048911 /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc2
0xae2fa04b /lib/libc-2.6.1.so
Overflow caused by memcpy()
Killed
Return to function (memcpy, RANDEXEC) : Libsafe version 2.0.16
Detected an attempt to write across stack boundary.
Terminating /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc2x.
uid=1000 euid=1000 pid=17406
Call stack:
0xb1018871 /lib/libsafe.so.2.0.16
0xb1018c5d /lib/libsafe.so.2.0.16
0x804892c /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc2x
0x80488e1 /home/nowshining/Desktop/paxtest-0.9.7-pre4/rettofunc2x
0xb0ece04b /lib/libc-2.6.1.so
Overflow caused by memcpy()
Killed
Executable shared library bss : Vulnerable
Executable shared library data : Killed
Writable text segments : Vulnerable