maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   General (https://talk.maemo.org/forumdisplay.php?f=7)
-   -   Holy cow, we have been dirty for 9 years (https://talk.maemo.org/showthread.php?t=97919)

eccerr0r 2016-10-23 22:53

Re: Holy cow, we have been dirty for 9 years
 
Well, it looks like kernel 3.10 and later are the "easy to exploit" so it sounds like we might be semi-safe on Maemo. Still worrysome.

I have yet to try this on my android phone, then again I don't use my android phone that much.

In any case you don't need permissions to run the dirty cow exploit, it's just regular code (but it looks like you may need multithreading enabled as well as being able to write to your own address space through /proc.)

In android I wish it were possible to fine grain control all the functions that they say on those "XYZ needs access to ABC"...

Just let them install, but the user gets to control whether XYZ actually gets to use feature ABC.

Even better, return garbage information.

Now that's what I wish could be done.

gerbick 2016-10-24 00:59

Re: Holy cow, we have been dirty for 9 years
 
Malware and exploits on Darwin/OS X, Windows... well, being Windows and now this.

Not a one system is without exploits.

nieldk 2016-10-24 05:35

Re: Holy cow, we have been dirty for 9 years
 
In case you want to experiment, this PoC can help identify if vulnerable.

https://github.com/dirtycow/dirtycow...ter/dirtyc0w.c

ibrakalifa 2016-10-24 07:54

Re: Holy cow, we have been dirty for 9 years
 
9 years? seriously, and some of members talk about security like God himself recently...

kinggo 2016-10-24 08:29

Re: Holy cow, we have been dirty for 9 years
 
hmmmmmm......... so that's why turing phone isn't out yet :D

ste-phan 2016-10-24 09:16

Re: Holy cow, we have been dirty for 9 years
 
Quote:

Originally Posted by eccerr0r (Post 1517259)
Well, it looks like kernel 3.10 and later are the "easy to exploit" so it sounds like we might be semi-safe on Maemo. Still worrysome.

I have yet to try this on my android phone, then again I don't use my android phone that much.

In any case you don't need permissions to run the dirty cow exploit, it's just regular code (but it looks like you may need multithreading enabled as well as being able to write to your own address space through /proc.)

In android I wish it were possible to fine grain control all the functions that they say on those "XYZ needs access to ABC"...

Just let them install, but the user gets to control whether XYZ actually gets to use feature ABC.

Even better, return garbage information.

Now that's what I wish could be done.

About your wish, I once "secured" a Note 2 where I have installed XPrivacy.
It does exactly what you say: let stuff install, pop up with questions after install allowing you to decide for yourself
A.nd to leave things working as they should, it reportedly feed garbage dummy information to the agressor app.

So I get Viber running without address book access.

If I remember correctly, the thing had to be rooted and something called Exposed framework had to be installed. It is not my favorite activity and I hope one day this becomes much easier and straight forward to install.
But once you get Xprivacy running, you feel a big relief, I can tell you that ;)

juiceme 2016-10-24 10:02

Re: Holy cow, we have been dirty for 9 years
 
Quote:

Originally Posted by nieldk (Post 1517272)
In case you want to experiment, this PoC can help identify if vulnerable.

https://github.com/dirtycow/dirtycow...ter/dirtyc0w.c

Thanks.

I just quickly tested it on my main workstation running 4.4.0-36, Jolla sbj1 running 3.4.0 and a fedora cloud image running 4.6.4-301 kernels using the above demo exploit.

On all of those devices the result was as expected, the user process was able to gain root using the leaking CoW.

Same thing applies as always; do not run unknown binaries in your system. Fortunately this is an exploit not easily used remotely.

coderus 2016-10-24 10:26

Re: Holy cow, we have been dirty for 9 years
 
https://github.com/dirtycow/dirtycow...b.io/wiki/PoCs

bandora 2016-10-24 18:39

Re: Holy cow, we have been dirty for 9 years
 
On the other hand maybe it also makes it easier for a person to "root" their Android phones without actually going through the process.. :D:D


All times are GMT. The time now is 15:23.

vBulletin® Version 3.8.8