install60.iso
Executable anonymous mapping (mprotect) : Vulnerable
Executable bss (mprotect) : Vulnerable
Executable data (mprotect) : Vulnerable
Executable heap (mprotect) : Vulnerable
Executable shared library bss (mprotect) : Vulnerable
Executable shared library data (mprotect) : Vulnerable
Return to function (strcpy) : paxtest : return address contains a NULL byte.
Return to function (strcpy, PIE) : paxtest : return address contains a NULL byte.
Return to function (memcpy) : Vulnerable
Return to function (memcpy, PIE) : Vulnerable
Uscite Paxtest su alcuni sistemi operativi:
Domanda : perché OpenBSD è vulnerabile? Come possiamo indurirlo?
Aumentare kern.stackgap_random = 262144 in kern.stackgap_random = 16777216 aumenta i "14 bit di qualità" in "20 bit di qualità".
Ma non è riuscito a capire come risolvere le altre parti vulnerabili.
Oppure la domanda dovrebbe andare su security.stackexchange?
UPDATE : after: @Rufo El Magufo
wxallowed era disponibile solo in / usr / local, rimosso:
# grep wxallowed /etc/fstab
# grep wxallowed /etc/fstab-BACKUP
2acbf0d2ff8159d4.h /usr/local ffs rw,wxallowed,nodev 1 2
#
e imposta sysctl (ma imho non è solo per scopi di debug?)
# sysctl kern.wxabort
kern.wxabort=1
# grep kern.wxabort /etc/sysctl.conf
kern.wxabort=1
#
e riavviato, quindi esegue il paxtest:
# ./paxtest blackhat
PaXtest - Copyright(c) 2003-2016 by Peter Busser <[email protected]> and Brad Spengler <[email protected]>
Released under the GNU Public Licence version 2 or later
Writing output to /root/paxtest.log
It may take a while for the tests to complete
Test results:
gcc: no input files
Executable anonymous mapping : Killed
Executable bss : Killed
Executable data : Killed
Executable heap : Killed
Executable stack : Killed
Executable anonymous mapping (mprotect) : Vulnerable
Executable bss (mprotect) : Vulnerable
Executable data (mprotect) : Vulnerable
Executable heap (mprotect) : Vulnerable
Executable shared library bss (mprotect) : Vulnerable
Executable shared library data (mprotect): Vulnerable
Executable stack (mprotect) : Killed
Anonymous mapping randomization test : 33 quality bits (guessed)
Heap randomization test (ET_EXEC) : 38 quality bits (guessed)
Main executable randomization (ET_EXEC) : 25 quality bits (guessed)
Shared library randomization test : 33 quality bits (guessed)
Stack randomization test (SEGMEXEC) : 20 quality bits (guessed)
Stack randomization test (PAGEEXEC) : 20 quality bits (guessed)
Arg/env randomization test (SEGMEXEC) : 20 quality bits (guessed)
Arg/env randomization test (PAGEEXEC) : 20 quality bits (guessed)
Return to function (strcpy) : paxtest: return address contains a NULL byte.
Return to function (strcpy, PIE) : paxtest: return address contains a NULL byte.
Return to function (memcpy) : Vulnerable
Return to function (memcpy, PIE) : Vulnerable
Executable shared library bss : Killed
Executable shared library data : Killed
Writable text segments : Killed
# pwd
/root/paxtest-0.9.15-bsdfix
#
# uname -mrs
OpenBSD 6.0 amd64
#
dice ancora "Vulnerabile", strano.