earticle

논문검색

Internet

A study on Dirty Pipe Linux vulnerability

초록

영어

In this study, we wanted to examine the new vulnerability ‘Dirty Pipe’ that is founded in Linux kernel. how it’s exploited and what is the limitation, where it’s existed, and overcome techniques and analysis of the Linux kernel package. The study of the method used the hmark[1] program to check the vulnerabilities. Hmark is a whitebox testing tool that helps to analyze the vulnerability based on static whitebox testing and automated verification. For this purpose of our study, we analyzed Linux kernel code that is downloaded from an open-source website. Then by analyzing the hmark tool results, we identified in which file of the kernel it exists, cvss level, statistically depicted vulnerabilities on graph which is easy to understand. Furthermore, we will talk about some software we can use to analyze a vulnerability and how hmark software works. In the case of the Dirty Pipe vulnerability in Linux allows non-privileged users to execute malicious code capable of a host of destructive actions including installing backdoors into the system, injecting code into scripts, altering binaries used by elevated programs, and creating unauthorized user profiles. This bug is being tracked as CVE-2022-0847 and has been termed "Dirty Pipe"[2] since it bears a close resemblance to Dirty Cow[3], and easily exploitable Linux vulnerability from 2016 which granted a bad actor an identical level of privileges and powers.

목차

Abstract
1. Introduction
2. Exploit and Limitation
3. Measurement Tools and Analysis Method
4. Countermeasures and Conclusion
REFERENCES

저자정보

  • Saurav Tanwar Student, Division of Computer Science & Engineering, Sahmyook Univ., Korea
  • Hee Wan Kim Prof., Division of Computer Science & Engineering, Sahmyook Univ., Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 기관로그인 시 무료 이용이 가능합니다.
      ※ 학술발표대회집, 워크숍 자료집 중 4페이지 이내 논문은 '요약'만 제공되는 경우가 있으니, 구매 전에 간행물명, 페이지 수 확인 부탁 드립니다.

      • 4,000원

      0개의 논문이 장바구니에 담겼습니다.