Title: Exploiting Concurrency Vulnerabilities in System Call Wrappers Author: Robert N. M. Watson Presentation: First presented at the WOOT07 First USENIX Workshop on Offensive Technologies Abstract: - System call interposition enables extending the kernel security model. - Current operating systems are vulnerable to concurrency vulnerabilities in system call wrappers. - These vulnerabilities can lead to privilege escalation and audit bypass. - Discusses theory and practice of exploiting these vulnerabilities. - Demonstrates exploit techniques against GSWTK, Systrace, and CerbNG. Links: - WOOT07 Workshop Paper - WOOT07 Workshop Presentation (With exploit toolkit notes and sample code) - Light Blue Touchpaper blog article on the paper and WOOT07