From 728ca03ead8c754cdb8fd3c3408305c2ba577c80 Mon Sep 17 00:00:00 2001 From: agc Date: Fri, 15 Nov 2013 05:11:50 +0000 Subject: Initial import of smaSHeM, version 0.4, into the packages collection. System V shared memory segments created with shmget() are assigned an owner, a group and a set of permissions intended to limit access to the segment to designated processes only. The owner of a shared memory segment can change the ownership and permissions on a segment after its creation using shmctl(). Any subsequent processes that wish to attach to the segment can only do so if they have the appropriate permissions. Once attached, the process can read or write to the segment, as per the permissions that were set when the segment was created. smaSHeM takes advantage of applications that set weak permissions on such segments, allowing an attacker to dump or patch their contents. As discussed in the presentation at 44CON 2013 entitled 'I Miss LSD', in the case of many X11 applications it is possible to extract pixmaps of previously rendered GUI artifacts. When compiled with QtCore linking enabled, smaSHeM aids in that process by brute forcing potentially valid dimensions for the raw pixmap dump. --- security/smaSHeM/DESCR | 17 +++++++++++++++++ security/smaSHeM/Makefile | 17 +++++++++++++++++ security/smaSHeM/PLIST | 6 ++++++ security/smaSHeM/STATUS | 1 + security/smaSHeM/distinfo | 5 +++++ 5 files changed, 46 insertions(+) create mode 100644 security/smaSHeM/DESCR create mode 100644 security/smaSHeM/Makefile create mode 100644 security/smaSHeM/PLIST create mode 100644 security/smaSHeM/STATUS create mode 100644 security/smaSHeM/distinfo (limited to 'security/smaSHeM') diff --git a/security/smaSHeM/DESCR b/security/smaSHeM/DESCR new file mode 100644 index 00000000000..7417baa89d3 --- /dev/null +++ b/security/smaSHeM/DESCR @@ -0,0 +1,17 @@ +System V shared memory segments created with shmget() are assigned an +owner, a group and a set of permissions intended to limit access to +the segment to designated processes only. The owner of a shared +memory segment can change the ownership and permissions on a segment +after its creation using shmctl(). Any subsequent processes that wish +to attach to the segment can only do so if they have the appropriate +permissions. Once attached, the process can read or write to the +segment, as per the permissions that were set when the segment was +created. + +smaSHeM takes advantage of applications that set weak permissions on +such segments, allowing an attacker to dump or patch their contents. +As discussed in the presentation at 44CON 2013 entitled 'I Miss LSD', +in the case of many X11 applications it is possible to extract pixmaps +of previously rendered GUI artifacts. When compiled with QtCore +linking enabled, smaSHeM aids in that process by brute forcing +potentially valid dimensions for the raw pixmap dump. diff --git a/security/smaSHeM/Makefile b/security/smaSHeM/Makefile new file mode 100644 index 00000000000..4b5ceefef42 --- /dev/null +++ b/security/smaSHeM/Makefile @@ -0,0 +1,17 @@ +# $NetBSD: Makefile,v 1.1.1.1 2013/11/15 05:11:50 agc Exp $ + +DISTNAME= smaSHeM-0.4 +CATEGORIES= security +MASTER_SITES= http://labs.portcullis.co.uk/download/ + +MAINTAINER= agc@NetBSD.org +HOMEPAGE= http://labs.portcullis.co.uk/tools/smashem/ +COMMENT= System V shared memory segment manipulator +LICENSE= gnu-gpl-v2 + +GNU_CONFIGURE= yes +USE_LANGUAGES+= c c++ + +AUTO_MKDIRS= yes + +.include "../../mk/bsd.pkg.mk" diff --git a/security/smaSHeM/PLIST b/security/smaSHeM/PLIST new file mode 100644 index 00000000000..0a0d4740cb2 --- /dev/null +++ b/security/smaSHeM/PLIST @@ -0,0 +1,6 @@ +@comment $NetBSD: PLIST,v 1.1.1.1 2013/11/15 05:11:50 agc Exp $ +bin/smaSHeM +man/man1/smaSHeM.1 +share/doc/smashem/COPYING +share/doc/smashem/ChangeLog +share/doc/smashem/INSTALL diff --git a/security/smaSHeM/STATUS b/security/smaSHeM/STATUS new file mode 100644 index 00000000000..c9e90a64147 --- /dev/null +++ b/security/smaSHeM/STATUS @@ -0,0 +1 @@ +Good to go diff --git a/security/smaSHeM/distinfo b/security/smaSHeM/distinfo new file mode 100644 index 00000000000..d55155fc288 --- /dev/null +++ b/security/smaSHeM/distinfo @@ -0,0 +1,5 @@ +$NetBSD: distinfo,v 1.1.1.1 2013/11/15 05:11:50 agc Exp $ + +SHA1 (smaSHeM-0.4.tar.gz) = 2eb22f2db02bd362a350d2d624ac431b1cfadc90 +RMD160 (smaSHeM-0.4.tar.gz) = e968da7aaba5dfdd4050804f88ae08bf840345ab +Size (smaSHeM-0.4.tar.gz) = 215081 bytes -- cgit v1.2.3