Hi all,
I'd like to build a C application that I can then exploit to get some confidential information from the kernel memory.
The issue is that I don't really understand where to start... I've found that the use of copy_to_user() without appropriate checks on the return value could lead to this sort of issue, but I don't understand how it can be then exploitable. If you could give me some pointers so I can progress, it would be great.
Edit : What I'd like to have, is a kind of exploit like this : http://inj3ct0r.com/exploits/7837 , where there is X bytes of kernel memory that are finally dumped.
The fact is I don't want any SCTP socket or anything, but "only" the easiest way to recreate this dump of confidential information.
To make a parallel with a buffer overflow, I 'd like to create the file vuln.c which would be using the gets() function, and then build the special string that will do the job... In the case of disclosure, I think that it will be another C file.
I hope this makes sense...
Best.