Exploit Methods/Text overwrite
		
		
		
		
		
		Jump to navigation
		Jump to search
		
		
	
Details
If an attacker has a write primitive and knows where the kernel is located in memory, they could overwrite functions to do whatever they wanted. Protecting against this is the most basic of kernel memory protections: make sure the kernel is read-only.
Examples
- patch setuid to always succeed
 - overwrite vDSO
 
Mitigations
- Do not leave executable memory also writable