how2heap 2:fastbin_dup

Posted

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了how2heap 2:fastbin_dup相关的知识,希望对你有一定的参考价值。

how2heap 2:fastbin_dup

该代码阐述了针对fastbin的简单的double-free攻击

示例代码:
#include <stdio.h>
#include <stdlib.h>

int main()
{
    printf("This file demonstrates a simple double-free attack with fastbins.\n");

    printf("Allocating 3 buffers.\n");
    int *a = malloc(8);
    int *b = malloc(8);
    int *c = malloc(8);

    printf("1st malloc(8): %p\n", a);
    printf("2nd malloc(8): %p\n", b);
    printf("3rd malloc(8): %p\n", c);

    printf("Freeing the first one...\n");
    free(a);

    printf("If we free %p again, things will crash because %p is at the top of the free list.\n", a, a);
    // free(a);

    printf("So, instead, we‘ll free %p.\n", b);
    free(b);

    printf("Now, we can free %p again, since it‘s not the head of the free list.\n", a);
    free(a);

    printf("Now the free list has [ %p, %p, %p ]. If we malloc 3 times, we‘ll get %p twice!\n", a, b, a, a);
    printf("1st malloc(8): %p\n", malloc(8));
    printf("2nd malloc(8): %p\n", malloc(8));
    printf("3rd malloc(8): %p\n", malloc(8));
}

运行结果
[email protected] /m/p/H/资/how2heap-master> ./fastbin_dup
This file demonstrates a simple double-free attack with fastbins.
Allocating 3 buffers.
1st malloc(8): 0x11c0010
2nd malloc(8): 0x11c0030
3rd malloc(8): 0x11c0050
Freeing the first one...
If we free 0x11c0010 again, things will crash because 0x11c0010 is at the top of the free list.
So, instead, we‘ll free 0x11c0030.
Now, we can free 0x11c0010 again, since it‘s not the head of the free list.
Now the free list has [ 0x11c0010, 0x11c0030, 0x11c0010 ]. If we malloc 3 times, we‘ll get 0x11c0010 twice!
1st malloc(8): 0x11c0010
2nd malloc(8): 0x11c0030
3rd malloc(8): 0x11c0010
---------------------------

总结

1 不能直接释放fastbin freelist顶端的chunk

以上是关于how2heap 2:fastbin_dup的主要内容,如果未能解决你的问题,请参考以下文章

how2heap 2:fastbin_dup

how2heap学习

how2heap分析系列:2_fastbin_dup

how2heap 源码及输出

how2heap分析系列:1_first_fit

how2heap 1:优先原则