Re: Mounting a in-ROM filesystem efficiently

From: Kent Borg (kentborg@borg.org)
Date: Tue Dec 18 2001 - 11:27:59 EST


On Tue, Dec 18, 2001 at 09:00:58AM -0500, Richard B. Johnson wrote:
> On Tue, 18 Dec 2001, Helge Hafting wrote:
> > A hacker don't need a /bin/sh or any other onboard software
> > to exploit some security flaw.
[...]
> You apparently don't know what an embedded system does.
> It is a device that uses a processor to perform some
> designed functions. It cannot do something that it
> was not designed to do although it can certainly fail
> to do what it was designed to do.

If it contains a CPU (that is designed to run code) and RAM (that is
designed to store code) and you can trick the CPU in running code you
tricked it into putting in the RAM, then it can do anything it wants
with the other hardware available, anything it is designed to do.

> If you want to break it, it's easier to hit it with a
> hammer or an axe. There is not any capability to "break in".
> Even if there was, what could you do? Shut off a motor?
> Screw up the ignition timing? Put porn pictures into
> medical images?

Or, be a proxy on the inside of J. Random Paranoid Corporate Network
that can relay stuff, snoop, sniff interesting stuff that is being
printed, etc. I mean, how about establishing an http connection out
to a computer controlled by the Bad Guy, and over that he tunnels
whatever he wants? And maybe it gets setup by putting some rogue
Postscript in a file he somehow conspires to be printed.

> Most embedded systems don't have network capabilities.

Certainly if the embedded system has extremely limited IO (Coke
vending machine?) there are limited opportunities for exploiting
things like buffer overflows.

But even Coke machines are starting to get IO: to report inventory and
apparent function to the vending company, some to even allow payment
via a cellphone. Don't think that embedded == isolated, for it is
becoming less and less true.

My cellphone has embedded software in it, it can receive e-mail.
(There was a recent story of a mal formed e-mail message that would
hard-crash some Nokia phones such even a power cycle wouldn't fix it!)

> There is no way that you can teach your Hewlett-Packard
> printer to become a network rogue and break into the
> Pentagon --regardless of what you send it.

Boy, are you ever complacent. Just because HP manages to largely
obscure the details of its internal CPU and RAM doesn't mean it ain't
there and potentially exploitable.

I have a friend who used to be really into desktop publishing,
Illustrator, his font collection, etc. He frequently made the
distinction between a "hardware RIP" and a "software RIP". His point
was actually that the embedded systems were better productized, but I
still corrected him and said they were both software, one was simply
embedded. He never seemed to get the point, and you don't either.

-kb
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Sun Dec 23 2001 - 21:00:16 EST