The adversary targets a race condition occurring when multiple processes access and manipulate the same resource concurrently, and the outcome of the execution depends on the particular order in which the access takes place. The adversary can leverage a race condition by \'running the race\', modifying the resource and modifying the normal execution flow. For instance, a race condition can occur while accessing a file: the adversary can trick the system by replacing the original file with their version and cause the system to read the malicious file.
Description
Attack Execution Flow
Step 1
ExploreThe adversary explores to gauge what level of access they have.
L'avversario esplora per valutare quale livello di accesso possiede.
Step 2
ExperimentThe adversary gains access to a resource on the target host. The adversary modifies the targeted resource. The resource's value is used to determine the next normal execution action.
L'avversario ottiene l'accesso a una risorsa sull'host target. L'avversario modifica la risorsa mirata. Il valore della risorsa viene utilizzato per determinare la successiva azione di esecuzione normale.
Step 3
ExploitThe resource is modified/checked concurrently by multiple processes. By using one of the processes, the adversary is able to modify the value just before it is consumed by a different process. A race condition occurs and is exploited by the adversary to abuse the target host.
La risorsa viene modificata/verificata contemporaneamente da più processi. Utilizzando uno di questi processi, l'attaccante è in grado di modificare il valore proprio prima che venga consumato da un processo diverso. Si verifica una condizione di race condition che viene sfruttata dall'attaccante per abusare dell'host target.