This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. A typical example is file access. The adversary can leverage a file access race condition by \'running the race\', meaning that they would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the adversary could replace or modify the file, causing the application to behave unexpectedly.
Description
Attack Execution Flow
Step 1
ExploreThe adversary explores to gauge what level of access they have.
L'avversario esplora per valutare quale livello di accesso possiede.
Step 2
ExperimentThe adversary confirms access to a resource on the target host. The adversary confirms ability to modify the targeted resource.
L'avversario conferma l'accesso a una risorsa sull'host di destinazione. L'avversario conferma la capacità di modificare la risorsa mirata.
Step 3
ExploitThe adversary decides to leverage the race condition by 'running the race', meaning that they would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the adversary can replace the resource and cause an escalation of privilege.
L'avversario decide di sfruttare la condizione di race condition "correndo la gara", ovvero modificando la risorsa tra il primo accesso del programma target al file e il momento in cui il programma utilizza effettivamente il file. Durante quel periodo di tempo, l'avversario può sostituire la risorsa e causare un escalation dei privilegi.