- Squatting attack
Squatting attack, in
computer science , is a kind of DoS attack where a program interferes with another program through the use of shared synchronization objects in an unwanted or unexpected way. [cite web | last = Zhang | first = Junfeng | title = Private Object Namespace | url = http://blogs.msdn.com/junfeng/archive/2006/04/23/581161.aspx | date = 2006-04-23 | accessdate = 2007-05-15 ]That attack is known in the Windows operating system, which offers named objects as an interprocess synchronization mechanism. With named objects, a process may open a synchronization object as a shared resource by just specifying a name. Subsequent processes may use the same name to open that resource and have a way to synchronize with the first process. The squatting attack is possible because, if the legitimate program does not enforce tight security rules for the resources, processes from arbitrary security contexts may gain access to them and ultimately take control of the system. [cite web | last = Farkas | first = Shawn | title = Whidbey's Security Off Model | url = http://blogs.msdn.com/shawnfa/archive/2005/04/28/412998.aspx | date = 2005-04-28 | accessdate = 2007-05-15 ]
Consider, for example,
antivirus software installed on a Windows machine. The solution has two pieces: [The example serves just as an illustration. Additional components might be required for it to work properly, as e.g. a driver.] a service, which monitors and scans every file when it is opened, and a manual scanner, which scans thefile system when a user requests. Under normal conditions the service should scan the system permanently. However, if a user requests a manual scan, the service must stop temporarily to let the manual scanner work, otherwise every file would be scanned twice: by the manual scanner and by the service. To solve this problem the vendor chooses to implement an event based synchronization mechanism, where the service keeps a named event opened and checks it whenever a file is opened. If the event is "unset" the file is scanned, otherwise it is ignored. The manual scanner, then, to operate, opens the named event, sets it before scanning (disabling the service), scans the file system and resets the event back when finished. This design is prone to a squatting attack because a malicious program can set the named event and disable the service completely.Notes
References
#
#
Wikimedia Foundation. 2010.