
Summary
This detection rule is designed to identify the usage of the `personality` syscall with the ADDR_NO_RANDOMIZE flag in Linux systems. The presence of this syscall indicates that Address Space Layout Randomization (ASLR) has been disabled, which is a significant security feature that mitigates memory corruption attacks by randomizing the memory addresses used by a program. By using the flag (0x0040000), attackers may attempt to make their exploits more reliable since ASLR seeks to prevent predictable memory address usage. The rule is particularly valuable as it targets behavior that is often part of exploit development and enables detection for actions that could lead to security breaches. The detection mechanism leverages auditd, a native Linux feature, and can capture any attempt to disable ASLR through specified syscall parameters. This rule can help system administrators identify potential malicious activities or misconfigurations that compromise system security.
Categories
- Linux
- Endpoint
Data Sources
- Process
- Kernel
- Application Log
Created: 2025-05-26