
Rule Info
Name
Disable ASLR Via Personality Syscall - Linux
Author
Milad Cheraghi
Description
Detects the use of the `personality` syscall with the ADDR_NO_RANDOMIZE flag (0x0040000),
which disables Address Space Layout Randomization (ASLR) in Linux. This is often used by attackers
exploit development, or to bypass memory protection mechanisms.
A successful use of this flag can reduce the effectiveness of ASLR and make memory corruption
attacks more reliable.
Date
2025-05-26 00:00:00
Modified
2025-06-05 00:00:00
Id
e497a24e-9345-4a62-9803-b06d7d7cb132
Tags
attack.defense-evasion attack.t1562.001 attack.t1055.009
Type
Community Rule
Link to Public Repo
Rule History
Author
Title
Date
Commit
Milad Cheraghi
Merge PR #5435 from @CheraghiMilad - Disable ASLR Via Personality Syscall - Linux
2025-05-28