NCR
February 11th, 2010, 20:18
Hi there!,
I justo want to share this with you:
Interpreter Exploitation: Pointer Inference and JIT Spraying
As remote exploits have dwindled and perimeter defenses have become the standard, remote client-side attacks are the next best choice for an attacker. Modern Windows operating systems have quelled the explosion of client-side vulnerabilities using mitigation techniques such as data execution prevention (DEP) and address space layout randomization (ASLR). This work will illustrate two novel techniques to bypass DEP and ASLR mitigations. These techniques leverage the attack surface exposed by the advanced script interpreters or virtual machines commonly accessible within the browser. The first technique, pointer inference, is used to find the memory address of a string of shellcode within the ActionScript interpreter despite ASLR. The second technique, JIT spraying, is used to write shellcode to executable memory by leveraging predictable behaviors of the ActionScript JIT compiler bypassing DEP. Future research directions and countermeasures for interpreter implementers are discussed.
http://www.semantiscope.com/research/BHDC2010/BHDC-2010-Paper.pdf ("http://www.semantiscope.com/research/BHDC2010/BHDC-2010-Paper.pdf")
http://blog.fortinet.com/jit-spraying-in-pdf/ ("http://blog.fortinet.com/jit-spraying-in-pdf/")
http://reversinglabs.wordpress.com/2010/02/10/debugging-actionscript-jited-code/ ("http://reversinglabs.wordpress.com/2010/02/10/debugging-actionscript-jited-code/")
I justo want to share this with you:
Interpreter Exploitation: Pointer Inference and JIT Spraying
As remote exploits have dwindled and perimeter defenses have become the standard, remote client-side attacks are the next best choice for an attacker. Modern Windows operating systems have quelled the explosion of client-side vulnerabilities using mitigation techniques such as data execution prevention (DEP) and address space layout randomization (ASLR). This work will illustrate two novel techniques to bypass DEP and ASLR mitigations. These techniques leverage the attack surface exposed by the advanced script interpreters or virtual machines commonly accessible within the browser. The first technique, pointer inference, is used to find the memory address of a string of shellcode within the ActionScript interpreter despite ASLR. The second technique, JIT spraying, is used to write shellcode to executable memory by leveraging predictable behaviors of the ActionScript JIT compiler bypassing DEP. Future research directions and countermeasures for interpreter implementers are discussed.
http://www.semantiscope.com/research/BHDC2010/BHDC-2010-Paper.pdf ("http://www.semantiscope.com/research/BHDC2010/BHDC-2010-Paper.pdf")
http://blog.fortinet.com/jit-spraying-in-pdf/ ("http://blog.fortinet.com/jit-spraying-in-pdf/")
http://reversinglabs.wordpress.com/2010/02/10/debugging-actionscript-jited-code/ ("http://reversinglabs.wordpress.com/2010/02/10/debugging-actionscript-jited-code/")