On the Effectiveness of Full-ASLR on 64-bit Linux

نویسندگان

  • Hector Marco-Gisbert
  • Ismael Ripoll
چکیده

Address-Space Layout Randomization (ASLR) is a technique used to thwart attacks which relies on knowing the location of the target code or data. The effectiveness of ASLR hinges on the entirety of the address space layout remaining unknown to the attacker. Only executables compiled as Position Independent Executable (PIE) can obtain the maximum protection from the ASLR technique since all the sections are loaded at random locations. We have identified a security weakness on the implementation of the ASLR in Linux when the executable is PIE compiled, named offset2lib. A PoC attack is described to illustrate how the offset2lib can be exploited. Our attack bypasses the three most widely adopted and effective protection techniques: No-eXecutable bit (NX), address space layout randomization (ASLR) and stack smashing protector (SSP). A remote shell is got in less than one second. Finally, how the RenewSSP technique can be used as a workaround is discussed and how to remove the offset2lib weakness from the current ASLR implementation is also presented.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAIN: Silently Breaking ASLR in the Cloud

Modern systems rely on Address-Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to protect software against memory corruption vulnerabilities. The security of ASLR depends on randomizing regions in memory which can be broken by leaking addresses. While information leaks are common for client applications, server software has been hardened to reduce such information leaks. M...

متن کامل

Exploiting Linux and PaX ASLR’s weaknesses on 32- and 64-bit systems

Address Space Layout Randomization is a very effective mitigation technique. The first implementation was done by the PaX team in 2001, and since then it has been the most advanced and secure. We have analyzed the PaX an Linux implementations, and found several weaknesses. We have carried out a deep review and analysis of all constraints that determine ASLR operation. Based on these results we ...

متن کامل

Poking Holes in Information Hiding

ASLR is no longer a strong defense in itself, but it still serves as a foundation for sophisticated defenses that use randomization for pseudo-isolation. Crucially, these defenses hide sensitive information (such as shadow stacks and safe regions) at a random position in a very large address space. Previous attacks on randomization-based information hiding rely on complicated side channels and/...

متن کامل

A Study of the Evolution of Defences in Linux Software and Vulnerable Register Spilling

In this paper, we did a comprehensive survey on the evolution of defense in Linux softwares. Our survey mainly focused on Stack Canary, CFI and ASLR. In order to measure the coverage of Stack Canary, we collected more than 1 million package data. Besides, we also found that ASLR is an operating system behavior, and CFI was still not widely implemented in production compilers. Beyond the survey,...

متن کامل

Porting to 64-bit GNU/Linux Systems

More and more 64-bit systems are showing up on the market—and developers are porting their applications to these systems. Most code runs directly without problems—but there is a number of sometimes quite subtile problems that developers have to be aware of for portable programming and porting. This paper illustrates some problems on porting an application to 64-bit and also shows how use a 64-b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014