In this
paper, I introduce the reader to a heap metadata corruption against the latest
version of uClibc. This allocator is used in embedded systems. The unlink
attack on heaps was first introduced by Solar Designer in the year 2000 and was
the first generic heap exploitation technique made public. In the unlink
technique, an attacker corrupts the prev and next pointers of a free chunk. In
a subsequent malloc that recycles this chunk, the chunk is unlinked from its
freelist via pointer manipulations. This inadvertently allows an attack to
craft a write-what-where primitive and write what they want where they want in
memory. This attack is historical, but also exists today in uClibc.
uClibc Unlink Heap Exploitation.PDF
Tuesday, 26 November 2019
Monday, 18 November 2019
AVR LIBC Freelist Poisoning
In this
paper, I introduce the reader to a heap metadata corruption against the latest
version of avr-libc. This allocator is used in embedded systems, Arduino, and
the Internet of Things. In freelist poisoning, an attacker corrupts the chunk
header of a free chunk. This chunk’s next pointer is modified to point to an
arbitrary address. The data before this address is under the control of the
attacker and represents the poisoned chunk size. The allocator, in a subsequent
malloc, will return the poisoned chunk. In conjunction with program application
logic, an arbitrary write may be achievable.
AVR LIBC Freelist Poisoning.PDF
AVR LIBC Freelist Poisoning.PDF
Sunday, 17 November 2019
Diet LIBC Freelist Poisoning
In this
paper, I introduce the reader to a heap metadata corruption against the latest
version of diet libc. This allocator is used in embedded systems. In freelist
poisoning, an attacker corrupts the chunk header of a free chunk. This chunk’s next
pointer is modified to point to an arbitrary address. The allocator, in a
subsequent malloc, will return this arbitrary pointer. In conjunction with program
application logic, an arbitrary write may be achievable.
Diet LIBC Freelist Poisoning.PDF
Diet LIBC Freelist Poisoning.PDF
Subscribe to:
Posts (Atom)
Exploiting the Lorex 2K Indoor Wifi at Pwn2Own Ireland
Introduction In October InfoSect participated in Pwn2Own Ireland 2024 and successfully exploited the Sonos Era 300 smart speaker and Lor...
-
InfoSect has always been committed to fostering diversity and inclusion within the cybersecurity industry, with a special focus on encourag...
-
Summary This is the next part of the C++ memory corruption series*. In this post, we'll look at corrupting the std:string object in L...
-
Syed Faraz Abrar @farazsth98 Summary In this blog post, I will provide some details on how the Chromium developers implemente...