ganado / google-security-research

Automatically exported from code.google.com/p/google-security-research
0 stars 0 forks source link

glibc off-by-one NUL byte heap overflow in gconv_translit_find #96

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
See:
https://sourceware.org/bugzilla/show_bug.cgi?id=17187
http://www.openwall.com/lists/oss-security/2014/07/14/1

Original issue reported on code.google.com by cev...@google.com on 21 Aug 2014 at 2:12

GoogleCodeExporter commented 9 years ago
A did some analysis of some of different possibilities that occur with a single 
NUL byte overflow into the glibc malloc metadata. Some well-commented little 
test programs are attached. They all evade the glibc metadata hardening runtime 
checks to either crash at an attacker-controlled address. Or in one case, the 
malloc API is confused, in a way that defeats ASLR, to returning multiple 
pointers to the same actual memory.

At the risk of sounding like a cliche, "the possibilities are endless". I 
didn't go in to detail on the additional code paths available to the attacker, 
such as:
- malloc consolidation
- corrupting in to the "top" chunk
- corrupting in to free chunks that are in states other than "unsorted"

I conclude that this condition is extremely exploitable. The malloc metadata 
hardening is very useful for developers, to highlight corruption early and stop 
the program closer to the root cause. But if an actual attacker has even a 
slight amount of control, the hardening can be easily sidestepped.

Original comment by cev...@google.com on 21 Aug 2014 at 9:28

Attachments:

GoogleCodeExporter commented 9 years ago
geohot set up a wargame for actually exploiting this bug, as a team exercise. 
It was fun. I've lost the reference to the actual wargame server, but 
essentially the server allowed you to send messages to malloc() buffers of 
arbitrary size and content; to free() existing buffers; and to do an off-by-one 
NUL byte write on an existing buffer.

I've attached my well commented solution to geohot's wargame, 
heapfunn_solution.c. It is expressed in terms of raw calls to the malloc() / 
free() API, but could easily be ported to the heapfunn API.

I choose to develop on 64-bit Fedora 20, to show that there's nothing magic 
about the glibc heap protections on 64-bit. We decided to turn off ASLR for the 
challenge, to keep matters tractable for a wargame-sized challenge, so to pop 
your gnome-calculator:

gcc heapfunn_solution.c
setarch x86_64 -R
./a.out

-> gnome-calculator like a boss

Original comment by cev...@google.com on 22 Aug 2014 at 2:20

Attachments:

GoogleCodeExporter commented 9 years ago
Attaching my working local Linux privesc exploit. It works on my install; will 
likely need trivial mods to work on _yours_ :)

Original comment by cev...@google.com on 25 Aug 2014 at 9:54

Attachments:

GoogleCodeExporter commented 9 years ago
Here is a fixed version portable across installs.

Original comment by tav...@google.com on 26 Aug 2014 at 12:58

Attachments:

GoogleCodeExporter commented 9 years ago
Blogged on team blog: 
http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition
.html

Original comment by cev...@google.com on 26 Aug 2014 at 2:00

GoogleCodeExporter commented 9 years ago
This is now fixed.
Sample glibc errata: https://rhn.redhat.com/errata/RHSA-2014-1110.html

Original comment by cev...@google.com on 23 Sep 2014 at 6:25