Offset2lib: Bypassing Full ASLR On 64bit Linux

2014-12-05 19:05:03

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+------------------------------------------------------------------------------+
| Packet Storm Advisory 2014-1204-1 |
| http://packetstormsecurity.com/ |
+------------------------------------------------------------------------------+
| Title: Offset2lib: Bypassing Full ASLR On 64bit Linux |
+--------------------+---------------------------------------------------------+
| Release Date | 2014/12/04 |
| Advisory Contact | Packet Storm ([email protected]) |
| Researchers | Hector Marco and Ismael Ripoll |
+--------------------+---------------------------------------------------------+
| System Affected | 64 bit PIE Linux |
| Classification | 1-day |
+--------------------+---------------------------------------------------------+

+----------+
| OVERVIEW |
+----------+

The release of this advisory provides exploitation details in relation
a weakness in the Linux ASLR implementation. The problem appears when
the executable is PIE compiled and it has an address leak belonging to
the executable.

These details were obtained through the Packet Storm Bug Bounty program
and are being released to the community.

+------------------------------------------------------------------------------+

+---------+
| DETAILS |
+---------+

An attacker is able to de-randomize all mmapped areas (libraries, mapped files, etc.)
by knowing only an address belonging to the application and the offset2lib value.

+------------------------------------------------------------------------------+

+------------------+
| PROOF OF CONCEPT |
+------------------+

The proof of concept exploit code is available here:
http://www.exploit-db.com/sploits/35472.tgz
http://packetstormsecurity.com/files/129398

+------------------------------------------------------------------------------+

+---------------+
| RELATED LINKS |
+---------------+

http://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html

+------------------------------------------------------------------------------+


+----------------+
| SHAMELESS PLUG |
+----------------+

The Packet Storm Bug Bounty program gives researchers the ability to profit
from their discoveries. You can get paid thousands of dollars for one day
and zero day exploits. Get involved by contacting us at
[email protected] or visit the bug bounty page at:

http://packetstormsecurity.com/bugbounty/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAlSBA04ACgkQrM7A8W0gTbG0jwCdH5CHOIDO9ELRcrPhQmf5FF4z
TgQAn2zuwadnWdMueC8gUQPT5gCmrQyp
=iegV
-----END PGP SIGNATURE-----

Fixes

No fixes

In order to submit a new fix you need to be registered.