Send Dailydave mailing list submissions to dailydave@lists.immunitysec.com
To subscribe or unsubscribe via the World Wide Web, visit http://lists.immunitysec.com/mailman/listinfo/dailydave or, via email, send a message with subject or body 'help' to dailydave-requ...@lists.immunitysec.com You can reach the person managing the list at dailydave-ow...@lists.immunitysec.com When replying, please edit your Subject line so it is more specific than "Re: Contents of Dailydave digest..." Today's Topics: 1. Re: A change (Rodrigo Rubira Branco (BSDaemon)) 2. Re: A change (Dragos Ruiu) 3. Remote Vulnerability in AIX RPC.cmsd released by iDefense (Rodrigo Rubira Branco (BSDaemon)) 4. ASLR+DEP = no problem. :> (dave) 5. Re: ASLR+DEP = no problem. :> (Thierry Zoller) 6. Re: ASLR+DEP = no problem. :> (Moshe Ben Abu) 7. Re: ASLR+DEP = no problem. :> (Thierry Zoller) 8. Re: ASLR+DEP = no problem. :> (dave) 9. Re: ASLR+DEP = no problem. :> (Matthew Wollenweber) ---------------------------------------------------------------------- Message: 1 Date: Tue, 26 Jan 2010 19:41:52 -0200 From: "Rodrigo Rubira Branco (BSDaemon)" <rodr...@kernelhacking.com> Subject: Re: [Dailydave] A change To: dailydave@lists.immunitysec.com Message-ID: <4b5f61a0.1020...@kernelhacking.com> Content-Type: text/plain; charset=ISO-8859-1 Hey Ben, As usual I believe you made really good points... > Seeing which bugs are exploitable: Using a naive approach, this scales > horribly poorly with money - non-linearly, to put it mildly. (...) but I > don't know of anyone that has a great > result in the area yet - I'd love to be corrected. > Well, I'm also working on that as you know, since we basically are analyzing the same data ;) and the results are really far from be good. So, from the effort I'm also putting on this I hope nobody will correct you ;) > Creating nice, reliable exploits: I'd assert that this is like the > previous point, but even harder. To be honest, it's not really my > thing, so probably one of the people that write exploits for a living > would be better to comment, but from talking to those kind of guys, > it's often a very long road from 'woo we control ebx' to reliable > exploitation, especially against modern OSes and modern software that > has lots of stuff built in to make your life harder. So here you have... With those systems almost every vulnerability is a new, completely different history. The tools are evolving to automate some of the manual work, and as you know we have access to really great tools, but far from be an automation. I strongly doubt reliable exploits are blowing out of fuzzer for the next years, so completely agree it does not scales very well. Even more if you add to that the experience needed from previous vulnerabilities analyzed, ways people used to avoid some limitations, and so far. Many sources, so a learning period noaways are really long. Also, the learning period is increased due to the actual complexity - it's hard to the novice to practice and have fun. > So, while I think that 'simpler' is certainly unassailable, I would > need more than a two word assertion to be convinced that it is 'much' > simpler. If you give one team a million dollars and 100 people > selected at random from the top 10% graduating computer science and > you give the other team their pick of any 4 researchers in the world > and 3 imacs, whom does the smart money think will produce more weapons > grade 0day after 6 months? > I bet it is the group of 4... Even more when I think about the classes I had at university... hehehe, kidding teachers, you where great... Regards, Rodrigo (BSDaemon). ------------------------------ Message: 2 Date: Wed, 27 Jan 2010 23:28:17 -0800 From: Dragos Ruiu <d...@kyx.net> Subject: Re: [Dailydave] A change To: Lurene Grenier <puss...@metasploit.com> Cc: "dailyd...@lists.immunityinc.com" <dailyd...@lists.immunityinc.com> Message-ID: <30d1f67f-ba45-462b-9d81-cdceba5d0...@kyx.net> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes /me points to Jason Shirk's and Dave Weinstein's (from MS's internal tools group) presentation on !exploitable - an open source tool to automate identification of exploitable crashes, which they gave at CanSecWest last year. cheers, --dr On 27-Jan-10, at 7:24 AM, Lurene Grenier wrote: >> I think that while finding 0-days might be 'not terribly difficult', >> selecting and properly weaponising useful 0-days from the masses of >> dreck your fuzzer spits out IS difficult - at least in my experience. >> There was some discussion of the 'too many bugs' problem on this list >> previously and I know several of the other fuzzing guys are currently >> researching the same area. > > I really feel that the "selecting good crashes" problem is not that > hard to overcome if you have a proper bucketing system, and the > ability to do just a bit of auto-triage at crash time. For example, > the fuzzer I use now both separates crashes by what it perceives to be > the base issue at hand, and provides a brief notes file with some > information about the crash and what is controlled. This requires > just a bit of sense in providing fuzzed input, and very little smarts > on the part of the debugger. I really think the next step is > automating that brain-jutsu; much of it is hard to keep in your head, > but not hard to do in code. > > Using this output, it's pretty easy to spend a lazy morning with your > coffee grepping the notes files for the sorts of things you usually > find to be reliably exploitable. From there you can call in your 30 > ninjas and have at. > > Creating reliable exploits is for sure the hardest part, but once > you've done the initial work on a program, the next few exploits in it > are of course more quickly and easily done. > > As for the thought experiment, I think that the benefit of the top > four researchers is that they've trained themselves over a long period > of time (and with passion) to have a very good set of > pattern-recognition tools which they call instincts. They know how to > get crashes, and they know having seen one crash what's likely to find > more. They know how to think about a process to get proper execution, > and they're rewarded by success emotionally which makes the lesson > learned this time around stick for when they need it again. > > I honestly think that there is more pattern recognition > "muscle-memory" type skill involved in RE, bug hunting, and exploit > dev than pure mechanical process, which is why the numbers are so > skewed. It's like taking 4 native speakers of a language (who love to > read!) and 100 students of general linguistics with a zillion dollars. > Who will read a book in the language faster? > > -- > ~ Lurene -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, Canada March 22-26 http://cansecwest.com Amsterdam, Netherlands June 16/17 http://eusecwest.com pgpkey http://dragos.com/ kyxpgp ------------------------------ Message: 3 Date: Tue, 02 Feb 2010 06:51:59 -0200 From: "Rodrigo Rubira Branco (BSDaemon)" <rodr...@kernelhacking.com> Subject: [Dailydave] Remote Vulnerability in AIX RPC.cmsd released by iDefense To: rodr...@risesecurity.org Message-ID: <4b67e7af.9060...@kernelhacking.com> Content-Type: text/plain; charset=ISO-8859-1 Hey guys, Just now I saw that iDefense did not include in their advisory the triggering code for this (http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=825). I believe it's very important to test your systems and verify the released patch. So here we go: http://www.kernelhacking.com/rodrigo/exploits/cmsd_exploit.c Regards, Rodrigo (BSDaemon). -- Rodrigo Rubira Branco (BSDaemon) "Kernel Hacking: If you really know, you can hack!" ------------------------------ Message: 4 Date: Wed, 03 Feb 2010 11:52:34 -0500 From: dave <d...@immunityinc.com> Subject: [Dailydave] ASLR+DEP = no problem. :> To: dailyd...@lists.immunityinc.com Message-ID: <4b69a9d2.6060...@immunityinc.com> Content-Type: text/plain; charset=ISO-8859-1 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Not so long ago, ASLR and DEP were gaining wide acceptance. Execshield was on almost all Linux systems, and the "golden age" of buffer overflow exploitation looked like it was coming to a close. It is true that the code is getting better, and the mitigating protective mechanisms in Windows and Linux are getting better. But like in a ceramic, the physical properties of a system are defined by the interfaces between components, not the crystals themselves. Today, Immunity released a working version of the Aurora exploit for Windows 7 and IE8 today to CANVAS Early Updates. It does this by playing some very odd tricks with Flash's JIT compiler. This technique is extendible to almost all similar vulnerabilities. In other words, ASLR and DEP are not longer the shield they once were. I believe Dionysus Blazakis is going to release some details on a similar technique at BlackHat DC today. If you miss the rest of the talks, I'd recommend popping into that one. :> Thanks, Dave Aitel Immunity, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iEYEARECAAYFAktpqdIACgkQtehAhL0gheotCACfXVRvzHVKxVYWWYQigY7fKPi9 aL0AnjmW40zWTjtwitHJO3Fcv1z9F9QI =l0KE -----END PGP SIGNATURE----- ------------------------------ Message: 5 Date: Thu, 4 Feb 2010 12:14:27 +0100 From: Thierry Zoller <thie...@zoller.lu> Subject: Re: [Dailydave] ASLR+DEP = no problem. :> To: dave <d...@immunityinc.com> Cc: dailyd...@lists.immunityinc.com Message-ID: <212838605.20100204121...@zoller.lu> Content-Type: text/plain; charset=iso-8859-15 Hi, This - >It does this by playing some very odd tricks with >Flash's JIT compiler. + >In other words, ASLR >and DEP are not longer the shield they once were. Doesn't compute. You are relying on oddities, fix the oddities and ASLR/DEP are back again. -- http://blog.zoller.lu Thierry Zoller ------------------------------ Message: 6 Date: Thu, 4 Feb 2010 20:29:39 +0200 From: Moshe Ben Abu <mtran...@gmail.com> Subject: Re: [Dailydave] ASLR+DEP = no problem. :> To: Thierry Zoller <thie...@zoller.lu> Cc: dailyd...@lists.immunityinc.com, dave <d...@immunityinc.com> Message-ID: <184a9c291002041029g42efc41do1f1a237351904...@mail.gmail.com> Content-Type: text/plain; charset="iso-8859-1" Yep, I agree with Thierry, once the technique will be fixed - ASLR+DEP = big problem :( Past examples: - Java Virtual Machine Heap Spray > Java is out of process since 1.6.0u10. - Actionscript Heap Spray > Flash 10 got DEP and ASLR. - .NET User Control binary > Internet Explorer 8 RTM blocks it on Internet Zone. In addition, latest versions of Adobe Reader, QuickTime and .NET Framework got DEP and ASLR enabled too... On Thu, Feb 4, 2010 at 1:14 PM, Thierry Zoller <thie...@zoller.lu> wrote: > Hi, > This - > >It does this by playing some very odd tricks with > >Flash's JIT compiler. > + > >In other words, ASLR > >and DEP are not longer the shield they once were. > Doesn't compute. You are relying on oddities, fix > the oddities and ASLR/DEP are back again. > > -- > http://blog.zoller.lu > Thierry Zoller > > > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com > http://lists.immunitysec.com/mailman/listinfo/dailydave > -- Trancer Recognize-Security http://www.rec-sec.com -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.immunitysec.com/pipermail/dailydave/attachments/20100204/cf3c8c46/attachment-0001.htm ------------------------------ Message: 7 Date: Thu, 4 Feb 2010 20:06:33 +0100 From: Thierry Zoller <thie...@zoller.lu> Subject: Re: [Dailydave] ASLR+DEP = no problem. :> Cc: dailyd...@lists.immunityinc.com, dave <d...@immunityinc.com> Message-ID: <1934474274.20100204200...@zoller.lu> Content-Type: text/plain; charset=iso-8859-15 Hi, >With all respect, you should read the paper before throwing your >unfounded thoughts about something you don't even know about. Why refer to respect when all you write afterwards is full of despise and arrogance ? Your capability to read my mind is still lacking ;) , apparently you thought you know - What I read and what I know. Sorry to inform you that you are wrong on both. >now, after reading the paper let me know if it requires a 'fix' as you >said, or a re-design/engineering and re-implementation of the JIT >itself. ;) Does not compute either. By "fix" I abviously assumed "redesign/eginner" the JIT. The point was that ASLR/DEP is not dead because of error in a JIT. -- http://secdev.zoller.lu Thierry Zoller ------------------------------ Message: 8 Date: Thu, 04 Feb 2010 14:09:46 -0500 From: dave <d...@immunityinc.com> Subject: Re: [Dailydave] ASLR+DEP = no problem. :> To: dailyd...@lists.immunityinc.com Message-ID: <4b6b1b7a.4040...@immunityinc.com> Content-Type: text/plain; charset=ISO-8859-1 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I know I'm annoying Spender by even replying, but this sort of thing is not dependant on Flash. It's simply a function of "Any JIT the attacker can pass data into will break DEP/ASLR". The only "solution" is to have every available JIT have defined entry points that the kernel enforces (which will prevent EIP from going into the middle of a JIT'd function). At that point you basically have "Determina" and you take a performance hit, which is what JIT is supposed to avoid. Or you can turn all non-trusted code JITs off. Then it comes down to "what is trusted?" and "wow, my flash code runs really slow now" and all sorts of other hilarity. You could, as you point out, move things out of the process. But there's a certain value to having things IN the process and not blocked by default. Netflix requires Silverlight which requires .Net which has a dynamic API that supports Eval(). Flash is technically the worst JIT to use for this since you can't use Eval() (or other dynamic techniques) to generate functions at runtime. And it doesn't matter that Reader/Quicktime/.Net have DEP and ASLR enabled. Our Aurora exploit works on Windows 7, and DEP/ASLR was enabled. Nicolas Pouvesle (who lead the team that worked on this here at Immunity) updated our version today to work on 32-bit IE on 64-bit Windows 7 - there's a lot of annoying little issues to work around here. But those issues aren't roadblocks. Any if Flash gets annoying to work with, you can do this with VBScript or any JIT that is in the browser. You can use this on bugs for anything that sits in a process with a JIT - - from Adobe Reader, to Java, to Flash to Word/PPT/XLS. There's lots of ways to break DEP and ASLR. Information leakages are the best way really. But JITs help break DEP/ASLR too. In the end mitigations just buy the leading edge adopters a couple of years until the offensive research teams turn their attention to them. Spender would say all this stuff is obvious, but we're happy to write exploit after exploit to demonstrate it anyways. :> - -dave Moshe Ben Abu wrote: > Yep, I agree with Thierry, once the technique will be fixed - ASLR+DEP = > big problem :( > > Past examples: > - Java Virtual Machine Heap Spray > Java is out of process since 1.6.0u10. > - Actionscript Heap Spray > Flash 10 got DEP and ASLR. > - .NET User Control binary > Internet Explorer 8 RTM blocks it on > Internet Zone. > > In addition, latest versions of Adobe Reader, QuickTime and .NET > Framework got DEP and ASLR enabled too... > > On Thu, Feb 4, 2010 at 1:14 PM, Thierry Zoller <thie...@zoller.lu > <mailto:thie...@zoller.lu>> wrote: > > Hi, > This - > >It does this by playing some very odd tricks with > >Flash's JIT compiler. > + > >In other words, ASLR > >and DEP are not longer the shield they once were. > Doesn't compute. You are relying on oddities, fix > the oddities and ASLR/DEP are back again. > > -- > http://blog.zoller.lu > Thierry Zoller > > > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com <mailto:Dailydave@lists.immunitysec.com> > http://lists.immunitysec.com/mailman/listinfo/dailydave > > > > > -- > Trancer > Recognize-Security > http://www.rec-sec.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iEYEARECAAYFAktrG3kACgkQtehAhL0gheqiewCdEj0/fhGaW1uB/EIDxmrz7PUT 5BAAnRxNyNywGxGevcNZ/FO9ysgQM6JO =/TB8 -----END PGP SIGNATURE----- ------------------------------ Message: 9 Date: Thu, 4 Feb 2010 14:31:35 -0500 From: Matthew Wollenweber <m...@cyberwart.com> Subject: Re: [Dailydave] ASLR+DEP = no problem. :> To: Moshe Ben Abu <mtran...@gmail.com> Cc: dailyd...@lists.immunityinc.com, Thierry Zoller <thie...@zoller.lu>, dave <d...@immunityinc.com> Message-ID: <5fb633321002041131yfcaf597ic910e7f99303b...@mail.gmail.com> Content-Type: text/plain; charset="iso-8859-1" I saw the talk and I'm not sure how exactly you easily fix the problem. The speaker didn't organize the talk optimally and TSA screaming next door didn't help either, however it seems difficult to fix being able to fix shellcode generated by valid actionscript code. Additionally, the JIT spray was fairly small and according to the speaker had a greater than 90% reliability. The most common attack vectors (IMO) appear to be PDFs and IE. Adobe squashing Flash seems unlikely and I can't imagine Flash generically being blocked on any large level (within the next year or until HTML5 is more universal). I still haven't made it through the paper ( http://www.semantiscope.com/research/BHDC2010/BHDC-2010-Slides-v2.pdf) for all the details so my thoughts are only based on believing the speaker (who I don't know), but it was very interesting to me and appears promising. On Thu, Feb 4, 2010 at 1:29 PM, Moshe Ben Abu <mtran...@gmail.com> wrote: > Yep, I agree with Thierry, once the technique will be fixed - ASLR+DEP = > big problem :( > > Past examples: > - Java Virtual Machine Heap Spray > Java is out of process since 1.6.0u10. > - Actionscript Heap Spray > Flash 10 got DEP and ASLR. > - .NET User Control binary > Internet Explorer 8 RTM blocks it on Internet > Zone. > > In addition, latest versions of Adobe Reader, QuickTime and .NET Framework > got DEP and ASLR enabled too... > > On Thu, Feb 4, 2010 at 1:14 PM, Thierry Zoller <thie...@zoller.lu> wrote: > >> Hi, >> This - >> >It does this by playing some very odd tricks with >> >Flash's JIT compiler. >> + >> >In other words, ASLR >> >and DEP are not longer the shield they once were. >> Doesn't compute. You are relying on oddities, fix >> the oddities and ASLR/DEP are back again. >> >> -- >> http://blog.zoller.lu >> Thierry Zoller >> >> >> _______________________________________________ >> Dailydave mailing list >> Dailydave@lists.immunitysec.com >> http://lists.immunitysec.com/mailman/listinfo/dailydave >> > > > > -- > Trancer > Recognize-Security > http://www.rec-sec.com > > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com > http://lists.immunitysec.com/mailman/listinfo/dailydave > > -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.immunitysec.com/pipermail/dailydave/attachments/20100204/ea8615be/attachment.htm ------------------------------ _______________________________________________ Dailydave mailing list Dailydave@lists.immunitysec.com http://lists.immunitysec.com/mailman/listinfo/dailydave End of Dailydave Digest, Vol 55, Issue 1 ****************************************