Re: [oss-security] Offset2lib: bypassing full ASLR on 64bit Linux

2014-12-08 Thread Shawn
Hi Agostino,

I don't think this issue impact on Grsecurity/PaX, which
Hardened-Gentoo is using PaX.

On Fri, Dec 5, 2014 at 7:10 PM, Agostino Sarubbo a...@gentoo.org wrote:
 On Gentoo (Hardened) I always get form
 ./get_offset2lib:

 Offset2lib (libc): 0x0


 --
 Agostino Sarubbo
 Gentoo Linux Developer



-- 
GNU powered it...
GPL protect it...
God blessing it...

regards
Shawn


Offset2lib: bypassing full ASLR on 64bit Linux

2014-12-04 Thread Hector Marco

Hi,

This is a disclosure of a weakness of the ASLR Linux implementation.
The problem appears when the executable is PIE compiled and it has an
address leak belonging to the executable. We named this weakness:
offset2lib.

In this scenario, an attacker is able to de-randomize all mmapped
areas (libraries, mapped files, etc.) by knowing only an address
belonging to the application and the offset2lib value.

We have built a PoC which bypasses on a 64 bit Linux system, the three
most widely adopted and effective protection techniques: No-eXecutable
bit (NX), address space layout randomization (ASLR) and stack smashing
protector (SSP). The exploit obtains a remote shell in less than one
second.

We have proposed the ASLRv3 which is a small Linux patch which removes
the offset2lib weakness.

Details of the weakness, steps to exploit the offset2lib weakness, a working
proof of concept exploit, recommendations and a demonstrative video has 
been

publish at: http://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html


Hector Marco.

http://cybersecurity.upv.es