Offset2lib – Bypassing Full ASLR On 64 bit Linux

  • 作者: Packet Storm
    日期: 2014-12-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/35472/
  • -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    +------------------------------------------------------------------------------+
    | Packet Storm Advisory 2014-1204-1|
    | http://packetstormsecurity.com/|
    +------------------------------------------------------------------------------+
    | Title: Offset2lib: Bypassing Full ASLR On 64bit Linux|
    +--------------------+---------------------------------------------------------+
    | Release Date | 2014/12/04|
    | Advisory Contact | Packet Storm (advisories@packetstormsecurity.com) |
    | Researchers| Hector Marco and Ismael Ripoll|
    +--------------------+---------------------------------------------------------+
    | System Affected| 64 bit PIE Linux|
    | Classification | 1-day |
    +--------------------+---------------------------------------------------------+
    
    +----------+
    | OVERVIEW |
    +----------+
    
    The release of this advisory provides exploitation details in relation 
    a weakness in the Linux ASLR implementation.The problem appears when 
    the executable is PIE compiled and it has an address leak belonging to 
    the executable.
    
    These details were obtained through the Packet Storm Bug Bounty program 
    and are being released to the community.
    
    +------------------------------------------------------------------------------+
    
    +---------+
    | DETAILS |
    +---------+
    
    An attacker is able to de-randomize all mmapped areas (libraries, mapped files, etc.) 
    by knowing only an address belonging to the application and the offset2lib value.
    
    +------------------------------------------------------------------------------+
    
    +------------------+
    | PROOF OF CONCEPT |
    +------------------+
    
    The proof of concept exploit code is available here:
    https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35472.tgz
    http://packetstormsecurity.com/files/129398
    
    +------------------------------------------------------------------------------+
    
    +---------------+
    | RELATED LINKS |
    +---------------+
    
    http://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html
    
    +------------------------------------------------------------------------------+
    
    
    +----------------+
    | SHAMELESS PLUG |
    +----------------+
    
    The Packet Storm Bug Bounty program gives researchers the ability to profit 
    from their discoveries.You can get paid thousands of dollars for one day 
    and zero day exploits.Get involved by contacting us at 
    getpaid@packetstormsecurity.com or visit the bug bounty page at: 
    
    http://packetstormsecurity.com/bugbounty/
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.4.11 (GNU/Linux)
    
    iEYEARECAAYFAlSBA04ACgkQrM7A8W0gTbG0jwCdH5CHOIDO9ELRcrPhQmf5FF4z
    TgQAn2zuwadnWdMueC8gUQPT5gCmrQyp
    =iegV
    -----END PGP SIGNATURE-----