Stories
Slash Boxes
Comments

SoylentNews is people

posted by on Thursday February 16 2017, @07:52AM   Printer-friendly
from the more-secure-every-day dept.

Submitted via IRC for TheMightyBuzzard

A group of researchers from the Systems and Network Security Group at VU Amsterdam have discovered a way to bypass address space layout randomization (ASLR) protections of major operating systems and browsers by exploiting a common feature of computer microprocessors.

By combining simple JavaScript code to target this feature with exploit code for browser or OS vulnerabilities, they were able to compromise vulnerable systems, as demonstrated in this video (on Linux and Firefox):

"The memory management unit (MMU) of modern processors uses the cache hierarchy of the processor in order to improve the performance of page table walks. Unfortunately, this cache hierarchy is also shared by untrustred applications, such as JavaScript code running in the browser," the researchers explained.

"Our attack relies on the interplay between the MMU and the caches during virtual to physical address translation—core hardware behavior that is central to efficient code execution on modern CPUs. We have built a side-channel attack, specifically an EVICT+TIME cache attack, that can detect which locations in the page table pages are accessed during a page table walk performed by the MMU. As a result, an attacker can derandomize virtual addresses of a victim's code and data by locating the cache lines that store the page-table entries used for address translation."

This knowledge allows attackers to successfully execute malicious payloads on the targeted system, instead of crashing it.

Ruh-Roh, Raggy...

Source: https://www.helpnetsecurity.com/2017/02/15/bypass-aslr-protection-javascript/.
Also at: https://arstechnica.com/security/2017/02/new-aslr-busting-javascript-is-about-to-make-drive-by-exploits-much-nastier/.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Celestial on Thursday February 16 2017, @04:27PM

    by Celestial (4891) on Thursday February 16 2017, @04:27PM (#467852) Journal

    I stopped using NoScript around 2013. The modern world wide web is almost completely broken by it as the use of JavaScript has become nearly 100% ubiquitous now. I just have to hope that uBlock Origin, Disconnect, and Privacy Badger are good enough.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2