Stories
Slash Boxes
Comments

SoylentNews is people

posted by on Thursday February 16 2017, @07:52AM   Printer-friendly
from the more-secure-every-day dept.

Submitted via IRC for TheMightyBuzzard

A group of researchers from the Systems and Network Security Group at VU Amsterdam have discovered a way to bypass address space layout randomization (ASLR) protections of major operating systems and browsers by exploiting a common feature of computer microprocessors.

By combining simple JavaScript code to target this feature with exploit code for browser or OS vulnerabilities, they were able to compromise vulnerable systems, as demonstrated in this video (on Linux and Firefox):

"The memory management unit (MMU) of modern processors uses the cache hierarchy of the processor in order to improve the performance of page table walks. Unfortunately, this cache hierarchy is also shared by untrustred applications, such as JavaScript code running in the browser," the researchers explained.

"Our attack relies on the interplay between the MMU and the caches during virtual to physical address translation—core hardware behavior that is central to efficient code execution on modern CPUs. We have built a side-channel attack, specifically an EVICT+TIME cache attack, that can detect which locations in the page table pages are accessed during a page table walk performed by the MMU. As a result, an attacker can derandomize virtual addresses of a victim's code and data by locating the cache lines that store the page-table entries used for address translation."

This knowledge allows attackers to successfully execute malicious payloads on the targeted system, instead of crashing it.

Ruh-Roh, Raggy...

Source: https://www.helpnetsecurity.com/2017/02/15/bypass-aslr-protection-javascript/.
Also at: https://arstechnica.com/security/2017/02/new-aslr-busting-javascript-is-about-to-make-drive-by-exploits-much-nastier/.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Scruffy Beard 2 on Friday February 17 2017, @02:09AM

    by Scruffy Beard 2 (6030) on Friday February 17 2017, @02:09AM (#468043)

    I recently discovered leaving the wrong website open drains you battery.

    Not sure why idle pages should be drawing any CPU time.

    In this case it was probably polling for updates I don't care about because, well: I was not looking at the page, and had disabled networking to save power.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2