Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/25/2010
04:12 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Hacker Bypasses Windows 7 Anti-Exploit Features In IE 8 Hack

Microsoft's Data Execution Protection (DEP) and Address Space Randomization (ASLR) fail in hacks on IE 8, Firefox

A Dutch researcher won $10,000 in the Pwn2Own hacking contest this week for hacking Internet Explorer 8 on a Windows 7 machine -- bypassing built-in anti-exploit features in the operating system.

Independent researcher Peter Vreugdenhil waged a heap overflow attack on IE 8 and used a zero-day vulnerability he discovered in the browser to bypass Windows 7's built-in anti-exploit features, Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR).

Other successful hacks in the annual contest held at CanSecWest in Vancouver were a non-jailbroken iPhone, Firefox on Windows 7, and Safari on Snow Leopard, each conducted by other researchers who also won the big cash prize. A hacker known as "Nils" hacked Firefox on Windows 7 -- also bypassing DEP and ASLR with an exploit of his own, the details of which were not available at the time of this posting.

Vreugdenhil used a two-part exploit: First he located a specific .dll file to evade ASLR, and then used that information to trigger an exploit that disabled DEP. He used a heap overflow attack to get the address of the .dll file, he said in a paper (PDF) describing the attack. He would not reveal the vulnerabilities in IE 8 that he exploited, however: "But I might disclose them someday when Microsoft has them patched," he wrote.

Just how simple would such a hack be to execute? "The technique Peter wrote about would apply to any heap overflow within Internet Explorer, but it would still require a newfound vulnerability to make any use out of," says HD Moore, creator of Metasploit and chief security officer for Rapid7. "The methods he used to bypass ASLR and DEP could apply to other applications, but they would have to expose a similar level of memory control to the attacker."

Moore says the hack bypassing DEP and ASLR reflects a trend for future exploits. "On one hand, the skill required to develop reliable browser exploits is increasing, but new techniques, such as the memory leak used in this exploit, prove that OS-level exploit mitigations are still no excuse for writing vulnerable code," Moore says. "These types of techniques are possible only when the attacker has precise control over the process space, which is relatively easy with client-side applications, like Web browsers, but can be much more difficult with server-side applications."

And proponents of exploit-mitigation technology such as Microsoft's likely will dismiss this kind of an attack as an exception to the rule, Moore says. "[But] almost all reliable exploits are exceptions -- we simply don't hear about the rest," he says.

Jerry Bryant, Microsoft's senior security communications manager lead, said in a statement that Microsoft expects to get the vulnerability report tomorrow and "will begin investigating the issue at that time."

"We are not aware of any customer risk at this time due to this vulnerability," Bryant said.

Vreugdenhil isn't the first hacker to bypass Microsoft's DEP and ASLR: Core Security Technologies recently disclosed a flaw in the Microsoft Virtual PC hypervisor's memory management that can be used by an attacker to cheat DEP and ASLR. Microsoft maintains that it's not a new vulnerability, but that the exploit takes advantage of existing vulnerabilities.

And VUPEN Security earlier this year said it was able to bypass DEP on IE 8 and execute arbitrary code, and that it had sent its exploit code to Microsoft to examine.

DEP -- which helps quell code execution in non-executable memory -- was one of the key defenses against the original Operation Aurora exploit code. ASLR is a security feature that basically protects the system from an exploit attempting to call a system function. It places code in random areas of memory that makes it more difficult for an attacker to run malware on a machine.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29129
PUBLISHED: 2020-11-26
ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
CVE-2020-29130
PUBLISHED: 2020-11-26
slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
CVE-2020-26936
PUBLISHED: 2020-11-26
Cloudera Data Engineering (CDE) before 1.1 was vulnerable to a CSRF attack.
CVE-2020-29042
PUBLISHED: 2020-11-26
An issue was discovered in BigBlueButton through 2.2.29. A brute-force attack may occur because an unlimited number of codes can be entered for a meeting that is protected by an access code.
CVE-2020-29043
PUBLISHED: 2020-11-26
An issue was discovered in BigBlueButton through 2.2.29. When at attacker is able to view an account_activations/edit?token= URI, the attacker can create an approved user account associated with an email address that has an arbitrary domain name.