Netinfo Security ›› 2016, Vol. 16 ›› Issue (7): 47-52.doi: 10.3969/j.issn.1671-1122.2016.07.008

• Orginal Article • Previous Articles     Next Articles

Research on ASLR Bypass Technology Based on Arbitrary Function Address

Xin XU1, Songnian ZHANG2, Jianwei HU2   

  1. 1.PLA 95865, Beijing 100000, China
    2. XIDIAN University, Xi’an Shaanxi 710126, China
  • Received:2016-05-26 Online:2016-07-20 Published:2020-05-13

Abstract:

For many years buffer overflow vulnerability has been the most important and harmful mean of the field of network attacks. In Microsoft and other vendors did not use the DEP and ASLR on buffer overflow protection technology, the attackers use EIP to jump to the required position to complete the exploits. However, with the application of DEP and ASLR technology, during the current exploit, bypass the ASLR, Address Space Layout Randomization, protection mechanism is an essential part . Almost all of the vulnerabilities mining practitioners and attackers, both in the study through the way to bypass DEP and ASLR. From the content of ASLR protection mechanism, this paper mainly analyzes the current commonly used ASLR bypass technology of the Microsoft’s Windows system. Then, this paper puts forward a through relative offset bypass ASLR protection mechanism, and focuses on the analysis of the cve-2013-2551 vulnerabilities principles and details, and through the use of loopholes in the cve-2013-2551 demonstration in Microsoft's Windows 8 application this method successfully bypass ASLR protection mechanism of the Microsoft. The shortcoming of the method that proposed in this paper is that the attacker must be able to bypass the ASLR to read the memory, and its advantage is that the attacker can obtain the address of any function in the system.

Key words: vulnerability exploiting, ASLR protection mechanism, ROP chain, exposed base address

CLC Number: