Ally Fashion

Wednesday, July 30, 2014

Mac OS X and iPhone sandbox escapes

 ana05     July 30, 2014     No comments   

Posted by Chris Evans, Finder of None Of These

As part of our launch manifesto, we committed to openness and transparency, including sharing full details of our research.

About a month ago, Apple released two security advisories which fixed some Project Zero findings. Today, we’re releasing the technical details by making some bugs public. Why now? Generally, we’ll always wait a little while after a patch is available, to give users time to apply the patch.

We won’t be writing a blog post for every set of bugs we make public. The main reason for this particular blog post is to highlight our process for making bugs public. That said, there are some interesting bug details available as of today! To highlight a few:

  • These two bugs describe a heap corruptions in launchd. launchd is a service that sandboxed processes can talk to and it runs unsandboxed. Therefore memory corruptions in this process are an excellent sandbox escape. As you can see, this bug was discovered by code auditing.
  • This OS X bug fully demonstrates the ability to read arbitrary kernel memory from within the sandbox. As you can see, the proof of concept C code is attached for you to study.
  • This OS X bug covers a very interesting validation failure leading to an integer underflow, leading in turn to the kernel trying to read a kernel structure from a non-NULL userspace address. The kernel structure involved contains a function pointer so getting in-kernel code execution at a chosen address follows trivially. An annotated analysis of the faulty assembly instructions is included.
  • This OS X bug covers NULL pointer dereferences in the kernel—four in fact. It goes into detail about which circumstances result in sandbox escapes and which are “only” privilege escalations. Two of the bugs are quite neat because they call an attacker-specified offset from a good vtable base. Because this situation does not involve knowing any absolute kernel addresses, the bug could be used to both defeat kernel ASLR and then gain kernel code execution.

If you want a single URL to enumerate all of our publicly viewable bugs, click here. Enjoy! And thanks for following Project Zero.
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook
Newer Post Older Post Home

0 Comments:

Post a Comment



Popular Posts

  • READY FOR FALL! MY RECOMMENDATIONS
    Autumn is around the corner which means darker tones for makeup! In this post I will be sharing my favourite products for lips, cheeks and e...
  • A tan really completes a make-up look
    We have been obsessed with tanning since we were around 13/14 because we live in England and there is barely any sun here and we look so was...
  • Adobe Photoshop 7.0 Full Version Free Download | Adobe Photoshop 7 Final Version Download | Photoshop 7 Professional Version Download 32-Bit and 64-Bit
    Adobe Photoshop 7 Full Version Free Download Original Adobe Photoshop 7.0 +License Key. Adobe Photoshop 7 Professional Version Free Download...
  • Virtually Unlimited Memory: Escaping the Chrome Sandbox
    Posted by Mark Brand, Exploit Technique Archaeologist. Introduction After discovering a collection of possible sandbox escape vulnerabiliti...
  • Did the “Man With No Name” Feel Insecure?
    Posted by James Forshaw, Taker of Names Sometimes when I'm doing security research I'll come across a bug which surprises me. I disc...
  • Driver Pack Solution 2018 Latest Version Download
    Driver Pack Solution 2018 Latest Version Download Driver Pack Solution 2018 Latest Version Download ISO for Windows User 32 bit & 64 bit...
  • [Ezoteryka PL] Węzły księżycowe - The North Node & The South Node
    Jaki jest cel naszego życia? Patrząc na swoja datę urodzin, możesz wyczytać z niej więcej niż znak zodiaku czy numerologie. Jako, iż postano...

Copyright © Ally Fashion | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates