Ally Fashion

Wednesday, November 19, 2014

Project Zero Patch Tuesday roundup, November 2014

 ana05     November 19, 2014     No comments   

Posted by Chris Evans, Registrar of Bugs

It’s been about a week since Patch Tuesday, and the Project Zero reports mentioned in the various advisories are now public. We won’t always be writing a Patch Tuesday roundup, but we often will when we believe there is a sufficiently varied and interesting array of bugs to study. This month is such a month. Separately to this summary, we expect to write more in-depth posts for some of the most interesting individual vulnerabilities.

Internet Explorer sandbox escapes
Project Zero member James Forshaw has been busy looking for sandbox escapes on the Windows platform, resulting in a mention in two Microsoft bulletins. Sandbox escapes remain a focus of Project Zero because they are a more tractable attack surface to lock down than the typically large applications that run inside them.

This bug is worth highlighting. It’s a permissions issue leading to an interesting attack: gain writeable access to some important settings and use that to turn off Protected Mode (aka. the sandbox)! Finding and fixing permissions issues is important because they can be very quickly, easily and reliably exploited.

This permissions issue is also of note. It permits read-only access to the memory of the medium integrity (unsandboxed) process. At first glance, this doesn’t sound like a sandbox escape. However, there’s a trick that leverages this to leak a secret which leads to the ability to take over the process. This will be fully covered in an upcoming blog post.

Microsoft Office memory corruption vulnerabilities
Project Zero member Ben Hawkes found three vulnerabilities in Microsoft Office, leading to this bulletin. We’ve seen the occasional 0-day triggerable by opening Office files, which is one factor we balance when considering where to help.

These three bugs are now public in our tracker. You can see the PoC files and see how in some cases, we were able to minimize the PoC down to just a single bit flip from an original input document. You can also see how triaging exploitability of crashes -- particularly where you only have binaries -- can be surprisingly involved! It’s easy to see why simple automated approaches like !exploitable have a lot of false negatives.

Flash Player bytecode verification logic errors
Project Zero member Ian Beer focused in on an interesting area of research: logic errors in the bytecode verifier. The Flash bytecode security model is to verify certain properties of the bytecode once, up front, leading to various simplifications and optimization opportunities later. Any errors in verification can lead to serious runtime errors later. To pick a specific example, this bug tells the story of an incorrect assumption leading to a type confusion at runtime and a nice PoC which faults at the attacker-specified address 0x414243 while attempting to load a function pointer.

Flash Player memory corruption vulnerabilities
Project Zero members Tavis Ormandy and Chris Evans and Project Zero affiliate Natalie Silvanovich reported miscellaneous memory corruption vulnerabilities. To briefly highlight a couple of issues, this bug is a type confusion that triggers in the legacy ActionScript 2 APIs and cannot be readily reached unless you use an old-style .as compiler. As always, putting in effort to test legacy code often bears fruit. And this bug raises eyebrows because even though it is a wild memcpy() of approximate length -1, there are signs of exploitability. Sometimes during testing, it isn’t the memcpy() thread that crashes, but another thread that happened to be doing some busy work in parallel.

OS X sandbox escape
All of the bugs mentioned so far were fixed well within Project Zero’s 90-day disclosure deadline, representing a solid security response by the Adobe Flash, Microsoft Office, Internet Explorer and Microsoft Windows product teams. In addition to these bugs, this OS X sandbox escape is also now publicly viewable on account of exceeding the deadline. We calibrate our deadline to balance two important factors: the right of end users to know about a risk versus giving vendors a fair chance to cleanly fix a bug under a reasonable embargo. Given the ratio of deadline hits to misses, we think we’ve calibrated correctly for the current state of the industry but we do hope to tighten the deadline in the future.

This sandbox escape doesn’t give direct access to a highly privileged context (such as ring0) but it does provide an avenue to escape a sandbox policy, which is a useful escalation. For example, this bug could be chained with other bugs such as kernel NULL pointer dereferences.
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook
Newer Post Older Post Home

0 Comments:

Post a Comment



Popular Posts

  • READY FOR FALL! MY RECOMMENDATIONS
    Autumn is around the corner which means darker tones for makeup! In this post I will be sharing my favourite products for lips, cheeks and e...
  • A tan really completes a make-up look
    We have been obsessed with tanning since we were around 13/14 because we live in England and there is barely any sun here and we look so was...
  • Adobe Photoshop 7.0 Full Version Free Download | Adobe Photoshop 7 Final Version Download | Photoshop 7 Professional Version Download 32-Bit and 64-Bit
    Adobe Photoshop 7 Full Version Free Download Original Adobe Photoshop 7.0 +License Key. Adobe Photoshop 7 Professional Version Free Download...
  • Virtually Unlimited Memory: Escaping the Chrome Sandbox
    Posted by Mark Brand, Exploit Technique Archaeologist. Introduction After discovering a collection of possible sandbox escape vulnerabiliti...
  • Did the “Man With No Name” Feel Insecure?
    Posted by James Forshaw, Taker of Names Sometimes when I'm doing security research I'll come across a bug which surprises me. I disc...
  • Driver Pack Solution 2018 Latest Version Download
    Driver Pack Solution 2018 Latest Version Download Driver Pack Solution 2018 Latest Version Download ISO for Windows User 32 bit & 64 bit...
  • [Ezoteryka PL] Węzły księżycowe - The North Node & The South Node
    Jaki jest cel naszego życia? Patrząc na swoja datę urodzin, możesz wyczytać z niej więcej niż znak zodiaku czy numerologie. Jako, iż postano...

Copyright © Ally Fashion | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates