[Full-disclosure] Windows Kernel-mode GS Cookies subverted (paper)
- From: j00ru <j00ru.vx@xxxxxxxxx>
- Date: Tue, 11 Jan 2011 21:44:33 +0100
We've published a paper about reducing the effective entropy of GS
cookies found in the Windows drivers (both 32 and 64bits). The document
aims to outline some of the techniques, which can be employed to predict
the cookie value of a kernel module with up to 50% accuracy.
Experimental results included.
More information is available on our blogs:
Abstract: This paper describes various techniques that can be used to
reduce the effective entropy of GS cookies implemented in a certain
group of Windows kernel-mode executable images by roughly 99%, or
otherwise defeat it completely. This reduction is made possible due to
the fact that GS uses a number of extremely weak entropy sources, which
can be predicted by the attacker with varying (most often - very high)
degree of accuracy. In addition to presenting theoretical considerations
related to the problem, the paper also contains a great amount of
experimental results, showing the actual success / failure rate of
different cookie prediction techniques, as well as pieces of
hardware-related information. Furthermore, some of the possible problem
solutions are presented, together with a brief description of potential
attack vectors against these enhancements. Finally, the authors show how
the described material can be practically used to improve kernel
exploits’ reliability - taking the CVE-2010-4398 kernel vulnerability as
an interesting example.
Comments are welcome!
Matt "j00ru" Jurczyk, Gynvael Coldwind
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Prev by Date: [Full-disclosure] [USN-1043-1] Little CMS vulnerability
- Next by Date: [Full-disclosure] Call for Papers: DIMVA 2011 - Extended Deadline Jan 21
- Previous by thread: [Full-disclosure] [USN-1043-1] Little CMS vulnerability
- Next by thread: [Full-disclosure] Call for Papers: DIMVA 2011 - Extended Deadline Jan 21