An Evil Copy: How the Loader Betrays You

نویسندگان

  • Xinyang Ge
  • Mathias Payer
  • Trent Jaeger
چکیده

Dynamic loading is a core feature used on current systems to (i) enable modularity and reuse, (ii) reduce memory footprint by sharing code pages of libraries and executables among processes, and (iii) simplify update procedures by eliminating the need to recompile executables when a library is updated. The Executable and Linkable Format (ELF) is a generic specification that describes how executable programs are stitched together from object files produced from source code to libraries and executables. Programming languages allow fine-grained control over variables, including access and memory protections, so programmers may write defense mechanisms assuming that the permissions specified at the source and/or compiler level will hold at runtime. Unfortunately, information about memory protection is lost during compilation. We identify one case that has significant security implications: when instantiating a process, constant external variables that are referenced in executables are forcefully relocated to a writable memory segment without warning. The loader trades security for compatibility due to the lack of memory protection information on the relocated external variables. We call this new attack vector COREV for Copy Relocation Violation. An adversary may use a memory corruption vulnerability to modify such “read-only” constant variables like vtables, function pointers, format strings, and file names to bypass defenses (like FORTIFY SOURCE or CFI) and to escalate privileges. We have studied all Ubuntu 16.04 LTS packages and found that out of 54,045 packages, 4,570 packages have unexpected copy relocations that change read-only permissions to read-write, presenting new avenues for attack. The attack surface is broad with 29,817 libraries exporting relocatable read-only variables. The set of 6,399 programs with actual copy relocation violations includes ftp servers, apt-get, and gettext. We discuss the cause, effects, and a set of possible mitigation strategies for the COREV attack vector.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamics of Industrial Buyer Behavior of Loader Backhoe

To investigate how the buying behavior of firms work is always needed, since it is an every changing process influenced by many forces in its surroundings. Industrial firms tend to have a smaller number of customers which means that they are easier to identify than customers in consumer markets. Effective marketing strategy relies on understanding consumers and their needs. This understanding m...

متن کامل

P35: How to Manage Anxiety

Anxiety is a mental state that is elicited in anticipation of threat or potential threat. Sensations of anxiety are a normal part of human experience, but excessive or inappropriate anxiety can become an illness. Anxiety is part of the normal human experience. We may speculate that it served human survival during evolution by enhancing preparedness and alertness. However, anxious manifestations...

متن کامل

Analytical evaluation of an innovative decision-making algorithm for VM live migration

In order to achieve the virtual machines live migration, the two "pre-copy" and "post-copy" strategies are presented. Each of these strategies, depending on the operating conditions of the machine, may perform better than the other. In this article, a new algorithm is presented that automatically decides how the virtual machine live migration takes place. In this approach, the virtual machine m...

متن کامل

An Exploratory Study on the Use of 'I Love You' in the American Context

This study explores the use of the English locution I love you in the American context. The data were collected through a focus discussion group and a survey questionnaire. 120 college undergraduate students from a large public American university participated in the study with 28 attending the focus discussion group and 92 completing the survey questionnaire. The findings indicated th...

متن کامل

An Analysis of the Verses Indicating the Limitations of the Evil Influences of Modern Man in Creatures, Emphasizing the Viewpoint of Allamah Tabatabai in al-Mizan

In the Holy Qur'an, there are some verses that, in addition to presenting conceptual analyses with logical implications, express the constraints and limitations for evil and destructive influences in creatures, phenomena, and events. From the point of view of Allameh Tabatabai, man’s being social for taking advantage of the others, being influenced by Satan's seductions, and pursuing one’s sens...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017