ssj100 Security Forums
Would you like to react to this message? Create an account in a few clicks or log in to continue.

DW still vulnerable on anti-TOCTTOU BY mj0011

5 posters

Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty DW still vulnerable on anti-TOCTTOU BY mj0011

Post by Singlemature 6/7/2010, 20:41

link here:http://bbs.kafan.cn/thread-740802-1-1.html

Strong anti-TOCTTOU (race conditions) protection is integrated into.

====

这句说得就有点过分了,新版的DW确实运用了一些技术来防止TOCTTOU(即所谓KHOBE), 主要表现在下面两个方面:
(1).对于用户地址的参数,申请kernel内存并通过MmMapLockedPagesSpecifyCache映射到用户态地址上,然后将参数COPY该地址后,直接将映射后的地址传递给R0

(2).对于句柄,在所有句柄创建、关闭时记录其对象和句柄一个进程对应的链表中,当句柄使用时,检查是否位于这个表中,如果发现send-close-create现象,就阻止请求

但是这些方法是明显存在漏洞的

(1). 对于(1),大部分函数处理都仅仅COPY了 最终的字符串BUFFER,例如NtCreateEvent,仅仅复制了ObjectAttributes->ObjectName->Buffer这一块缓存,而其他的缓存例如object name所在内存则没有做这样的处理,攻击者仍然可以利用TOCTTOU 的方式,伪造恶意的unicode_string length等方式绕过保护

(2).同样, (1).的方法即使处理了全部缓存,也是不能彻底解决TOCTTOU的问题的,因为此时映射到的是仍是RING3的内存,且没有锁定内存禁止修改,因此攻击者仍是可以通过预测内存映射的地址,篡改结果,绕过保护

此外,这版的TOCTTOU防护由于在所有函数调用时都会做句柄记录、检查、用户态内存分配,因此对性能消耗提升是相当大的,而且可能会引发较多的兼容和稳定性问题。

最终防御TOCTTOU还是需要深层+多层钩子来解决,DW这种只能说是偷懒的、在一定程度一定概率上提升了TOCTTOU的攻击难度的保护。

i don't think i have time or ability to translate this...so you guys can only use google translate... Shocked

Singlemature
Valued Member
Valued Member

Posts : 31
Join date : 2010-04-22

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by Singlemature 6/7/2010, 20:51

some more
此版的另外一个改进是拦截了NtUserRegisterHotKey,当HotKey没有做combine 时(即不是alt + xx \ ctrl+ xxx \ shift+ xxx \ win key + xxx) 时,即拦截这个热键注册

应该是对抗之前论坛上那个新型键盘截取的

that mentioned keylogger test is here
http://ifile.it/46cufd8/Test.rar
this test bypassed pso、ss、dw、md、osss at that time

Singlemature
Valued Member
Valued Member

Posts : 31
Join date : 2010-04-22

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by ssj100 7/7/2010, 00:41

Thanks mature. I wonder what Ilya will have to say! And are they talking about version 3.03?

I'll have a look at that keylogger test some time. By the way, what's pso, ss, dw, md, osss?

Prevx SafeOnline, SpyShelter, DefenseWall, Malware Defender, Online Solutions Security Suite? If so, does it bypass any of the mentioned programs currently?

Cheers.

EDIT: yes, it appears they are talking about 3.03 Final (which Ilya released to specifically address the TOCTTOU vulnerability), which has been released by the way.
ssj100
ssj100
Administrator
Administrator

Posts : 1390
Join date : 2010-04-14

https://ssj100.forumotion.com

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by Rico 7/7/2010, 02:26

how does the gd ol' sbie fare in this race ?? Basketball

Rico
Advanced Member
Advanced Member

Posts : 118
Join date : 2010-06-18

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by ssj100 7/7/2010, 02:34

Rico wrote:how does the gd ol' sbie fare in this race ?? Basketball

Check here:
http://www.sandboxie.com/phpbb/viewtopic.php?p=51810#51810

This is impressive research by Matousec and I enjoyed reading it and thinking about it. They have a good point here, but most of this does not apply to Sandboxie.

Sandboxie kernel hooks are not SSDT hooks which execute before the kernel, as described in the article. Rather they are callbacks invoked by the kernel, after it has already validated, copied and locked down all parameters in question. It is impossible for the caller to alter these internal copies of the parameter at this point, and what Sandboxie inspects are those internal copies passed by the kernel.

Sandboxie Win32 hooks do work as described in the article, but Win32 window handles are different from kernel handles, and are not susceptible to the handle manipulation attack that was described.

There is one small bit of Sandboxie that might be vulnerable to this, where a sandboxed program might be able to terminate a program outside the sandbox (the EndTask API). However this is pretty much the extent of the vulnerability, so I'm not very concerned and won't be going to any great lengths to do anything about it.
ssj100
ssj100
Administrator
Administrator

Posts : 1390
Join date : 2010-04-14

https://ssj100.forumotion.com

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by ssj100 9/7/2010, 04:41

Seems Ilya has found holes in his software already, but he claims it's not related to mj0011's postings:
http://gladiator-antivirus.com/forum/index.php?showtopic=106958

Just found two holes into the anti-TOCTTOU protection. One is fixed, the second is on the way. And it's not about mj0011 blog posts, it's really serious.

Seems a bit coincidental if you ask me. And I didn't know Ilya could read Chinese haha. I can't make head or tail of the content in the chinese forums etc.
ssj100
ssj100
Administrator
Administrator

Posts : 1390
Join date : 2010-04-14

https://ssj100.forumotion.com

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by Hawkwind 9/7/2010, 14:28

ssj100 wrote:
Seems a bit coincidental if you ask me. And I didn't know Ilya could read Chinese haha. I can't make head or tail of the content in the chinese forums etc.

Try this http://translate.google.com/translate?u=http%3A//bbs.kafan.cn/thread-740802-1-1.html&hl=en&langpair=auto|en&tbb=1&ie=x-gbk

For translation this bookmarklet is great to have in the bookmaks toolbar http://lifehacker.com/5168984/to-english-bookmarklet-quickly-easily-translates-any-text-with-one-click
Hawkwind
Hawkwind
Member
Member

Posts : 29
Join date : 2010-04-24

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by Singlemature 11/7/2010, 19:01

呵呵,老外就是嘴巴硬,其实做安全的老外没几个有国人牛的,真才实学、刻苦钻研的少。

就像DW我都过了多少次了,想过的话还可以随便再过N次

有空的话,等DW出了修复它的所谓TOCTTOU BUG的版本后,我会出过他的ANTI-TOCTTOU的POC,很简单,因为这根本不是BUG问题,而是他解决TOCTTOU的方向就找错了~
some more comments by mj0011~
main point is "he can bypass DW easily and he will give POC bypass ANTI-TOCTTOU cuaze Ilya fix this problem in a wrong direction at first.

Singlemature
Valued Member
Valued Member

Posts : 31
Join date : 2010-04-22

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty dw 3.04 still vulnerable

Post by mj0011 13/7/2010, 12:12

dw 3.04 still vulnerable

by google translate:


This version does streng then the capacity of anti-TOCTTOU as I said previously, map memory (non-read only) way to solve the problem, this version of a change in the Map section of the way, while protect attributes to the PAGE_READONLY

Than the previous version did this greatly increase the difficulty of the attack, but unfortunately, at the expense of so many performance and stability, the obvious flaw in this approach remains an attacker can still guess the address(guess the difficulty and the Version no difference), get the address map, and then use ZwProtectVirtualMemory modify memory property, complete attack.

Although the addition time of a call system service process, reduce the probability of success will be attacked, but in theory, as long as the higher number of attempts, or in multi-core machines, or is likely to succeed

In fact, this attack can block only a thin the last step, and it is on the increase in ZwProtectVirtualMemory hook dw own memory map to change property to prevent interception, DW Unfortunately, this version does not have this feature, refer to the relevant DW HOOK:

ProxyNtProtectVirtualMemory:
....
if (KeGetPreviousMode ()! = UserMode
| |! IsLimitedProcess (IoGetCurrentProcess, 0, 0)
| | Handle == 0
| | Handle == NtCurrentProcess ())

goto pass_this_request;

Of course, this method can in theory solve the DW although the current anti - tocttou problem, but with more performance loss is the need to intercept all the memory attributes of the process changes, the process also need to call system services for all limited When the data recording memory allocation table, but DW has been consumed for solving the problem so much performance, to further increase this fear is the inevitable.

But it is still I said before, TOCTTOU this issue should be resolved with a deep hook, so that neither the performance issue, nor a security risk, just for the forming of security software, the need to change hook framework, to bring stability and compatibility risk has increased.

mj0011
New Member
New Member

Posts : 2
Join date : 2010-07-13

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by Singlemature 13/7/2010, 12:43

mj0011 wrote:dw 3.04 still vulnerable

by google translate:


This version does streng then the capacity of anti-TOCTTOU as I said previously, map memory (non-read only) way to solve the problem, this version of a change in the Map section of the way, while protect attributes to the PAGE_READONLY

Than the previous version did this greatly increase the difficulty of the attack, but unfortunately, at the expense of so many performance and stability, the obvious flaw in this approach remains an attacker can still guess the address(guess the difficulty and the Version no difference), get the address map, and then use ZwProtectVirtualMemory modify memory property, complete attack.

Although the addition time of a call system service process, reduce the probability of success will be attacked, but in theory, as long as the higher number of attempts, or in multi-core machines, or is likely to succeed

In fact, this attack can block only a thin the last step, and it is on the increase in ZwProtectVirtualMemory hook dw own memory map to change property to prevent interception, DW Unfortunately, this version does not have this feature, refer to the relevant DW HOOK:

ProxyNtProtectVirtualMemory:
....
if (KeGetPreviousMode ()! = UserMode
| |! IsLimitedProcess (IoGetCurrentProcess, 0, 0)
| | Handle == 0
| | Handle == NtCurrentProcess ())

goto pass_this_request;

Of course, this method can in theory solve the DW although the current anti - tocttou problem, but with more performance loss is the need to intercept all the memory attributes of the process changes, the process also need to call system services for all limited When the data recording memory allocation table, but DW has been consumed for solving the problem so much performance, to further increase this fear is the inevitable.

But it is still I said before, TOCTTOU this issue should be resolved with a deep hook, so that neither the performance issue, nor a security risk, just for the forming of security software, the need to change hook framework, to bring stability and compatibility risk has increased.

wow~~this is real man~~ bounce

Singlemature
Valued Member
Valued Member

Posts : 31
Join date : 2010-04-22

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by ssj100 13/7/2010, 12:48

Firstly, welcome to the forum mj0011. I'm not sure if you're the "real" mj0011, but that doesn't matter.

Could you please link us to the original thread that contains that information you posted? I know most of us here can't read mandarin, but it's just nice to have a reference.

From what I gather, it sounds like you know of a way or concept to improve DefenseWall so that it is resistant against TOCTTOU attacks while also preserving performance. I'm sure Ilya will be most interested in this.
ssj100
ssj100
Administrator
Administrator

Posts : 1390
Join date : 2010-04-14

https://ssj100.forumotion.com

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by Singlemature 13/7/2010, 12:52

ssj100 wrote:Firstly, welcome to the forum mj0011. I'm not sure if you're the "real" mj0011, but that doesn't matter.

Could you please link us to the original thread that contains that information you posted? I know most of us here can't read mandarin, but it's just nice to have a reference.

From what I gather, it sounds like you know of a way or concept to improve DefenseWall so that it is resistant against TOCTTOU attacks while also preserving performance. I'm sure Ilya will be most interested in this.

http://bbs.kafan.cn/thread-745241-1-1.html
I told you it's real man...

Singlemature
Valued Member
Valued Member

Posts : 31
Join date : 2010-04-22

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by Singlemature 13/7/2010, 13:33

TOCTTOU 本身就只是一定概率上会成功的攻击方式,也就是需要多次大量尝试才有可能成功。

前面我已经说了,这版DW改进的PAGE ONLY方式以及把此前的只capture部分参数的BUG改了,因此攻击的成功率已经比较低了,但是防御的方式上仍存漏洞,仍存在被攻破的概率,因此不会发针对TOCTTOU的POC出来。

some more infor~there won't be POC in connection with TOCTTOU since this kind attack won't success everytime let alone DW has made this rate more lower though there's vulnerabiltiy on TOCTTOU defense of DW.
I think he means he will bypass DW on other conception.

Singlemature
Valued Member
Valued Member

Posts : 31
Join date : 2010-04-22

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by ssj100 13/7/2010, 14:56

Thanks for the update mature (and mj0011). This all sounds very complicated! Will other security products have the same issue I wonder (eg. Malware Defender, Sandboxie)?
ssj100
ssj100
Administrator
Administrator

Posts : 1390
Join date : 2010-04-14

https://ssj100.forumotion.com

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by ssj100 14/7/2010, 15:29

Has Ilya employed someone to work with him (and the Chinese community)?
http://bbs.kafan.cn/forum.php?mod=viewthread&tid=745241&rpid=13473278&page=2#pid13473278

New 3.04 build uploaded. Found two issues with anti-TOCTTOU protection module. Check this build very carefully, it may cause problems (I did checks on my side, but everything may happens, I could miss something).

To mj0011: yes, it was possible to change PAGE_READONLY memory region to PAGE_WRITECOPY (but not to PAGE_READWRITE and PAGE_EXECUTE_XXX), and not only with NtProtectVirtualMemory, but, also, with trivial NtAllocateVirtualMemory (you missed this possibility with your blog post), but the game over now. It is completely impossible to change mapped memory region's protection attributes. With any rin3-available functions, I already tested all potential variants.

Seems a pity that this isn't being discussed on the actual DefenseWall support forum. The community there generally all seem to just praise DefenseWall without thinking about it much.
ssj100
ssj100
Administrator
Administrator

Posts : 1390
Join date : 2010-04-14

https://ssj100.forumotion.com

Back to top Go down

DW still vulnerable on  anti-TOCTTOU BY mj0011 Empty Re: DW still vulnerable on anti-TOCTTOU BY mj0011

Post by Sponsored content


Sponsored content


Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum