Interpreter exploitation

  • Authors:
  • Dionysus Blazakis

  • Affiliations:
  • Independent Security Evaluators, Baltimore, MD

  • Venue:
  • WOOT'10 Proceedings of the 4th USENIX conference on Offensive technologies
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

As remote exploits further dwindle and perimeter defenses become the standard, remote client-side attacks are becoming the standard vector for attackers. Modern operating systems have quelled the explosion of client-side vulnerabilities using mitigation techniques such as data execution prevention (DEP) and address space layout randomization (ASLR). This work illustrates two novel techniques to bypass these mitigations. The two techniques leverage the attack surface exposed by the script interpreters commonly accessible within the browser. The first technique, pointer inference, is used to find the memory address of a string of shellcode within the Adobe Flash Player's ActionScript interpreter despite ASLR. The second technique, JIT spraying, is used to write shellcode to executable memory, bypassing DEP protections, by leveraging predictable behaviors of the ActionScript JIT compiler. Previous attacks are examined and future research directions are discussed.