Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems

  • Authors:
  • David J. Day;Zheng-Xu Zhao

  • Affiliations:
  • School of Computing and Mathematics, University of Derby, Derby, UK;Faculty of Information Science and Technology, Shijiazhuang Tiedao University, Shijiazhuang, PRC

  • Venue:
  • International Journal of Automation and Computing
  • Year:
  • 2011

Quantified Score

Hi-index 0.01

Visualization

Abstract

Writable XOR executable (W驴X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits[1]. However, they have not proved to be a panacea[1---3], and so other mechanisms, such as stack guards and prelinking, have been introduced. In this paper, we show that host-based protection still does not offer a complete solution. To demonstrate the protection inadequacies, we perform an over the network brute force return-to-libc attack against a preforking concurrent server to gain remote access to a shell. The attack defeats host protection including W驴X and ASLR. We then demonstrate that deploying a network intrusion detection systems (NIDS) with appropriate signatures can detect this attack efficiently.