Can This Type of Windows ASLR Exploit Defeat PaX?

Discuss usability issues, general maintenance, and general support issues for a grsecurity-enabled system.

Can This Type of Windows ASLR Exploit Defeat PaX?

Postby ShellCode » Thu Feb 04, 2010 1:14 pm

http://www.theregister.co.uk/2010/02/03 ... on_bypass/

Read about it there. Basically a JIT-spraying attack on Flash. Is this sort of thing doable against the Linux implementation of ASLR (whether it be PaX or not)?
ShellCode
 
Posts: 1
Joined: Thu Feb 04, 2010 12:57 pm

Re: Can This Type of Windows ASLR Exploit Defeat PaX?

Postby PaX Team » Thu Feb 04, 2010 8:13 pm

ShellCode wrote:http://www.theregister.co.uk/2010/02/03/microsoft_windows_protection_bypass/

Read about it there. Basically a JIT-spraying attack on Flash. Is this sort of thing doable against the Linux implementation of ASLR (whether it be PaX or not)?
of course it is, why wouldn't it be? also the whole 'new' attack is anything but, it's what you get when you allow a process to generate code at runtime, it may very well generate shellcode then. what one can do about it is to prevent the control flow transfer into it, but that requires some toolchain and JIT engine work.
PaX Team
 
Posts: 2310
Joined: Mon Mar 18, 2002 4:35 pm


Return to grsecurity support