New Techniques Could Prevent Use-After-Free Exploits: Black Hat

Use-after-free memory flaws regularly impact Microsoft’s Windows operating system and Internet Explorer Web browser, but thanks to new research from Hewlett-Packard, that could soon change.

Brian Gorenc, manager of vulnerability research for HP Security Research, detailed his research at a session at the Black Hat USA conference here Aug. 6 that could curb use-after-free (UAF) attacks. The research was also given to Microsoft earlier this year, as a submission to the Microsoft Mitigation Bypass Bounty and Blue Hat Bonus for Defense Program, which resulted in a $125,000 award for HP’s researchers.

UAF is a class of memory flaws that enable an attacker to make use of authorized memory that normally should not be accessible to an unauthorized application. With UAF, attackers have the potential to execute arbitrary code and take over a system.

HP looked at how UAF vulnerabilities work and researched how isolated heap memory protection works on Windows and how objects are located on a system, Gorenc told eWEEK.

Isolated heap

“We started looking at Microsoft’s memory protection techniques for weakness, and we found several techniques for bypassing the isolated heap,” he said.

One of the things that HP discovered was that the isolated heap doesn’t properly keep track of different object types, which is one potential path to exploitation using a technique known as type confusion. One mitigation that HP recommends is randomized heap allocations, which diminish the effectiveness of type confusion attacks, Gorenc said.

Going a step further, Gorenc and his team were able to use the isolated heap to actually bypass Microsoft’s address space layout randomization (ASLR) feature.

“So we used one memory mitigation against another memory mitigation in order to make exploitation easier,” he said.

HP is also suggesting a mitigation to prevent the ASLR bypass technique, with an approach Gorenc calls the entropy dependent loading of software libraries

“With the entropy dependent approach, we’re limiting the available memory region where objects can be loaded,” he said. “The result is that there is only one location where a module can be loaded, where it can be checked.”

HP provided Microsoft with multiple mitigations to help protect against the issues that Gorenc discussed at Black Hat. Some of the mitigations have been implemented, though not all. The ASLR bypass technique is still possible, he said.

If Microsoft implemented all the mitigations suggested by HP, UAF exploitation on the isolation heap would be a lot more difficult, if not impossible, he said.

Gorenc helps run HP’s Zero Day Initiative (ZDI), which purchases vulnerabilities from researchers. With some mitigations already implemented, he said he has already seen a drop in UAF submissions against Microsoft.

Originally published on eWeek.

Sean Michael Kerner

Sean Michael Kerner is a senior editor at eWeek and contributor to TechWeek

Recent Posts

OpenAI’s Lightcap To Take On Expanded Role

OpenAI chief operating officer Brad Lightcap to oversee international expansion as company consolidates lead in…

22 hours ago

China Unveils Deep-Sea Cable-Cutting Device

Chinese researchers publish details on device that could wreak havoc on undersea communications cables in…

22 hours ago

Pat Gelsinger Joins Faith-Based Tech Company Gloo

Former Intel chief Gelsinger expands role at Gloo, becoming executive chairman and head of technology…

23 hours ago

MEPs Ramp Pressure For Second EU Chips Act

MEPs add to Commission pressure for second EU Chips Act amidst industry calls for renewed…

23 hours ago

Xiaomi Raises $5.5bn In Expanded Share Sale

Smartphone maker Xiaomi reportedly raises about $5.5bn in Hong Kong share sale as it invests…

24 hours ago

BYD Launches Rival To Tesla’s Model 3 At Half Price

BYD's Qin L EV sedan starts at about half the price of Tesla's Model 3,…

1 day ago