Increasing the range of address-space layout randomization
Increasing the range of address-space layout randomization
Posted Dec 17, 2015 12:29 UTC (Thu) by wodny (subscriber, #73045)Parent article: Increasing the range of address-space layout randomization
It's worth mentioning that situation on Android is even worse than on a regular Linux. Take a look at articles titled "From Zygote to Morula: Fortifying Weakened ASLR on Android"[1] and "One Class to Rule Them All: New Android Serialization Vulnerability Gives Underprivileged Apps Super Status"[2] -- "Our PoC exploit uses the fact that all apps and some services, including our malicious process, are forked from the Zygote process. Since all of its forked processes inherit the same memory layout, it makes the address space layout randomization (ASLR) effectively useless". So one vulnerable or malware app allows to map the memory layout and another app can be then exploited using ROPs as it inherits almost the same memory layout.
[1] http://wenke.gtisc.gatech.edu/papers/morula.pdf
[2] https://securityintelligence.com/one-class-to-rule-them-a...
