|
|
Subscribe / Log in / New account

Cracking Linux with the backspace key?

Cracking Linux with the backspace key?

Posted Dec 21, 2015 16:42 UTC (Mon) by spender (guest, #23067)
Parent article: Cracking Linux with the backspace key?

The "researchers" involved in this have a history of over-hyping their findings (and in some cases spread just plain factually incorrect information) -- see all of their previous publications regarding ASLR:

http://hmarco.org/cyber-security/attacks/bypass64bitsASLR...
http://hmarco.org/bugs/linux-ASLR-integer-overflow.html
http://hmarco.org/bugs/AMD-Bulldozer-linux-ASLR-weakness-...

None of the reported issues affected grsecurity/PaX.

Speaking of, they have a new talk scheduled for BH Asia 2016 entitled "Exploiting Linux and PaX ASLR's Weaknesses on 32-bit and 64-bit Systems":
https://www.blackhat.com/asia-16/briefings.html#dr-hector...
Which again spreads false information about PaX by lumping in its ASLR implementation with upstream's, and is very likely hyping up some rare exploitation scenario as a generic attack, and almost certainly will ignore any of grsecurity's anti-bruteforcing features.

They will be proposing "ASLR-NG" which includes their "fix" for the AMD Bulldozer issue -- a per-boot randomization of the 3 mmap/vdso bits that would normally be 0, which can of course be trivially determined by any process on the system. It's security theater and demonstrates a lack of understanding of any real threat models.

They also make sure they receive bug bounties from Google for each of their "findings" and spam their advisories out to several mailing lists.

-Brad


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds