On the Effectiveness of Address-Space Randomization
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
On the Effectiveness of Address-Space Randomization Hovav Shacham Matthew Page Ben Pfaff Stanford University Stanford University Stanford University hovav@cs.stanford.edu mpage@stanford.edu blp@cs.stanford.edu Eu-Jin Goh Nagendra Modadugu Dan Boneh Stanford University Stanford University Stanford University eujin@cs.stanford.edu nagendra@cs.stanford.edu dabo@cs.stanford.edu ABSTRACT Keywords Address-space randomization is a technique used to fortify Address-space randomization, diversity, automated attacks systems against bu er over ow attacks. The idea is to in- troduce arti cial diversity by randomizing the memory lo- cation of certain system components. This mechanism is 1. INTRODUCTION available for both Linux (via PaX ASLR) and OpenBSD. Randomizing the memory-address-space layout of soft- We study the e ectiveness of address-space randomization ware has recently garnered great interest as a means of di- and nd that its utility on 32-bit architectures is limited by versifying the monoculture of software [19, 18, 26, 7]. It the number of bits available for address randomization. In is widely believed that randomizing the address-space lay- particular, we demonstrate a derandomization attack that out of a software program prevents attackers from using the will convert any standard bu er-over ow exploit into an ex- same exploit code e ectively against all instantiations of the ploit that works against systems protected by address-space program containing the same aw. The attacker must ei- randomization. The resulting exploit is as e ective as the ther craft a speci c exploit for each instance of a random- original exploit, although it takes a little longer to compro- ized program or perform brute force attacks to guess the mise a target machine: on average 216 seconds to compro- address-space layout. Brute force attacks are supposedly mise Apache running on a Linux PaX ASLR system. The thwarted by constantly randomizing the address-space lay- attack does not require running code on the stack. out each time the program is restarted. In particular, this We also explore various ways of strengthening address- technique seems to hold great promise in preventing the ex- space randomization and point out weaknesses in each. Sur- ponential propagation of worms that scan the Internet and prisingly, increasing the frequency of re-randomizations adds compromise hosts using a hard-coded attack [11, 31]. at most 1 bit of security. Furthermore, compile-time ran- In this paper, we explore the e ectiveness of address- domization appears to be more e ective than runtime ran- space randomization in preventing an attacker from using domization. We conclude that, on 32-bit architectures, the the same attack code to exploit the same aw in multiple only bene t of PaX-like address-space randomization is a randomized instances of a single software program. In par- small slowdown in worm propagation speed. The cost of ticular, we implement a novel version of a return-to-libc randomization is extra complexity in system support. attack on the Apache HTTP Server [3] on a machine run- ning Linux with PaX Address Space Layout Randomization (ASLR) and Write or Execute Only (WX) pages. Traditional return-to-libc exploits rely on knowledge of Categories and Subject Descriptors addresses in both the stack and the (libc) text segments. D.4.6 [Operating Systems]: Security and Protection With PaX ASLR in place, such exploits must guess the seg- ment o sets from a search space of either 40 bits (if stack and libc o sets are guessed concurrently) or 25 bits (if se- General Terms quentially). In contrast, our return-to-libc technique uses addresses placed by the target program onto the stack. At- Security, Measurement tacks using our technique need only guess the libc text seg- ment o set, reducing the search space to an entirely prac- tical 16 bits. While our speci c attack uses only a single entry-point in libc, the exploit technique is also applicable Permission to make digital or hard copies of all or part of this work for to chained return-to-libc attacks. personal or classroom use is granted without fee provided that copies are Our implementation shows that bu er over ow attacks not made or distributed for profit or commercial advantage and that copies (as used by, e.g., the Slammer worm [11]) are as e ective on bear this notice and the full citation on the first page. To copy otherwise, to code randomized by PaX ASLR as on non-randomized code. republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Experimentally, our attack takes on the average 216 sec- CCS’04, October 25-29, 2004, Washington, DC, USA. onds to obtain a remote shell. Brute force attacks, like our Copyright 2004 ACM 1-58113-961-6/04/0010 ...$5.00. attack, can be detected in practice, but reasonable counter-
measures are dicult to design. Taking vulnerable machines Countermeasures. Several techniques were developed to oine results in a denial of service attack, and leaving them counter stack smashing | StackGuard by Cowan et al. [14] online while a x is sought allows the vulnerability to be detects stack smashing attacks by placing canary values next exploited. The problem of detecting and managing a brute to the return address. StackShield by Vendicator [32] makes force attack is especially exacerbated by the speed of our a second copy of the return address to check against before attack. While PaX ASLR appears to provide a slowdown in using it. These techniques are e ective for reducing the attack propagation, work done by Staniford et al. [31] sug- number of exploitable bu er over ows but does not com- gests that this slowdown may be inadequate for inhibiting pletely remove the threat. For example, Bulba and Kil3r [8] worm propagation. show how to bypass these bu er over ow defenses. Although our discussion is speci c to PaX ASLR, the ProPolice by Etoh [16] extends the ideas behind Stack- attack is generic and applies to other address-space ran- Guard by reordering local variables and function arguments, domization systems such as that in OpenBSD. The attack and placing canaries in the stack. ProPolice also copies also applies to any software program accessible locally or function pointers to an area preceding local variable bu ers. through a network connection. Our attack demonstrates ProPolice is packaged with the latest versions of OpenBSD. what we call a derandomization attack ; derandomization PointGuard by Cowan et al. [13] prevents pointer corruption converts any standard bu er-over ow exploit into an ex- by encrypting them while in memory and only decrypting ploit that works against systems protected by address-space values before dereferencing. randomization. The resulting exploit is as e ective as the original, but slower. On the other hand, the slowdown is not WX Pages and Return-to-libc. The techniques described sucient to prevent its being used in worms or in a targeted so far aim to stop attackers from seizing control of program attack. execution. A orthogonal technique called WX nulli es at- In the second part of the paper, we explore and analyze tacks that inject and execute code in a process's address the e ectiveness of more powerful randomization techniques space. WX is based on the observation that most of the such as increasing the frequency of re-randomization and exploits so far inject malicious code into a process's address also ner grained randomizations. We show that subse- space and then circumvent program control to execute the quent re-randomizations (regardless of frequency) after the injected code. Under WX, pages in the heap, stack, and initial address-space randomization improve security against other memory segments are marked either writable (W) or a brute force attack by at most a factor of 2. This result executable (X), but not both. StackPatch by Solar De- suggests that it would be far more bene cial to focus on signer [29] is a Linux kernel patch that makes the stack increasing the entropy in the address-space layout. Further- non-executable. The latest versions of Linux (through the more, this result shows that our brute force attacks are still PaX project [26]) and of OpenBSD contain implementations feasible against network servers that are restarted with dif- of WX. Our sample attack works on a system running PaX ferent randomization upon crashing (unlike Apache). We with WX. also analyze the e ectiveness of crash detectors in mitigat- With WX memory pages, attackers cannot inject and ing such attacks. execute code of their own choosing. Instead, they must use Our analysis suggests that runtime address-space random- existing executable code | either the program's own code or ization is far less e ective on 32-bit architectures than com- code in libraries loaded by the program. For example, an monly believed. Compile-time address-space randomization attacker can overwrite the stack above the return address can be more e ective than runtime randomization because of the current frame and then change the return address to the address space can be randomized at a much ner gran- point to a function he wishes to call. When the function ularity at compile-time than runtime (e.g., by reordering in the current frame returns, program control ow is redi- functions within libraries). We note that bu er over ow rected to the attacker's chosen function and the overwritten mitigation techniques can prevent some attacks, including portions of the stack are treated as arguments. the one we present in this paper. However, over ow mitiga- Traditionally, attackers have chosen to call functions in tion by itself without any address-space randomization also the standard C-language library, libc, which is an attrac- defeats many of these attacks. Thus, the security provided tive target because it is loaded into every Unix program and by over ow mitigation is largely orthogonal to address-space encapsulates the system-call API by which programs access randomization. such kernel services as forking child processes and commu- We speculate that the most promising solution appears to nicating over network sockets. This class of attacks, orig- be upgrading to a 64-bit architecture. Randomization comes inally suggested by Solar Designer [30], is therefore known at a cost: in both 32 and 64 bit architectures, randomized as \return-to-libc." executables are more dicult to debug and support. Implementations of WX on CPUs whose memory-man- agement units lack a per-page execute bit | for example, current x86 chips | incur a signi cant performance penalty. 1.1 Related Work Another defense against malicious code injection is ran- domized instruction sets [6, 21]. On the other hand, ran- Exploits. Bu er over ow exploits started with simple stack domized instruction sets are ine ective against return-to- smashing techniques where the return address of the current libc attacks for the same reasons as those given above for stack frame is overwritten to point to injected code [1]. After WX pages. the easy stack smashing vulnerabilities were discovered and exploited, a urry of new attacks emerged that exploited Address-Space Randomization. Observe that a \return- over ows in the heap [20], format string errors [28], integer to-libc" attack needs to know the virtual addresses of the over ows [35], and double-free() errors [2]. libc functions to be written into a function pointer or return
address. If the base address of the memory segment con- lar, the mapped data o set, called delta mmap, is limited to taining libc is randomized, then the success rate of such an 16 bits of randomness because (1) altering bits 28 through attack signi cantly decreases. This idea is implemented in 31 would limit the mmap() system call's ability to handle PaX as ASLR [27]. PaX ASLR randomizes the base address large memory mappings, and (2) altering bits 0 through 11 of the stack, heap, code, and mmap()ed segments of ELF ex- would cause memory mapped pages not to be aligned on ecutables and dynamic libraries at load and link time. We page boundaries. implemented our attack against a PaX hardened system and Our attack takes advantage of two characteristics of the will give a more detailed description of PaX in Sect. 2.1. PaX ASLR system. First, because PaX ASLR randomizes Previous projects have employed address randomization only the base addresses of the three memory areas, once as a security mechanism. Yarvin et al. [34] develop a low- any of the three delta variables is leaked, an attacker can overhead RPC mechanism by placing bu ers and executable- x the addresses of any memory location within the area but-unreadable stubs at random locations in the address controlled by the variable. In particular, we are interested space, treating the addresses of these bu ers and stubs as ca- in the delta mmap variable that determines the randomized pabilities. Their analysis shows that a 32-bit address space o set of segments allocated by mmap(). As noted above, is insucient to keep processes from guessing such capabil- delta mmap only contains 16 bits of randomness. Because ity addresses, but that a 64-bit address space is, assuming a our return-to-libc technique does not need to guess any time penalty is assessed on bad guesses. stack addresses (unlike traditional return-to-libc attacks), Bhatkar et al. [7] de ne and discuss address obfuscation. our attack only needs to brute force the small amount of Their implementation randomizes the base address of the entropy in delta mmap. Our attack only requires a linear stack, heap, and code segments and adds random padding search of the randomized address space. That is, our exploit to stack frame and malloc() function calls. They imple- requires 216 = 65; 536 probes at worst and 32,768 probes on mented a binary tool that rewrites executables and object the average, which is a relatively small number. les to randomize addresses. Randomizing addresses at link Second, in PaX each o set variable is xed throughout a and compilation time xes the randomizations when the sys- process's lifetime, including any processes that fork() from tem is built. This approach has the shortcoming of giv- a parent process. Many network daemons, speci cally the ing an attacker a xed address-space layout that she can Apache web server, fork child processes to handle incoming probe repeatedly to garner information. Their solution to connections, so that determining the layout of any one of this problem is periodically to \re-obfuscate" executables these related processes reveals that layout for all of them. and libraries | that is, periodically relink and recompile ex- Although this behavior on fork() is not a prerequisite for ecutables and libraries. As pointed out in their paper, this our attack, we show in Sect. 3.2 that it halves the expected solution interferes with host based intrusion detection sys- time to success. tems based on les' integrity checksums. Our brute force attack works just as well on the published version of this 2.2 Return-to-libc Attack system because their published implementation only ran- We give a high level overview of the attack before describ- domizes the base address of libraries a la PaX. ing its implementation in greater detail and giving experi- Xu et al. [33] designed a runtime randomization system mental data. We emphasize that although our discussion is that does not require kernel changes, but is otherwise sim- speci c to PaX ASLR, the attack applies to other address- ilar to PaX. The primary di erence between their system space randomization systems such as that in OpenBSD. and PaX is that their system randomizes the location of the Global O set Table (GOT) and patches the Procedu- 2.2.1 Overview ral Linkage Table (PLT) accordingly. Our attack also works We implemented our attack on the Apache web server against their system because: (1) their system uses 13 bits running on Linux with PaX ASLR and WX pages. The of randomness (3 bits less than PaX), and (2) our attack current version of the Apache server (1.3.29) has no known does not need to determine the location of the GOT. over ows, so we replicated a bu er over ow similar to one discovered in the Oracle 9 PL/SQL Apache module [10, 22]. 2. BREAKING PAX ASLR This Oracle hole can be exploited using a classic bu er over- We brie y review the design of PaX and Apache before ow attack | an attacker injects her own code by supply- describing our attack and experimental results. ing an arbitrarily long request to the web server that over- ows an internal bu er. Nevertheless, this attack fails in 2.1 PaX ASLR Design an Apache server protected by PaX WX. Instead, we ex- PaX applies ASLR to ELF binaries and dynamic libraries. ploit this hole using the return-to-libc technique discussed For the purposes of ASLR, a process's user address space in Sect. 1.1. consists of three areas, called the executable, mapped, and Our return-to-libc technique is non-standard. Chained stack areas. The executable area contains the program's return-to-libc attacks generally rely on prior knowledge of executable code, initialized data, and uninitialized data; the stack addresses. PaX randomizes 24 bits of stack base ad- mapped area contains the heap, dynamic libraries, thread dresses (on x86), making these attacks infeasible. However, stacks, and shared memory; and the stack area is the main PaX does not randomize the stack layout, which allows us user stack. to locate a pointer to attacker supplied data on the stack. ASLR randomizes these three areas separately, adding to Moreover, a randomized layout would provide no protection the base address of each one an o set variable randomly against access to data in the top stack frame, and little pro- chosen when the process is created. For the Intel x86 ar- tection against access to data in adjacent frames. chitecture, PaX ASLR provides 16, 16, and 24 bits of ran- Our attack against Apache occurs in two steps. We rst domness, respectively, in these memory areas. In particu- determine the value of delta mmap using a brute force at-
top of stack (higher addresses) top of stack (higher addresses) .. .. . . ap getline() arguments 0x01010101 saved EIP 0xDEADBEEF saved EBP guessed address of usleep() 64 byte bu er 0xDEADBEEF .. 64 byte bu er, now lled with A's . .. bottom of stack (lower addresses) . bottom of stack (lower addresses) Figure 1: Apache child process stack before probe Figure 2: Stack after one probe tack that pinpoints an address in libc. Once the delta mmap value is obtained, we mount a return-to-libc attack to ob- of delta mmap followed by the correct virtual addresses of tain a shell. system() and ret, with the simple sum First, the attack repeatedly over ows the stack bu er ex- posed by the Oracle hole with guesses for the address of address = 0x40000000 + o set + delta mmap: the libc function usleep() in an attempt to return into (Here 0x40000000 is the standard base address for memory the usleep() function. An unsuccessful guess causes the obtained with mmap() under Linux.) Apache child process to crash, and the parent process to fork a new child in its place, with the same randomization Exploit Step 1. As mentioned in the overview, the rst step deltas. A successful exploit causes the connection to hang is to determine the value of delta mmap. We do this by re- for 16 seconds and gives enough information for us to de- peatedly over owing the stack bu er exposed by the Oracle duce the value of delta mmap. Upon obtaining delta mmap, hole with guesses for usleep()'s address in an attempt to we now know the location of all functions in libc, including return into the usleep() function in libc. More speci cally, the system() function.1 With this information, we can now the brute force attack works as follows: mount a return-to-libc attack on the same bu er exposed by the Oracle hole to invoke the system() function. 1. Iterate over all possible values for delta mmap starting Our attack searches for usleep() rst only for conve- from 0 and ending at 65535. nience; it could instead search directly for system() and check periodically whether it has obtained a shell. Our at- 2. For each value of delta mmap, compute the guess for tack can therefore be mounted even if libc entry points the randomized virtual address of usleep() from its are independently randomized, a possibility we consider in o set. Sect. 3.3.2. 3. Create the attack bu er (described later) and send it 2.2.2 Implementation to the Apache web server. We rst describe the memory hole in the Oracle 9 PL/SQL 4. If the connection closes immediately, continue with the Apache module. next value of delta mmap. If the connection hangs for 16 seconds, then the current guess for delta mmap is Oracle Buffer Overflow. We create a bu er over ow in correct. Apache similar to one found in Oracle 9 [10, 22]. Speci cally, we add the following lines to the function ap getline() in The contents of the attack bu er sent to Apache are best http protocol.c: described by illustrations of the Apache child process's stack before and after over owing the bu er with the current char buf[64]; guess for usleep()'s address. Figure 1 shows the Apache .. child process's stack before the attack is mounted and Fig- . ure 2 shows the same stack after one guess for the address strcpy(buf,s); /* Overflow buffer */ of usleep(). The saved return address of ap getline() (saved EIP) Although the bu er over ow in the Oracle exploit is 1000 is overwritten with the guessed address of the usleep() bytes long, we use a shorter bu er for the sake of brevity. function in the libc library, the saved EBP pointer is over- In fact, a longer bu er works to the attacker's advantage written with usleep()'s return address 0xDEADBEEF, and because it gives more room to supply shell commands. 0x01010101 (decimal 16,843,009) is the argument passed to usleep() (the sleep time in microseconds). Any shorter time Precomputing libc Addresses. In order to build the ex- interval results in null bytes being included in the attack ploit, we must rst determine the o sets of the functions bu er.2 Note that the method for placing null bytes onto the system(), usleep(), and a ret instruction in the libc li- stack by Nergal [24] is infeasible because stack addresses are brary. The o sets are easily obtained using the system strongly randomized. Finally, when ap getline() returns, objdump tool. With these o sets, once the exploit deter- control passes to the guessed address of usleep(). If the mines the address of usleep(), we can deduce the value 2 Null bytes act as C string terminators, causing strcpy() 1 The system() function executes user-supplied commands (our attack vector) to terminate before over owing the entire via the standard shell (usually /bin/sh). bu er.
top of stack (higher addresses) top of stack (higher addresses) .. .. . . ap getline() arguments pointer into 64 byte bu er saved EIP 0xDEADBEEF saved EBP address of system() 64 byte bu er address of ret instruction .. .. . . bottom of stack (lower addresses) address of ret instruction 0xDEADBEEF Figure 3: Apache child process stack before over ow 64 byte bu er (contains shell commands) .. . value of delta mmap (and hence the address of usleep()) bottom of stack (lower addresses) is guessed correctly, Apache will hang for approximately 16 seconds and then terminate the connection. If the ad- Figure 4: Stack after bu er over ow dress of usleep() is guessed incorrectly, the connection ter- minates immediately. This di erence in behavior tells us when we have guessed the correct value of delta mmap. tal of approximately 200 bytes of network trac, including Ethernet, IP, and TCP headers. Therefore, our brute force Exploit Step 2. Once delta mmap has been determined, we attack only sends a total of 12.8 MB of network data at can compute the addresses of all other functions in libc with worst, and 6.4 MB of network data on expectation. certainty. The second step of the attack uses the same Ora- After running 10 trials, we obtained the following timing cle bu er over ow hole to conduct a return-to-libc attack. measurements (in seconds) for our attack against the PaX The composition of the attack bu er sent to the Apache web ASLR protected Apache server: server is the critical component of step 2. Again, the con- Average Max Min tents of the attack bu er are best described by illustrations 216 810 29 of the Apache child process's stack before and after the step 2 attack. Figure 3 shows the Apache child process's stack The speed of our attack is limited by the number of child before the attack and Figure 4 shows the stack immediately processes Apache allows to run concurrently. We used the after the strcpy() call in ap getline() (the attack bu er default setting of 150 in our experiment. has already been injected). The rst 64 bytes of the attack bu er is lled with the 2.3 Information Leakage Attacks shell command that we want system() to execute on a suc- In the presence of information leakage, attacks can be cessful exploit. The shell command is followed by a series crafted that require fewer probes and are therefore more ef- of pointers to ret instructions that serves as a \stack pop" fective than our brute force attack in defeating randomized sequence. Recall that the ret instruction pops 4 bytes from layouts. For instance, Durden [15] shows how to obtain the the stack into the EIP register, and program execution con- delta_mmap variable from the stack by retrieving the return tinues from the address now in EIP. Thus, the e ect of this address of the main() function using a format string vulner- sequence of rets is to pop a desired number of 32-bit words ability. Durden also shows how to convert a special class of o the stack. Just above the pointers to ret instructions, the bu er over ow vulnerabilities into a format string vulnera- attack bu er contains the address of system(). The stack bility. pop sequence \eats up" the stack until it reaches a pointer Not all over ows, however, can be exploited to create a pointing into the original 64 byte bu er, which serves as the format string bug. Furthermore, for a remote exploit, the argument to the system() function. We nd such a pointer leaked information has to be conveyed back to the attacker in the stack frame of ap getline()'s calling function. over the network, which may be dicult when attacking After executing strcpy() on the exploited bu er, Apache a network daemon. Note that the brute force attack de- returns into the sequence of ret instructions until it reaches scribed in the previous section works against any bu er over- system(). Apache then executes the system() function with ows and does not make any assumptions about the network the supplied commands. In our attack, the shell command server. is \wget http://www.example.com/dropshell ; chmod +x dropshell ; ./dropshell ;" where dropshell is a pro- 3. IMPROVEMENTS TO ADDRESS-SPACE gram that listens on a speci ed port and provides a remote shell with the user id of the Apache process. Note that any RANDOMIZATION ARCHITECTURE shell command can be executed. Our attack on address-space randomization relied on sev- eral characteristics of the implementation of PaX ASLR. In 2.2.3 Experiments particular, our attack exploited the low entropy (16 bits) of The brute force exploit was executed on a 2.4 GHz Pen- PaX ASLR on 32-bit x86 processors, and the feature that tium 4 machine against a PaX ASLR (for Linux kernel ver- address-space layouts are randomized only at program load- sion 2.6.1) protected Apache server (version 1.3.29) running ing and do not change during the process lifetime. This sec- on a Athlon 1.8 GHz machine. The two machines were con- tion explores the consequences of changing either of these nected over a 100 Mbps network. assumptions by moving to a 64-bit architecture or making Each probe sent by our exploit program results in a to- the randomization more frequent or more ne-grained.
3.1 64-Bit Architectures We now analyze the expected number of probe attempts In case of Linux on 32-bit x86 machines, 16 of the 32 ad- for a brute force attack to succeed against a network server dress bits are available for randomization. As our results in both scenarios. In each case, let n be the number of bits show, 16 bits of address randomization can be defeated by of randomness that must be guessed to successfully mount a brute force attack in a matter of minutes. Any 64-bit the attack, implying that there are 2n possibilities. Fur- machine, on the other hand, is unlikely to have fewer than thermore, only 1 out of these 2n possibilities is correct. The 40 address bits available for randomization given that mem- brute force attack succeeds once it has determined the cor- ory pages are usually between 4 kB and 4 MB in size. On- rect state. line brute force attacks that need to guess at least 40 bits of randomness can be ruled out as a threat, since an attack of Scenario 1. In this scenario, the server has a xed address- this magnitude is unlikely to go unnoticed. Although 64-bit space randomization throughout the attack. Since the ran- machines are now beginning to be more widely deployed, 32- domization is xed, we can compute the expected number bit machines are likely to remain the most widely deployed of probes required by a brute force attack by viewing the machines in the short and medium term. Furthermore, ap- problem as a standard sampling without replacement prob- plications that run in 32-bit compatibility mode on a 64-bit lem. The probability that the brute force attack succeeds machine are no less vulnerable than when running on a 32- only after taking exactly t probes is bit machine. 2n 1 2n 2 2n t 1 1 1 Some proposed 64-bit systems implement a global virtual 2 n 2n 1 ::: 2n t 2n t 1 = 2n ; address space, that is, all applications share a single 64- | {z } bit address space [12]. Analyzing the e ectiveness of ad- Pr[ rst t 1 probes fail] dress randomization in these operating systems is beyond where n is the number of bits of randomness in the address the scope of this paper. space. Therefore, the expected number of probes required for scenario 1 is 3.2 Randomization Frequency 2n 2n PaX ASLR randomizes a process's memory segments only 21n = 21n = (2n + 1)=2 2n 1 X X at process creation. If we randomize the address space lay- t=1 t t=1 t : out of a process more frequently, we might naively expect a signi cant increase in security. However, we will demon- strate that after the initial address space randomization, Scenario 2. In this scenario, the server's address space is periodic re-randomizing adds no more than 1 bit of secu- re-randomized with every probe. Therefore, the expected rity against brute force attacks regardless of the frequency, number of probes required by a brute force attack can be providing little extra security. This also shows that brute computed by viewing the problem as a sampling with re- force attacks are feasible even against non-forking network placement problem. The probability that the brute force daemons that crash on every probe. On the other hand, fre- attack succeeds only after taking exactly t probes is given quent re-randomizations can mitigate the damage when the by the geometric random variable with p = 1=2n . The ex- layout of a xed randomized address space is leaked through pected number of probes required is 1=p = 2n . other channels. We analyze the security implications of increasing the fre- Conclusions. We can easily see that a brute force attack quency of address-space randomization by considering two in scenario 2 requires approximately 2n=2n 1 = 2 times as brute force attack scenarios: many probes compared to scenario 1. Since scenario 2 repre- 1. The address-space randomization is xed during the sents the best possible frequency that an ASLR program can duration of an attack. For example, this scenario ap- do, we conclude that increasing the frequency of address- plies to our brute force attack against the current im- space re-randomization is at best equivalent to increasing plementation of PaX ASLR or in any situation where the entropy of the address space by only 1 bit. the randomized address space is xed at compile-time. The di erence between a forking server and a non-forking server for the purposes of our brute force attack is that 2. The address-space randomization changes with each for the forking server, the address-space randomization is probe. It is pointless to re-randomize the address space the same for all the probes, whereas the non-forking server more than once between any two probes. Therefore, crashes and has a di erent address-space randomization on this scenario represents the best re-randomization fre- every probe. This di erence is exactly that between scenar- quency for a ASLR program. This scenario applies, for ios 1 and 2. Therefore, the brute force attack is also feasible example, to brute force attacks attacks against non- against non-forking servers if the address-space entropy is forking servers protected by PaX ASLR that crash on low. For example, in the case of Apache protected by PaX every probe; these servers are restarted each time with ASLR, we expect to perform 215 = 32; 768 probes before a di erent randomized address-space layout. xing the value of delta mmap, whereas if Apache was a sin- gle process event driven server that crashes on each probe, The brute force attacks in the two scenarios are di erent. the expected number of probes required doubles to a mere In scenario 1, a brute force attack can linear search the ad- 216 = 65; 536. dress space through its probes before launching the exploit (exactly our attack in Sect. 2). In scenario 2, a brute force 3.3 Randomization Granularity attack guesses the layout of the address space randomly, PaX ASLR only randomizes the o set location of an en- tailors the exploit to the guessed layout, and launches the tire shared library. The following sections discuss the fea- exploit. sibility of randomizing addresses at an even ner granular-
ity. For example, in addition to randomizing segment base Reordering Functions. At rst glance, randomizing the addresses, we could also randomize function and variable order in which individual functions appear within a library addresses within memory segments. Finer grained address or executable appears e ective in preventing an attacker randomization can potentially stymie brute force attacks by from extending knowledge of the actual address of one func- increasing the randomness in the address space. For ex- tion in a library into knowledge of every function address in ample, if the delta mmap variable in PaX ASLR contained that library. Nevertheless, this technique does not make it 28 bits of randomness instead of 16 bits, then our brute any more dicult to guess a single function's address. Be- force attack would become infeasible. We divide our anal- cause our attack can be modi ed so that it only needs to nd ysis by considering address randomization at both runtime one function's address | that of the system() function | and compile-time. this technique is ine ective against such brute force attacks. On the other hand, this technique is e ective against return- 3.3.1 Randomizing At Compile-Time to-libc attacks that use multiple libc function calls, so it is worth exploring the technical issues in implementing it. Beyond simple randomization of segments' base addresses, The process of compiling and linking xes many relation- the compiler and linker can be easily modi ed to randomize ships between runtime addresses. For example, in a stan- variable and function addresses within their segments, or to dard shared library, the di erence in the addresses of any introduce random padding into stack frames. Increasing the two given functions remains constant between library loads. granularity of address-space randomization at compile and As a result, internal function calls within a shared library link time is easier than at the start of program execution may use direct relative jumps. Such relative jumps prevent because source code contains more relocation information reordering of function addresses as part of dynamic linking than precompiled and prelinked program binaries. at runtime. By modifying the compiler and linker, we can Compile-time randomization was used by Bhatkar et al. [7] eliminate relative jumps at compile-time and defer resolu- to implement address randomization with a modi ed com- tion of o sets until runtime dynamic linking, which allows piler and linker. Unfortunately, their published implemen- us to order functions arbitrarily or even load functions from tation does not randomize more than the base addresses one library into arbitrary, non-contiguous portions of vir- of library and executable segments and therefore gives no tual memory. The same applies to executables. Because greater security than PaX ASLR against our derandomiza- indirect jumps through pointers are more expensive than tion attack. direct relative jumps, these changes will exact a small run- On the other hand, compile-time randomization is not time performance penalty. limited by the page granularity of the virtual memory sys- A naive implementation of function address randomiza- tem. By placing entry points in a random order within a tion runs into an additional problem: a page can only be library, a compiler can provide 10{12 additional bits of en- shared among processes if it has the same content in each. tropy (depending on architecture). Since shared libraries are Because functions are not generally page-aligned or an exact by their nature shared, however, the location of entry points multiple of a page in length, shuing them causes library within these libraries can be discovered by any user on the pages to di er from one process to another. Thus, naively system, or revealed by any compromised server running on shuing functions eliminates sharing, an important advan- the same machine. Recompiling the standard libraries in tage of shared libraries, with accompanying cost in time a Unix distribution is a lengthy and computation-intensive and space. Fixing the problem is not dicult, requiring process, and is unlikely to be undertaken frequently. How- only clustering functions into page-size (or page-multiple) ever, some form of dynamic binary re-writing may be possi- groups, then shuing the groups instead of individual func- ble. tions. The result yields less diversity, because fewer (and larger) units are shued, but should perform much better. 3.3.2 Randomizing at Runtime Finally, regardless of how well functions are randomized, Next we consider implementing ner granularity random- code that needs to call these functions must be able to ization such as function reordering within a shared library locate them quickly. In modern ELF-based Unix-like sys- or executable at runtime. tems, shared library functions are found by consulting the Global O set Table (GOT), an array of pointers initialized Randomizing More than 16 Bits. Since at most 16 bits by the runtime dynamic linker. Each dynamic object nor- of the available 32 bits are randomized by PaX ASLR and mally maintains its own GOT and refers to it via relative other ASLR systems on 32 bit architectures, we examine o sets xed at link time. Shuing functions changes relative the possibility of increasing the number of randomized bits o sets, rendering this simple approach untenable. Thus, we at runtime. On typical systems, 12 of the 32 address bits need some new way to nd shared library functions, either are page o set bits, which cannot be randomized at runtime one based on the GOT or an entirely new technique. without signi cant modi cation to the underlying virtual Any acceptable replacement or x for the GOT must sat- memory system or memory management hardware. From isfy several constraints. Lookups must be fast, because func- the remaining 20 bits, the PaX system randomizes only 16 tion calls are common and with shuing almost every func- bits. The top 4 bits are not randomized so as to prevent frag- tion call requires a lookup (without shuing, only inter- mentation of virtual address space. Since signi cant mod- library calls require lookups). Lookups must require little i cations to the virtual memory system are best avoided, code because they must be inlined (otherwise we need a we see that at most 20 bits can be randomized. Given our way to nd the code to do a lookup, which is a recursive results for derandomizing 16 random bits, guessing 20 bits instance of our problem). The GOT replacement must not would take roughly only 24 = 16 times longer, which is still break sharing of code pages, because of the associated mem- within the range of a practical attack. ory cost and cache penalties. Finally, the GOT replacement
must not place data or code in xed or easily calculated violation to be induced, then Amazon can be taken oine memory locations or replicate data so many times that it persistently, with a minimum of attacker e ort. Being taken becomes easy to locate. oine persistently can be costly; reports in 2000 show that We have not found any solution that satis es all of these Amazon loses about $180,000 per hour of downtime [25]. constraints. If we discard the concept of a GOT entirely and While it may be true that Amazon would do better with use the dynamic loader to x up addresses in objects at load disabled servers than compromised servers | that, in the time, we also prevent sharing code pages. If we make multi- end, is an economic question | it is, nevertheless, also true ple copies of the GOT in virtual memory, positioning one at that it is dicult to distinguish exploitable vulnerabilities a xed relative o set to each code page, the numerous copies from mere (segfault-inducing) denial of service. Neither substantially increase an attacker's chance of locating a copy an automated watcher program nor a system administra- via random probing. If we reserve a register for locating the tor working under time pressure can be expected to make current library's GOT, we are likely to cause problems due to the correct determination. register scarcity on the x86, although we could use the frame It is worth illustrating how dicult these two cases are pointer register (EBP) at the cost of making code dicult to to distinguish, even for expert programmers. The Apache debug. (Moreover, each library must manage its own GOT, chunked-encoding vulnerability [9] was for several days be- so the value in the register must change and be restored in lieved, by the Apache developers themselves, not to be ex- inter-library calls.) All other solutions we have considered ploitable on 32-bit platforms: \Due to the nature of the are similarly problematic. Designing a linking architecture over ow on 32-bit Unix platforms this will cause a segmen- that facilitates function shuing in shared code pages e- tation violation and the child will terminate" [4]. After the ciently and securely is an open problem and a direction for release of a working exploit for 32-bit BSD platforms, the future research. Apache developers revised their analysis: \Though we pre- We have seen that, by randomizing segment o sets, PaX viously reported that 32-bit platforms were not remotely ex- ASLR provides approximately 16 bits of entropy against ploitable, it has since been proven by Gobbles that certain brute force attack, in either forking or non-forking servers. conditions allowing exploitation do exist" [5]. Designing a runtime randomization system that randomizes Furthermore, unless the segfault watcher shuts down the with page granularity but maintains delity to the tradi- daemon permanently after a single segmentation violation, tional Unix dynamic-linking system is nontrivial. Also, re- an attacker can still slip under the radar. For example, if randomization of a running C program is not feasible; and the watcher acts after observing ten crashes in a one-minute if it were feasible, such a technique would also not deliver period, the attacker can seek addresses by brute force at the additional entropy. Thus, on 32-bit systems, runtime ran- rate of nine attempts per minute. The same holds if the domization cannot provide more than 16{20 bits of entropy. watcher keeps a daemon shut down for several seconds after a crash. Such a watcher is, furthermore, as much a force 3.4 Monitoring and Catching Errors multiplier for denial of service as one that shuts down the The PaX developers suggest that ASLR be combined with watched daemon after a single crash. \a crash detection and reaction mechanism" [27], which we Finally, a watcher could attempt to prevent an attacker call a watcher. An attacker who attempts to discover ad- from exploiting a vulnerability while allowing the daemon dresses within ASLR-protected executables will, in the pro- to continue running. It might, for example, attempt to de- cess, trigger segmentation violations through his inevitably termine the network source of the o ending requests and incorrect guesses. The watcher can detect these segmenta- selectively rewall the source away from the daemon. But tion violations and take action to impede the attacker; for this assumes that the attacker can be e ectively localized. example, shut down the program under attack. With zombie networks numbering hundreds of thousands of We do not believe that the crash watcher is a viable de- compromised hosts available for use as launchpads [17, 23], fense mechanism because of the limited actions the crash attackers can design and deploy worms that attack vulner- watcher can undertake when it discovers that a PaX-pro- able daemons in a coordinated fashion: no source machine tected forking daemon is experiencing segmentation faults. needs to connect to the attacked machine more than once, Either the watcher alerts an administrator or it acts on its so a rewalling watcher is of no value. Properly-engineered own. If it acts on its own, it can either shut down the automated threats, therefore, are capable of bypassing even daemon entirely or attempt to prevent the attacker from rewalling watchers unimpeded. exploiting it. Sites that run large numbers of servers often load-balance If the watcher alerts an administrator, then it is di- incoming requests. In such situations clients are not always cult to see how the administrator can react in time. Our guaranteed persistent sessions with a single server, but in- demonstrated attack can be completed in 216 seconds on stead get a di erent server assigned to each request. (Load the average, less time than would be necessary to diagnose balancing slows down our attack only by a factor of 2.) A the network trac, read BugTraq, assess the severity of the watcher running locally on one of these servers would be un- situation, and take corrective measures. The administra- able to detect an attack, since subsequent segfault-inducing tor could also shut down the daemon before attempting a requests are likely to be routed to di erent servers. In order diagnosis, but in this case he would be acting no more in- to detect such an attack, a networked watcher is required telligently than the watcher might. that can correlate segfault-inducing requests. Such a net- If, indeed, the watcher shuts down the daemon altogether worked watcher would be dicult to implement and would pending an administrator's attention, then it in e ect acts not be much better at making watcher decisions than a host as a force multiplier for denial of service. If Amazon.com's based watcher, due to the inherent diculty of implement- Apache servers are PaX-protected and watched, and a vul- ing a realistic watcher strategy. nerability is discovered in Apache that allows a segmentation In summary, the discussion above suggests that any rea-
sonable implementation of the crash watcher suggested by onal to address-space randomization. the PaX documentation cannot prevent an attack such as While compile-time and runtime randomization can be we describe above from succeeding, except at the cost of fa- combined to yield better security, the most promising solu- cilitating and exacerbating denial-of-service vulnerabilities tion appears to be upgrading to a 64-bit architecture. Our in the watched daemon. attack is ine ective on 64-bit architectures. On 32-bit ar- chitectures, it is dicult to design randomized systems that 3.5 Anti-Buffer Overflow Techniques resist brute force attacks. Applications that run in 32-bit Over ow mitigation systems that protect the stack, such compatibility mode on a 64-bit machine are no less vulner- as StackGuard [14], ProPolice [16], and PointGuard [13], able than when running on a 32-bit machine. make it more dicult for an attacker to use a stack-based over ow to write arbitrary data onto the stack. (PointGuard 5. ACKNOWLEDGMENTS also encrypts pointers.) Some vulnerabilities, including the The authors thank Constantine Sapuntzakis for his de- one we exploited in Sect. 2.2, can no longer be exploited in tailed comments on the manuscript. the presence of over ow mitigation. However, over ow mit- igation by itself, without address-space randomization, also 6. REFERENCES defeats many of these attacks. Thus, the security provided [1] Aleph One. Smashing the stack for fun and pro t. by over ow mitigation is largely orthogonal to address-space Phrack Magazine, 49(14), Nov. 1996. randomization. http://www.phrack.org/phrack/49/P49-14. [2] Anonymous. Once upon a free(). Phrack Magazine, 4. CONCLUSIONS 57(9), Aug. 2001. We showed that any bu er-over ow attack can be made http://www.phrack.org/phrack/57/p57-0x09. to work against Apache running under PaX Address Space [3] Apache Software Foundation. The Apache HTTP Layout Randomization and Write or Execute Only pages. Server project. http://httpd.apache.org. Experimentally, our attack took, on the average, 216 seconds [4] Apache Software Foundation. ASF bulletin 20020617, to obtain a remote shell. June 2002. http://httpd.apache.org/info/ Our exploit employed a novel return-to-libc technique in security_bulletin_20020617.txt. which it is not necessary for the attacker to guess addresses [5] Apache Software Foundation. ASF bulletin 20020620, on the stack. Brute force was needed only to nd a single June 2002. http://httpd.apache.org/info/ 16-bit delta. Although our implemented exploit was speci c security_bulletin_20020620.txt. to PaX ASLR and Apache, the attack is generic and ap- [6] E. G. Barrantes, D. H. Ackley, T. S. Palmer, plies to other address-space randomization systems such as D. Stefanovic, and D. D. Zovi. Randomized instruction that in OpenBSD. The attack also applies to any software set emulation to disrupt binary code injection attacks. program that accepts connections from the network. This In Proc. 10th ACM Conf. Comp. and Comm. attack is an instance of a derandomization attack, which con- Sec. | CCS 2003, pages 281{9. ACM Press, Oct. 2003. verts any standard bu er-over ow exploit into an exploit [7] S. Bhatkar, D. DuVarney, and R. Sekar. Address that works against systems protected by address-space ran- obfuscation: An ecient approach to combat a broad domization. The resulting exploit is as e ective as the orig- range of memory error exploits. In V. Paxson, editor, inal, but slower; the slowdown is not sucient to frustrate Proc. 12th USENIX Sec. Symp., pages 105{20. worms or targeted attacks. USENIX, Aug. 2003. Our results suggest that, for current 32-bit architectures, [8] Bulba and Kil3r. Bypassing StackGuard and (1) address-space randomization is ine ective against the StackShield. Phrack Magazine, 56(5), May 2000. possibility of generic exploit code for a single aw; and (2) http://www.phrack.org/phrack/56/p56-0x05. brute force attacks can be ecient, and hence e ective. In addition, we have analyzed the e ectiveness of more [9] CERT, June 2002. http://www.cert.org/advisories/CA-2002-17.html. powerful randomization techniques such as increasing the frequency and granularity of randomization. Subsequent [10] CERT. CERT advisory CA-2002-08: Multiple re-randomizations (regardless of frequency) after the initial vulnerabilities in Oracle servers, Mar. 2002. address-space randomization increases resistance to brute http://www.cert.org/advisories/CA-2002-08.html. force attack by at most a factor of 2. We also argue that [11] CERT. CERT advisory CA-2003-04: MS-SQL Server one cannot e ectively prevent our attack without introduc- worm, Jan. 2003. ing a serious denial-of-service vulnerability. http://www.cert.org/advisories/CA-2003-04.html. Compile-time address-space randomization is more e ec- [12] J. S. Chase, H. M. Levy, M. Baker-Harvey, and E. D. tive than runtime randomization because it can randomize Lazowska. How to use a 64-bit address space. addresses at a ner granularity, but the randomization it Technical Report 92-03-02, University of Washington, produces is more vulnerable to information leakage. To pro- Department of Computer Science and Engineering, tect against information leakage, sensitive daemons should March 1992. be placed within a chroot environment along with their li- [13] C. Cowan, S. Beattie, J. Johansen, and P. Wagle. braries, so that user accounts and other daemons running PointGuard: Protecting pointers from bu er over ow on the same machine cannot be subverted into revealing the vulnerabilities. In V. Paxson, editor, Proc. 12th compile-time randomization used in the sensitive daemons. USENIX Sec. Symp., pages 91{104. USENIX, Aug. Bu er over ow mitigation techniques can protect against 2003. our attack, even in the absence of address-space randomiza- [14] C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, tion. Thus, the use of over ow mitigation is largely orthog- S. Beattie, A. Grier, P. Wagle, and Q. Zhang.
StackGuard: Automatic detection and prevention of [33] J. Xu, Z. Kalbarczyk, and R. Iyer. Transparent bu er-over ow attacks. In A. Rubin, editor, Proc. 7th runtime randomization for security. In A. Fantechi, USENIX Sec. Symp., pages 63{78. USENIX, Jan. editor, Proc. 22nd Symp. on Reliable Distributed 1998. Systems | SRDS 2003, pages 260{9. IEEE Computer [15] T. Durden. Bypassing PaX ASLR protection. Phrack Society, Oct. 2003. Magazine, 59(9), June 2002. [34] C. Yarvin, R. Bukowski, and T. Anderson. http://www.phrack.org/phrack/59/p59-0x09. Anonymous RPC: Low-latency protection in a 64-bit [16] H. Etoh and K. Yoda. ProPolice: Improved address space. In Proc. USENIX Summer 1993 stack-smashing attack detection. IPSJ SIGNotes Technical Conf., pages 175{86. USENIX, June 1993. Computer SECurity, 014(025), Oct. 2001. [35] M. Zalewski. Remote vulnerability in SSH daemon http://www.trl.ibm.com/projects/security/ssp. CRC32 compression attack detector, Feb. 2001. [17] FedCIRC. BotNets: Detection and mitigation, Feb. http://www.bindview.com/Support/RAZOR/ 2003. http://www.fedcirc.gov/library/documents/ Advisories/2001/adv_ssh1crc.cfm. botNetsv32.doc. [18] S. Forrest, A. Somayaji, and D. Ackley. Building diverse computer systems. In J. Mogul, editor, Proc. 6th Work. Hot Topics in Operating Sys. | HotOS 1997, pages 67{72. IEEE Computer Society, May 1997. [19] D. Geer, R. Bace, P. Gutmann, P. Metzger, C. P eeger, J. Quarterman, and B. Schneier. Cybersecurity: The cost of monopoly | how the dominance of Microsoft's products poses a risk to security. Technical report, Comp. and Comm. Ind. Assn., 2003. [20] M. Kaempf. Vudo malloc tricks. Phrack Magazine, 57(8), Aug. 2001. http://www.phrack.org/phrack/57/p57-0x08. [21] G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proc. 10th ACM Conf. Comp. and Comm. Sec., pages 272{80. ACM Press, Oct. 2003. [22] D. Litch eld. Hackproo ng Oracle Application Server, Jan. 2002. http://www.nextgenss.com/papers/hpoas.pdf. [23] L. McLaughlin. Bot software spreads, causes new worries. IEEE Distributed Systems Online, 5(6), June 2004. http://csdl.computer.org/comp/mags/ds/ 2004/06/o6001.pdf. [24] Nergal. The advanced return-into-lib(c) exploits (PaX case study). Phrack Magazine, 58(4), Dec. 2001. http://www.phrack.org/phrack/58/p58-0x04. [25] D. Patterson. A simple way to estimate the cost of downtime. In A. Couch, editor, Proc. 16th Systems Administration Conf. | LISA 2002, pages 185{8. USENIX, Nov. 2002. [26] PaX Team. PaX. http://pax.grsecurity.net. [27] PaX Team. PaX address space layout randomization (ASLR). http://pax.grsecurity.net/docs/aslr.txt. [28] Scut/team teso. Exploiting format string vulnerabilities. http://www.team-teso.net, 2001. [29] Solar Designer. StackPatch. http://www.openwall.com/linux. [30] Solar Designer. \return-to-libc" attack. Bugtraq, Aug. 1997. [31] S. Staniford, V. Paxson, and N. Weaver. How to own the Internet in your spare time. In D. Boneh, editor, Proc. 11th USENIX Sec. Symp., pages 149{67. USENIX, Aug. 2002. [32] Vendicator. StackShield. http://www.angelfire.com/sk/stackshield.
You can also read