Editing Vulnerabilities
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
== | == Hardware Exploits == | ||
=== | === PCIe man-in-the-middle attack === | ||
* First done on 1.01 by failoverflow on PS4 launch ! | |||
* Detailed at 33c3: [https://fail0verflow.com/media/33c3-slides/#/5 33c3 slides by Marcan] | |||
* Permits kernel and userland dumping | |||
* | |||
* | |||
* | |||
=== syscon glitching === | |||
It is possible to glitch the syscon debug interface to allow access and dump keys. Originally done by an anonymous member of fail0verflow. | |||
=== | |||
=== | === Aeolia/Belize SCA/DPA === | ||
Aeolia side channel analysis with differential power analysis has been shown to be able to recover key material on all PS4 models. Since Sony never used private/public key pairs, it is possible to exploit this and gain complete control over the southbridge. You can attack the main FreeBSD kernel from here. | |||
==== | == WebKit/Userland Exploits == | ||
=== FW ? | === FW ?-6.20 - JSArray::shiftCountWithArrayStorage() OOB RW (CVE-2018-4441) === | ||
==== Credits ==== | ==== Credits ==== | ||
Line 506: | Line 23: | ||
==== Analysis ==== | ==== Analysis ==== | ||
* | * https://bugs.chromium.org/p/project-zero/issues/detail?id=1685 | ||
==== Bug Description ==== | ==== Bug Description ==== | ||
==== Exploit Implementation ==== | ==== Exploit Implementation ==== | ||
* | |||
* https://github.com/Cryptogenic/PS4-6.20-WebKit-Code-Execution-Exploit | |||
==== Patched ==== | ==== Patched ==== | ||
'''Yes''' in 6.50 FW | '''Yes''' in 6.50 FW | ||
---- | ---- | ||
=== FW 6.00-6.20 - JSC::arrayProtoPrivateFuncConcatMemcpy() Information Leak (CVE-2018-4358) | === FW 6.00-?6.20? - JSC::arrayProtoPrivateFuncConcatMemcpy() Information Leak (CVE-2018-4358) === | ||
==== Credits ==== | ==== Credits ==== | ||
* bkth, niklasb and saelo (from phoenhex Team) for the exploit PoC in Safari (Sep 26, 2018) | * bkth, niklasb and saelo (from phoenhex Team) for the exploit PoC in Safari (Sep 26, 2018) | ||
* Vultra for discovering that the exploit worked | * Vultra for discovering that the exploit worked since FW 6.00 (Dec 10, 2018) | ||
==== Analysis ==== | ==== Analysis ==== | ||
* https://github.com/WebKit/webkit/commit/b68b373dcbfbc68682ceeca8292c5c0051472071 | * https://github.com/WebKit/webkit/commit/b68b373dcbfbc68682ceeca8292c5c0051472071 | ||
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4358 | * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4358 | ||
Line 547: | Line 56: | ||
==== Tested ==== | ==== Tested ==== | ||
Works on 6.00-6.20. Not working on | Works on 6.00-6.20. Not working on <= 5.56 because JSC (JavaScriptCore) was too old. | ||
---- | ---- | ||
=== FW 4.50-5.56 - JSGlobalObject::haveABadTime() Type Confusion (CVE-2017-7005) | === FW 4.50-5.56 - JSGlobalObject::haveABadTime() Type Confusion (CVE-2017-7005) === | ||
==== Credits ==== | ==== Credits ==== | ||
* Lokihardt (from Google Project Zer0) for the exploit PoC (Mar 20, 2017) | * Lokihardt (from Google Project Zer0) for the exploit PoC (Mar 20, 2017) | ||
* ALEXZZZ9 for the first PS4 implementation (on 5.01), and at same time for burning the exploit (Feb 20, 2018) | * ALEXZZZ9 for the first PS4 implementation (on 5.01), and at same time for burning the exploit (Feb 20, 2018) | ||
* | * qwertyoruiopz for rewriting and porting to 5.05 and 5.50 | ||
==== Analysis ==== | ==== Analysis ==== | ||
Line 572: | Line 81: | ||
---- | ---- | ||
=== FW | === FW 4.50-5.01 - setAttributeNodeNS Use-After-Free === | ||
==== Credits ==== | ==== Credits ==== | ||
* Lokihardt (from Google Project Zer0) for the exploit PoC | * Lokihardt (from Google Project Zer0) for the exploit PoC | ||
* | * qwertyoruiopz for the rewriting for PS4 | ||
* Specter for the writeup | |||
* Specter for the writeup | |||
==== Analysis ==== | ==== Analysis ==== | ||
Line 641: | Line 103: | ||
---- | ---- | ||
=== FW 3.15-4.07 - Stack Uninitialized Read | === FW 3.15-4.07 - Stack Uninitialized Read UAF === | ||
==== Credits ==== | ==== Credits ==== | ||
* | * Uses parts of Pegasus webkit exploit | ||
* Specter | * Created by qwerty | ||
* Analysed by Specter | |||
==== Analysis ==== | ==== Analysis ==== | ||
Line 655: | Line 118: | ||
==== Exploit Implementation ==== | ==== Exploit Implementation ==== | ||
* [https://github.com/Cryptogenic/PS4-4.0x-Code-Execution-PoC Specter's commented and usable version] | * [https://github.com/Cryptogenic/PS4-4.0x-Code-Execution-PoC Specter's commented and usable version] | ||
* [https://gist.github.com/X41/36acd2a6939e4cebbecba45d35bf0d75 mirrorred expl.js from | * [https://gist.github.com/X41/36acd2a6939e4cebbecba45d35bf0d75 mirrorred expl.js from qwerty] | ||
==== Patched ==== | ==== Patched ==== | ||
Line 661: | Line 124: | ||
==== Tested ==== | ==== Tested ==== | ||
Works on 3.15-4.07. Not working on <= 3.11 | Works on 3.15-4.07. Not working on <=3.11. | ||
---- | ---- | ||
=== FW 3.15-3.70 - JSArray | === FW 3.15-3.70 - JSArray.sort() Use-After-Free === | ||
==== Credits ==== | ==== Credits ==== | ||
* xyz for the original exploit on PSVita | * xyz for the original exploit on PSVita | ||
* Fire30 for porting to PS4 | * Fire30 for porting to PS4 | ||
* Specter for improved PS4 playground | * Specter for improved PS4 playground | ||
==== Analysis ==== | ==== Analysis ==== | ||
* [https://blog.xyz.is/2016/webkit-360.html PSVita 3.60 | * [https://blog.xyz.is/2016/webkit-360.html PSVita 3.60 HENKaku webkit exploit writeup] | ||
==== Bug Description ==== | ==== Bug Description ==== | ||
When attempting to update a vector via sortCompactedVector() - data is written based on a pointer, though the pointer | When attempting to update a vector via sortCompactedVector() - data is written based on a pointer, though the pointer isn't re-updated nor nulled. When this memory in free()'d, the reference is maintained and thus memory corruption can occur. | ||
==== Exploit Implementation ==== | ==== Exploit Implementation ==== | ||
* [https://github.com/henkaku/henkaku/blob/master/webkit/exploit.js PSVita 3.60 | * [https://github.com/henkaku/henkaku/blob/master/webkit/exploit.js PSVita 3.60 webkit exploit by xyz] | ||
* [https://github.com/Fire30/PS4-3.55-Code-Execution-PoC PS4 playground 3.15-3.70 by Fire30] | * [https://github.com/Fire30/PS4-3.55-Code-Execution-PoC PS4 playground 3.15-3.70 by Fire30] | ||
* [https://github.com/Cryptogenic/PS4-Playground-3.55 Improved PS4 playground 3.15-3.70 by Specter] | * [https://github.com/Cryptogenic/PS4-Playground-3.55 Improved PS4 playground 3.15-3.70 by Specter] | ||
==== Patched ==== | ==== Patched ==== | ||
'''Yes''' in 4. | '''Yes''' in 4.00 FW | ||
==== Tested ==== | ==== Tested ==== | ||
Line 736: | Line 152: | ||
---- | ---- | ||
=== FW <= 3.50 - WebCore::TimerBase::heapPopMin() | === FW <= 3.50 - WebCore::TimerBase::heapPopMin UAF (only crash) === | ||
==== Analysis ==== | ==== Analysis ==== | ||
* | * https://github.com/WebKit/webkit/commit/98845d940e30529098eea7e496af02e14301c704 | ||
==== Bug Description ==== | ==== Bug Description ==== | ||
"As of firmware version 3.55 a patch has been included to prevent a use-after-free segmentation fault from being exploited. This could have led to a ROP chain and code execution. It would have been cool if someone would have done some real research on it..." | "As of firmware version 3.55 a patch has been included to prevent a use-after-free segmentation fault from being exploited. This could have led to a ROP chain and code execution. It would have been cool if someone would have done some real research on it..." | ||
==== Exploit Implementation ==== | ==== Exploit Implementation ==== | ||
* | * http://psxhax.com/threads/ps4-3-50-webkit-exploit-from-playstation-4-dev-qwertyoruiop.450/ | ||
* | * http://psxhax.com/threads/ps4-heap-use-after-free-at-webcore-3-50-poc-by-hunter128.452/ | ||
* | * http://wololo.net/talk/viewtopic.php?t=45888 | ||
==== Patched ==== | ==== Patched ==== | ||
Line 760: | Line 169: | ||
==== Tested ==== | ==== Tested ==== | ||
3.15, 3.50 | |||
---- | ---- | ||
=== FW <= | === FW <= 2.03 - CSSSelector Heap Overflow (CVE-2014-1303) === | ||
==== Credits ==== | ==== Credits ==== | ||
* | * Liang Chen of KeenTeam <@chenliang0817, chenliang0817@hotmail.com> for finding and documenting the bug | ||
* xyz for porting to PSVita 3.30-3.36 | |||
* dreadlyei (unknown, credited by Fire30) | |||
* Fire30 for porting to PS4 <= 2.03 | |||
* xyz for porting to PSVita | |||
* dreadlyei (unknown | |||
==== Analysis ==== | ==== Analysis ==== | ||
* [https://www.blackhat.com/docs/eu-14/materials/eu-14-Chen-WebKit-Everywhere-Secure-Or-Not.PDF BlackHat EU 2014 'WebKit Everywhere - Secure Or Not?' slides] | * [https://www.blackhat.com/docs/eu-14/materials/eu-14-Chen-WebKit-Everywhere-Secure-Or-Not.PDF BlackHat EU 2014 'WebKit Everywhere - Secure Or Not?' slides] | ||
* [https://www.blackhat.com/docs/eu-14/materials/eu-14-Chen-WebKit-Everywhere-Secure-Or-Not-WP.pdf | * [https://www.blackhat.com/docs/eu-14/materials/eu-14-Chen-WebKit-Everywhere-Secure-Or-Not-WP.pdf] | ||
* [https://cansecwest.com/slides/2015/Liang_CanSecWest2015.pdf | * [https://cansecwest.com/slides/2015/Liang_CanSecWest2015.pdf] | ||
==== Bug Description ==== | ==== Bug Description ==== | ||
Line 807: | Line 189: | ||
==== Exploit Implementation ==== | ==== Exploit Implementation ==== | ||
* [https://github.com/Fire30/PS4-2014-1303-POC ROP PoC for | * [https://github.com/Fire30/PS4-2014-1303-POC ROP PoC for firmware 2.03 by Fire30] | ||
* [http://wololo.net/2016/04/21/proof-of-concept-webkit-exploit-running-on-ps4-firmwares-up wololo article] | * [http://wololo.net/2016/04/21/proof-of-concept-webkit-exploit-running-on-ps4-firmwares-up wololo article] | ||
* WebKit exploit for 3.30-3.36 | * WebKit exploit for 3.30-3.36 PSVita by xyz: used in vitasploit | ||
==== Patched ==== | ==== Patched ==== | ||
Line 816: | Line 197: | ||
==== Tested ==== | ==== Tested ==== | ||
* | * 2.03. Might work on 2.04 (99% sure as 2.04 PUP is about same size as 2.03 PUP). | ||
---- | ---- | ||
=== FW <= 1.76 - JSArray | === FW <= 1.76 - JSArray.sort() Heap Overflow (CVE-2012-3748, PSA 2013-0903-1) === | ||
==== Credits ==== | ==== Credits ==== | ||
* Vitaliy Toropov for the exploit on Mac OS X Safari (September 4, 2013) | * Vitaliy Toropov for the exploit on Mac OS X Safari (September 4, 2013) | ||
* nas and Proxima for the first PS4 POC on 1.76 PS4 ( | * nas and Proxima for the first PS4 POC on 1.76 PS4 (Oct. 23, 2014) | ||
* sony for patching the exploit in FW 2.00 ( | * sony for patching the exploit in FW 2.00 (Oct 27, 2014) | ||
* CTurt for the rewriting (PS4 1.76 PlayGround) and implementation with his 1.76 kexploit (December 6, 2015) [https://twitter.com/CTurtE/status/673581693207502849] | * CTurt for the rewriting (PS4 1.76 PlayGround) and implementation with his 1.76 kexploit (December 6, 2015) [https://twitter.com/CTurtE/status/673581693207502849] | ||
Line 881: | Line 224: | ||
* [http://daxhordes.org/ps4_176/ps4_rop2.html ROP2] | * [http://daxhordes.org/ps4_176/ps4_rop2.html ROP2] | ||
* [https://cturt.github.io/PS4-playground/ PS4 playground 1.76 by CTurt] | * [https://cturt.github.io/PS4-playground/ PS4 playground 1.76 by CTurt] | ||
* [https://bitbucket.org/DaveeFTW/psvita-260-webkit/src/master/ PSVita 2.00-3.20 | * [https://bitbucket.org/DaveeFTW/psvita-260-webkit/src/master/ PSVita 2.00-3.20 webkit exploit] | ||
==== Patched ==== | ==== Patched ==== | ||
'''Yes''' in 2.00 FW | '''Yes''' in 2.00 FW | ||
==== | == Userland securities == | ||
=== | === Userland ASLR === | ||
* Very old firmwares (<= 1.05) don't have ASLR enabled, but it was introduced sometime before firmware 1.70. "Address Space Layout Randomization" (ASLR) is a security technique which causes the base addresses of modules to be different every time you start the PS4. | |||
* To defeat userland ASLR on FWs >=1.70, we can use the module imports table to find other modules address once we know SceWebkit2 address. | |||
* Very old firmwares (<= 1.05) | |||
* To defeat | |||
=== Module imports table cleaned before execution === | === Module imports table cleaned before execution === | ||
* Between 1.76 and 4.05, Sony did that to prevent | * Between 1.76 and 4.05, Sony did that to prevent webkit exploiters from defeating userland ASLR easily. | ||
* Now we have to dump entire | * Now we have to dump entire userland sandboxed memory, and by studying it we can defeat ASLR: | ||
1. Chose a function (ex: __stack_chk_fail) imported from | 1. Chose a function (ex: __stack_chk_fail) imported from LibKernel by SceWebkit2 | ||
2. Read pointer contained at the address where the call is done | 2. Read pointer contained at the address where the call is done | ||
3. Substract to this pointer the offset of the function (ex: __stack_chk_fail) in LibKernel module | 3. Substract to this pointer the offset of the function (ex: __stack_chk_fail) in LibKernel module | ||
4. This result is LibKernel base address. This method works for any imported module. | 4. This result is LibKernel base address. This method works for any imported module. | ||
=== DEP / NX === | === DEP / NX === | ||
* "Data Execution Prevention" / "No eXecute" is enabled on all firmwares. It prevents allocating memory as both RW and RX at same time (RWX) so preventing us from writing shellcode to userland memory then executing it. | |||
* "Data Execution Prevention" / "No eXecute" is enabled on all firmwares. It prevents allocating memory as both RW and RX at same time (RWX) so preventing us from writing shellcode to | |||
* 2 ways to bypass this security: JiT vulnerability (FW <= 1.76) or ROP (all FWs). | * 2 ways to bypass this security: JiT vulnerability (FW <= 1.76) or ROP (all FWs). | ||
=== JiT removed from webbrowser === | === JiT removed from webbrowser === | ||
* On FW <= 1.76, you could map RWX memory from ROP by abusing the JiT functionality and the sys_jitshm_create and sys_jitshm_alias system calls. This however was fixed after 1.76, as WebKit has been split into two processes. One handles javascript compilation and the other handles other web page elements like image rendering and DOM. The second process will request JiT memory upon hitting JavaScript via IPC (Inter-Process Communication). Since we no longer have access to the process responsible for JiT, we can no longer (at least currently), map RWX memory for proper code execution unless the kernel is patched. | * On FW <= 1.76, you could map RWX memory from ROP by abusing the JiT functionality and the sys_jitshm_create and sys_jitshm_alias system calls. This however was fixed after 1.76, as WebKit has been split into two processes. One handles javascript compilation and the other handles other web page elements like image rendering and DOM. The second process will request JiT memory upon hitting JavaScript via IPC (Inter-Process Communication). Since we no longer have access to the process responsible for JiT, we can no longer (at least currently), map RWX memory for proper code execution unless the kernel is patched. | ||
* Workaround is to use ROP. | * Workaround is to use ROP. | ||
=== Syscalls removed === | === Syscalls removed === | ||
=== Syscall 0 disabled i.e Error Kernel: The application directly issues a syscall instruction (24) === | |||
=== | |||
* Between 2.00 and 2.57, SCE has removed system call 0, so we can no longer call any syscall we want by specifying the call number in the rax register. | |||
* Doing so now crashes the app and gives error CE-34878-0, SCE_KERNEL_ABORT_REASON_SYSTEM_ILLEGAL_FUNCTION_CALL, with the message "Kernel: The application directly issues a syscall instruction (24)". | |||
* We now have to use wrappers provided to us from the libkernel / libkernel_web / libkernel_sys modules to access system calls. | |||
=== bpf_write function stripped out of the kernel === | === bpf_write function stripped out of the kernel === | ||
Line 975: | Line 266: | ||
=== bpf_open function blocked for unprivileged processes === | === bpf_open function blocked for unprivileged processes === | ||
* On 5.50, opening BPF has been blocked for unprivileged processes such as WebKit and other apps/games. It's still present in the sandbox, however attempting to open it will fail and yield EPERM. This aims blocking BPF kernel exploits especially qwerty's BPF double free UAF. | |||
* On 5.50, opening BPF has been blocked for unprivileged processes such as WebKit and other apps/games. It's still present in the sandbox, however attempting to open it will fail and yield EPERM. This aims blocking BPF kernel exploits especially | |||
=== bpf_ioctl function blocked or removed === | === bpf_ioctl function blocked or removed === | ||
* Moreover, on FW 5.50+, opening BPF is still possible in less sandboxed apps like test/devkits fselfs. But this is useless because ioctl doesn't work. | |||
== Kernel Exploits == | |||
=== FW <= 5.05 - BPF Race Condition (Yielding Double Free()) === | |||
=== FW <= | |||
==== Analysis ==== | ==== Analysis ==== | ||
Line 1,255: | Line 282: | ||
==== Exploit Implementation ==== | ==== Exploit Implementation ==== | ||
[http://crack.bargains/505k/ PS4 5.05 WebKit + Kernel Exploit]<br/> | |||
[https://github.com/Cryptogenic/PS4-5.05-Kernel-Exploit PS4 5.05 WebKit + Kernel Exploit Source] | |||
==== Patched ==== | ==== Patched ==== | ||
'''Yes''' in 5. | '''Yes''' in 5.50FW | ||
---- | ---- | ||
Line 1,275: | Line 302: | ||
==== Patched ==== | ==== Patched ==== | ||
'''Yes''' in 4. | '''Yes''' in 4.70FW | ||
---- | ---- | ||
=== FW <= 6.00 ?6.02? - sys_getcontext Information Leak (kASLR defeat | === FW <= 6.00 ?6.02? - sys_getcontext Information Leak (kASLR defeat) === | ||
==== Analysis ==== | ==== Analysis ==== | ||
Line 1,319: | Line 346: | ||
==== Analysis ==== | ==== Analysis ==== | ||
* [https://fail0verflow.com/blog/2017/ps4-namedobj-exploit/ fail0verflow's writeup on the | * [https://fail0verflow.com/blog/2017/ps4-namedobj-exploit/ fail0verflow's writeup on the 1.01-4.05 namedobj kernel exploit] (2017-10-19) | ||
* [https://github.com/Cryptogenic/Exploit-Writeups/blob/master/PS4/NamedObj%20Kernel%20Exploit%20Overview.md Specter's first writeup] (2017-10-20) | * [https://github.com/Cryptogenic/Exploit-Writeups/blob/master/PS4/NamedObj%20Kernel%20Exploit%20Overview.md Specter's first writeup] (2017-10-20) | ||
* [https://github.com/Cryptogenic/Exploit-Writeups/blob/master/PS4/%22NamedObj%22%204.05%20Kernel%20Exploit%20Writeup.md Specter's writeup on his | * [https://github.com/Cryptogenic/Exploit-Writeups/blob/master/PS4/%22NamedObj%22%204.05%20Kernel%20Exploit%20Writeup.md Specter's writeup on his 4.05 implementation] (2017-12-28) | ||
==== Bug Description ==== | ==== Bug Description ==== | ||
Line 1,329: | Line 354: | ||
==== Exploit Implementation ==== | ==== Exploit Implementation ==== | ||
[https://github.com/Cryptogenic/PS4-4.05-Kernel-Exploit PS4 4.05 WebKit + Kernel Exploit] | |||
==== Patched ==== | ==== Patched ==== | ||
Line 1,335: | Line 360: | ||
==== Tested ==== | ==== Tested ==== | ||
Works on FWs 4.00-4.05. On <= 3.70 FW we | Works on FWs 4.00-4.05. On <=3.70 FW we haven't found a way to leak the target object, but it might be doable as F0F did it on 1.01. | ||
---- | ---- | ||
=== FW <= 1.76 - dlclose | === FW <= 1.76 - Dynamic Library Prepare Close (dlclose) === | ||
* Discovered by CTurt. Privately implemented thanks to qwertyoruiopz. CTurt published a writeup then the exploit was publicly implemented by kR105 and on another side by Zer0xFF and Bigboss (psxdev). | |||
* Discovered by CTurt. | |||
==== Analysis ==== | ==== Analysis ==== | ||
[http://cturt.github.io/dlclose-overflow.html Analysis of sys_dynlib_prepare_dlclose PS4 kernel heap overflow (by CTurt with the help of | [http://cturt.github.io/dlclose-overflow.html Analysis of sys_dynlib_prepare_dlclose PS4 kernel heap overflow (by CTurt with the help of qwertyoruiopz)] | ||
==== Bug Description ==== | ==== Bug Description ==== | ||
Line 1,413: | Line 380: | ||
---- | ---- | ||
=== FW <= 1.76 - BadIRET | === FW <= 1.76 - BadIRET === | ||
==== Analysis ==== | ==== Analysis ==== | ||
* | * Ported from FreeBSD 9 to PS4 by CTurt. | ||
[http://cturt.github.io/ps4-3.html Hacking the PS4, part 3 - Kernel exploitation (by '''CTurt''')]<br/> | |||
[https://nvd.nist.gov/vuln/detail/CVE-2014-9322 NVD Bug Description] | |||
==== Bug Description ==== | ==== Bug Description ==== | ||
Faults associated with the stack segment (SS) register are not handled properly, allowing unprivileged users to trigger an IRET instruction that accesses a GS Base from | Faults associated with the stack segment (SS) register are not handled properly, allowing unprivileged users to trigger an IRET instruction that accesses a GS Base from userland memory, providing an attacker with a method of privilege escalation. | ||
==== | ==== Source ==== | ||
[http://seclists.org/oss-sec/2015/q3/66 CVE-2014-9322] | |||
<br/>[http://www.filedropper.com/ps4-bad-iret-5fs Public binary] | |||
==== Patched ==== | ==== Patched ==== | ||
'''Yes''' in 2.00 FW | '''Yes''' in 2.00 FW | ||
=== | ==== Implementation ==== | ||
[https://mega.nz/#!Fo1xFDrb!EuOl5s6g_IPTtI6dAknSKYJZ8YLzZWvx1MPUPmkr3Sg (mirror)] | |||
==== | |||
== Kernel securities == | == Kernel securities == | ||
=== Kernel ASLR === | === Kernel ASLR === | ||
* Since 3.50 FW, ASLR (Address Space Layout Randomization) has been enabled in PS4 kernel. | |||
Since 3.50 FW, ASLR (Address Space Layout Randomization) has been enabled in PS4 kernel. This means that to properly exploit the kernel to escalate privileges, an information disclosure vulnerability will most likely be needed to defeat ASLR and locate the kernel in memory. | * This means that to properly exploit the kernel to escalate privileges, an information disclosure vulnerability will most likely be needed to defeat ASLR and locate the kernel in memory. | ||
=== Kernel SMAP === | === Kernel SMAP === | ||
* In 5.0x FW and above, "Supervisor Mode Access Prevention" (SMAP), a new custom mitigation was added to the kernel to prevent exploiters from pivoting the kernel stack pointer into userland memory (attempting to do so would crash the system). | |||
* A new exploitation strategy is needed to run kernel ROP chains, such as qwertyoruiopz method used in the 5.05 BPF kernel exploit:<br /> | |||
We need to get our ROP chain into kernel memory. To do this, qwertyoruiopz decided to go with the method he used on the iPhone 7 - essentially using JOP to push a bunch of stack frames onto the kernel stack, and memcpy()'ing the chain into RSP. | |||
To | |||
{{Reverse Engineering}} | {{Reverse Engineering}} | ||
<noinclude> | <noinclude>[[Category:Main]]</noinclude> | ||
[[Category:Main]] | |||
</noinclude> |