| 

Worth Reading: Escape from Adobe's sandbox

  • Post author: Omid Farhang
  • Post published: June 25, 2012
  • Reading Time: 1 min
  • Word Count: 212 words

Adobe Reader X runs in a sandbox at a very restricted privilege level. Important system calls are supposed to be handled by a special broker process that will subject them to extensive testing. However, a small design flaw allows attackers to escape from this sandbox and execute arbitrary code ā€“ despite having both ASLR (Address Space Layout Randomisation) and DEP (Data Execution Prevention). As described by Guillaume DelugrĆ©, the broker process is at the heart of the exploit as it uses a memory page allocated via VirtualAllocEx to store the overwritten code of system calls which have been redirected to the broker. Despite having ASLR, however, the memory address returned by VirtualAllocEx is not randomised. This means that the Windows system function call will end up in a predictable, ā€œnearly constantā€ location which the exploit can then access directly. ...

Continue Reading Worth Reading: Escape from Adobe's sandbox

New automated sandbox for Android malware

  • Post author: Omid Farhang
  • Post published: March 4, 2012
  • Reading Time: 1 min
  • Word Count: 110 words

ISC Diary: One of the things that Iā€™ve been working on lately is building an automated malware analysis environment to handle Android malware similar to the one I built for Windows malware.Ā Iā€™m not quite there yet, but I was quite pleased to here about the new service being offered by the folks at Die UniversitƤt Erlangen-NĆ¼rnberg.Ā This is still a research project, so if you choose to use it, be understanding.Ā Donā€™t expect 24Ɨ7 uptime and letā€™s try not to DoS them.Ā That said, Iā€™m looking forward to seeing how well it works and how the dynamic analysis will work once it is actually in production. ...

Continue Reading New automated sandbox for Android malware

Sandbox

  • Post author: Omid Farhang
  • Post published: January 13, 2009
  • Reading Time: 3 min
  • Word Count: 458 words

In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers and untrusted users. I Recommend Sandboxie for Daily use. The sandbox typically provides a tightly-controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted. In this sense, sandboxes are a specific example of virtualization. ...

Continue Reading Sandbox