Send Dailydave mailing list submissions to dailydave@lists.immunitysec.com
To subscribe or unsubscribe via the World Wide Web, visit http://lists.immunitysec.com/mailman/listinfo/dailydave or, via email, send a message with subject or body 'help' to dailydave-requ...@lists.immunitysec.com You can reach the person managing the list at dailydave-ow...@lists.immunitysec.com When replying, please edit your Subject line so it is more specific than "Re: Contents of Dailydave digest..." Today's Topics: 1. Re: Exploits matter. (Alexander Sotirov) 2. Re: Exploits matter. (Aaron) 3. Re: Exploits matter. (alexm) 4. Re: Exploits matter. (vincent hinderer) 5. Re: Exploits matter. (security curmudgeon) 6. Re: Exploits matter. (security curmudgeon) ---------------------------------------------------------------------- Message: 1 Date: Thu, 8 Oct 2009 12:11:42 -0400 From: Alexander Sotirov <a...@sotirov.net> Subject: Re: [Dailydave] Exploits matter. To: Ilfak Guilfanov <i...@hexblog.com> Cc: dailydave@lists.immunitysec.com Message-ID: <20091008161142.ga3...@macbook-2.local> Content-Type: text/plain; charset="iso-8859-1" On Thu, Oct 08, 2009 at 10:47:19AM +0200, Ilfak Guilfanov wrote: > Sorry for my ignorance, are NULL pointer dereference bugs exploitable today? Hi Ilfak, NULL pointer dereferences in userspace programs are generally not exploitable, but in some rare cases they might be. For example, Mark Dowd published a Flash exploit where a NULL pointer was used as the base of an array that was accessed with an arbitrary array index. This turned the NULL pointer dereference into an arbitrary memory write operation. Here's his detailed writeup about the exploit: http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf This exploitation technique (and other interesting ones) were also described in a really under-appreciated presentation by Ga?l Delalleau at CanSecWest 2005: http://cansecwest.com/core05/memory_vulns_delalleau.pdf In the Linux kernel, NULL pointer dereferences are exploitable in many cases, because the user can mmap memory at address 0 through a variety of techniques and take control of the data structure the kernel is dereferencing. Brad Spender has released multiple Linux local privilege escalation exploits to prove this point. See this blog post for more info: http://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html Take care, Alex -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 194 bytes Desc: not available Url : http://lists.immunitysec.com/pipermail/dailydave/attachments/20091008/7371e7c2/attachment-0001.pgp ------------------------------ Message: 2 Date: Thu, 8 Oct 2009 10:19:12 -0700 (PDT) From: Aaron <apcon...@yahoo.com> Subject: Re: [Dailydave] Exploits matter. To: Ilfak Guilfanov <i...@hexblog.com> Cc: dailydave@lists.immunitysec.com Message-ID: <771076.56612...@web65403.mail.ac4.yahoo.com> Content-Type: text/plain; charset="us-ascii" Under linux, it's as easy as setting your "personality" to SYSVR4, mmap'ing the 0th address, and filling it with your code. That's for local exploit anyway. I'm not sure about remotely exploiting a NULL dereference, or about non-linux systems (read: it may be possible, but I just don't know for sure one way or the other). ________________________________ From: Ilfak Guilfanov <i...@hexblog.com> To: Steve Shockley <steve.shock...@shockley.net> Cc: dailydave@lists.immunitysec.com Sent: Thu, October 8, 2009 4:47:19 AM Subject: Re: [Dailydave] Exploits matter. Sorry for my ignorance, are NULL pointer dereference bugs exploitable today? Steve Shockley said the following on 7/10/2009 15:56: > On 10/6/2009 10:12 AM, dave wrote: >> But if you are like me, you are thinking "But it's still worth it". And >> here's why: Without exploits, you have no way to know what matters. Or, >> more realistically, what doesn't matter. I.E. in this case, 64 bit >> computers are not going to be exploited with SMBv2 any time soon, of at >> all. Since enterprises skipped Vista and use 64 bit for their Windows >> 2008 servers, SMBv2 didn't hurt as badly as you would expect. > > Doesn't that just mean that *you* can't exploit it right now? Not > trying to insult your haxxor skillz, but a few years ago you couldn't > get a virus via email or Word, and null pointer dereference bugs could > never be exploited. > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com > http://lists.immunitysec.com/mailman/listinfo/dailydave -- Best regards, Ilfak mailto:i...@hexblog.com _______________________________________________ Dailydave mailing list Dailydave@lists.immunitysec.com http://lists.immunitysec.com/mailman/listinfo/dailydave -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.immunitysec.com/pipermail/dailydave/attachments/20091008/ab7dc86a/attachment-0001.htm ------------------------------ Message: 3 Date: Thu, 08 Oct 2009 15:11:43 -0400 From: alexm <al...@immunityinc.com> Subject: Re: [Dailydave] Exploits matter. To: dailyd...@lists.immunityinc.com Message-ID: <4ace396f.50...@immunityinc.com> Content-Type: text/plain; charset=ISO-8859-1 Tom Parker wrote: >> It would indeed be a good thing if Immunity et al would publish some kind of >> unified database of their proprietary exploits, mapped to CVE-ID etc, but >> I'm not sure if it's their responsibility to do so. IMO, the scanning >> vendors, Qualys, Rapid7, nCircle etc are missing a trick if they aren't >> buying themselves a copy of CANVAS and ensuring that when their scanner >> finds a vulnerability supported by it [CANVAS], they are providing users a >> CVSS score based on the fact that they have independently verified the >> existence of robust exploit code for the respective vuln >> Most of our exploits are mapped to their respective CVE numbers, many months ago we made an internal push to get everything much more uniform within the documentation dicts of exploit modules. We include CVE Number, CVE URL and since we do a lot of Microsoft bugs the MS security number as appropriate. With some of our 3rd party vendors who deal in 0day obviously CVE numbers are not available and sometimes exploits will be developed against bugs that are silently patched, so it's not a perfect system. We had a lot of customer requests for being able to import results from some vulnerability scanning tools. Looking at the formats for those files we realized that all the major scanning tools had an option to report vulnerabilities as their CVE number. So the way this specific part of the code works is that once hosts and CVEs are parsed out of the report, those CVE numbers which have corresponding CANVAS modules are kept and attributed to the host while those that do not have modules are dumped. One of the primary usage cases we see for CANVAS works like this: 1) Use vulnerability scanning product X over network segment 2) X returns a list of potential vulnerabilities against the hosts on that segment 3) Start CANVAS, import list, run the appropriate modules against the imported hosts So while it's not our responsibility as such to maintain this reference between exploit modules and CVEs I think it's in our best interests to do so and we've got a pretty strong case from our customers to make it happen. I'm sure the other products/projects in this space do similar things. Cheers, -AlexM ------------------------------ Message: 4 Date: Thu, 08 Oct 2009 22:30:58 +0200 From: vincent hinderer <vhinde...@lexsi.com> Subject: Re: [Dailydave] Exploits matter. To: Tom Parker <t...@rooted.net>, security curmudgeon <jeri...@attrition.org> Cc: dailyd...@lists.immunityinc.com, dave <d...@immunityinc.com> Message-ID: <c6f418a2.66a75%vhinde...@lexsi.com> Content-Type: text/plain; charset="us-ascii" >> > > While I understand the challenge of verifying the existence and nature of > commercial exploitation tools, down playing exploits by databases like OSVDB > is damaging to the industry and is creating a false sense of security amongst > organizations - especially those who charge their security programs to vanilla > CISSP's. Case in point - large company runs an automated scanner over their > network on a monthly basis, which regularly finds flaws. They prioritize > remediation of findings based on CVSS scores, which have been calculated in > part through utilizing data from OSVDB. Days, months, weeks later the > organization is attacked/audited by a group who paid/stole/borrowed a copy of > Canvas/Core/et al. Organization gets owned. > > I agree. Working these days on patching a 2003 (!) flaw... > > The past two VzB data breach reports have demonstrated a trend, that a large > number of compromises (around 70% if memory serves), resulted from > exploitation of vulnerabilities that at time of compromise had been patched by > the vendor for a year or more. I'm not sure how you would go about obtaining > this kind of data (or indeed how VzB gets their data), but it would be an > interesting metric to see how many of those known/vendor-patched issues had > been neglected/de-prioritized due to misconceptions about their level of > exploitability. > In Verizon report : patch availability at time of attack -between 0,5 to 1 year = 1 -for more than 1 year = 5 (83%) Total of attacks = 6 A relatively small set to draw conclusions though... -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.immunitysec.com/pipermail/dailydave/attachments/20091008/75dd51fe/attachment.htm ------------------------------ Message: 5 Date: Thu, 8 Oct 2009 21:53:05 +0000 (UTC) From: security curmudgeon <jeri...@attrition.org> Subject: Re: [Dailydave] Exploits matter. To: Wouter Slegers <wou...@yourcreativesolutions.nl> Cc: dailyd...@lists.immunityinc.com Message-ID: <pine.lnx.4.64.0910082135000.8...@forced.attrition.org> Content-Type: TEXT/PLAIN; charset=US-ASCII : > The difference betwene $US 30 and $US 200 is big. The difference between $US : > 30,000 and $200 is even bigger. I mention that because I believe your . in : > the 30.000 value really means 30,000, which is a huge difference to us : > Americans. Regardless of your use of . vs , anyone versed in math or : > economics could lecture on percentages of 30 and 200, or 200 and 30000. : There is no need to flame bate, I only inserted the dots (yes, European style, I apologize, it was not my intention to be flame bait. I just wanted to make the distinction that trying to track value, while very intersting, is definitely outside the scope of what a VDB can realistically track. : > As applies to OSVDB, if I am doubting our ability to intellectually track : > "public vs private", then the debate over the dollar value should not be : > very relevant, especially in a historic context. : So if I understand you correctly, for you "public versus private" is : more useful in the decision whether to worry about some rumored attack : then the difficulty for a given attacker? Or to ask it differently, I : would worry based on the cost to one attacker (i.e. under the assumption : that there is always one), not on the amount of attackers, whereas you : seem to worry about the amount of attackers (based on their access to : the attack)? OSVDB wants to track public vs private (and likely a more granular metric), unrelated to someone using us as a source on 'should we worry?'. I certainly hope no one uses us as a definitive source on the status of an exploit other than a link we may provide to it. We also have no intention of tracking the amount of attackers, be it companies like Immunity or Core or trying to determine how many bad guys may be out there that developed it. : > In the last few years, we have also begun to discuss and implement a : > framework for tracking *vendor confidence*. It isn't only researchers that : > are flaky and ill-equipped to handle vulnerability disclosure. =) : Interesting, I did not know it was already so far in software : vulnerability domain. So in essence there is already for a long time a : mechanism to describe "claimed to be privately available" in the : vulnerability databases (and apparently from your heated reaction, this : was hard won. Kudos!). That means Dave's original question still holds: It was, and its still in its infancy. Despite that, every VDB uses their own form of resarcher confidence. Unfortunately, most (including OSVDB) can only do it based on personal history of working on a VDB. Our goal is to actually define that confidence level, show our 'math' and publish it. The knowledge I have of vulnerability disclosure as pertains to the researchers and their reliability should not die with me. Anyone should be able to look at that history should they need it (e.g., hiring purposes, risk assessment). : why is it then so important that it is public (i.e. for free for all) or : commercially available for $4000 from a reputable vendor to anyone that : can pay that amount? I mean a free public exploit is more likely to I don't think it is that important, it's an interesting metric to track. We run into this often; we think "it would be neat to track X" then debate it to death, determining if it is valuable to users, relevant to the database or will end up having more issues and uncertainty than value. : I can imagine that that is because of the different views. : The researchers see their confidence scores as selling point, a higher score : means more importance hence more market value (in money, prestige, Kudos, : whatever). The good ones also want something to clearly distinguish them from : the wannabes with good marketing. True, but it can bite someone in the ass too. If they publish 100 vulnerabilities and 20% end up being incorrect, that could later haunt them if they try to work for a company doing vulnerability research. : > overhaul to our classification system regarding exploit availability, as : > well as "vulnerability framework" vendors, free and commercial, to share : > with us a better understanding of what they have in their arsenal without : > giving away details that are a detriment to their commercial advantage. : Interesting. So the market isn't picking up on it but it is not clear yet why. : Your proposal later on looks like a serious step towards it. I think it is obvious personally. If I say there is a remote overflow in product X, that is all it really takes for a skilled researcher to start dissecting the software and figure it out. There has to be a serious balance in what you advertise you have as far as 0-day, or you run the risk of giving away too much and devaluing your product. Immunity advertises the exploits they have for published vulnerabilities because it gives nothing away. If they say "we have a remote for apache" that is vague. If they say "we have a remote for apache related to header handling", that likely significantly reduces the time required for a third party to find the issue. : Good point. I think this (and my confusion about why it matters) comes down to : different levels of assurance one is seeking. I recently (at the CC conference : 2 weeks ago) sat in a panel next to Oracle and Microsoft as the "big software : companies", informally representing the smartcard community. I was struck at : the different realities the two domains have and this seems to apply here : also. : : In the general software domain, the products are so huge that there is : inevitably huge amounts of bugs in there and have essentially next to no : defense in depth so in many cases it is exploitable also. So there your : timeline point is valid, i.e. the time between possibility to patch (with a : need to patch, maybe here is the public/private discussion?) and the : weaponized exploits is the window of opportunity. So anything that reduces : this (silently patching by the vendor, quickly patching, pressuring to : avoid/delay disclosure, etc) is useful. Your proposal would create very : interesting measurements on timing especially. Absolutely. Unfortunately, due to time and lack of information, it could likely only be done with the big vulnerabilities; the Microsoft, Oracle and Cisco remotes. The 'lesser' vulnerabilities, even if being widely exploited (e.g., SQLi), don't come with enough information to do that analysis I bet. : Interesting discussion, thank you! Very =) ------------------------------ Message: 6 Date: Thu, 8 Oct 2009 22:07:34 +0000 (UTC) From: security curmudgeon <jeri...@attrition.org> Subject: Re: [Dailydave] Exploits matter. To: Tom Parker <t...@rooted.net> Cc: dailyd...@lists.immunityinc.com Message-ID: <pine.lnx.4.64.0910082159190.8...@forced.attrition.org> Content-Type: TEXT/PLAIN; charset=US-ASCII On Thu, 8 Oct 2009, Tom Parker wrote: : > Ten thousand or not, I cannot download the exploit from Immunity's web : > site, milw0rm or anywhere else, correct? To me, and to OSVDB who tracks : > that metric, that is flagged as 'rumored/private'. : : > Can our industry really put a numeric line on public vs private in the : > scenario you describe? Do 9,999 CANVAS customers = private, but 10,000 : > CANAVAS customers = public? : : While I understand the challenge of verifying the existence and nature : of commercial exploitation tools, down playing exploits by databases : like OSVDB is damaging to the industry and is creating a false sense of How exactly does OSVDB 'downplay' exploits using the current classification system? We're the only VDB to even say "an exploit likely exists, even though not public" which should be the opposite of downplaying. If you have a good answer to that, how can we improve the classification system to more accurately track such metrics, without causing a problem? : security amongst organizations - especially those who charge their : security programs to vanilla CISSP's. Case in point - large company runs : an automated scanner over their network on a monthly basis, which : regularly finds flaws. They prioritize remediation of findings based on : CVSS scores, which have been calculated in part through utilizing data : from OSVDB. Days, months, weeks later the organization is : attacked/audited by a group who paid/stole/borrowed a copy of : Canvas/Core/et al. Organization gets owned. First, we display CVSS scores as calculated by NVD if there is a CVE assignment. We will calculate our own scores if we a) disagree or b) have an entry w/o a CVE. Either way, I don't quite follow the logic above, as applies to how OSVDB (or any VDB) is doing wrong or contributing to the problem. : The past two VzB data breach reports have demonstrated a trend, that a : large number of compromises (around 70% if memory serves), resulted from : exploitation of vulnerabilities that at time of compromise had been : patched by the vendor for a year or more. I'm not sure how you would go : about obtaining this kind of data (or indeed how VzB gets their data), They get their data from their own clients, based on forensic examination post-compromise. : but it would be an interesting metric to see how many of those : known/vendor-patched issues had been neglected/de-prioritized due to : misconceptions about their level of exploitability. That would be a really neat addition to the report next year. : It would indeed be a good thing if Immunity et al would publish some : kind of unified database of their proprietary exploits, mapped to CVE-ID : etc, but I'm not sure if it's their responsibility to do so. IMO, the I'd love for them to use CVE or another VDB to do just that. They have absolutely zero responsibility to do it, and it has a bigger chance of hurting them than helping them (see my previous post about disclosing your 0-day). : scanning vendors, Qualys, Rapid7, nCircle etc are missing a trick if : they aren't buying themselves a copy of CANVAS and ensuring that when : their scanner finds a vulnerability supported by it [CANVAS], they are : providing users a CVSS score based on the fact that they have : independently verified the existence of robust exploit code for the : respective vuln. I believe many of these products have licenses that prevent reverse engineering. If a company like the ones you mention above were to obtain a copy, they would be violating the licensing and possibly the law. If a scanner had a consistent pattern of adding checks that mirrored an exploit framework, it would be pretty easy for them to be called out. ------------------------------ _______________________________________________ Dailydave mailing list Dailydave@lists.immunitysec.com http://lists.immunitysec.com/mailman/listinfo/dailydave End of Dailydave Digest, Vol 51, Issue 4 ****************************************