[FD] Magic values in 32-bit processes on 64-bit OS-es and how to exploit them

2016-06-24 Thread Berend-Jan Wever
(You can read all this information in more detail on http://blog.skylined.nl) Software components such as memory managers often use magic values to mark memory as having a certain state. These magic values can be used during debugging to determine the state of the memory, and have often (but not a

Re: [FD] Magic values in 32-bit processes on 64-bit OS-es and how to exploit them

2016-06-24 Thread Berend-Jan Wever
Obviously, this may be of interest to authors of security software that aims to mitigate exploitation of 0-day: it should be possible to: 1) actively reserve memory regions referenced by such pointers to prevent allocation by an exploit. The additional address space fragmentation should not be a pr

Re: [FD] Magic values in 32-bit processes on 64-bit OS-es and how to exploit them

2016-06-24 Thread Berend-Jan Wever
I've released a Proof-of-Concept html page that uses Javascript typed arrays in 32-bit Chrome and Firefox on 64-bit Windows to allocated address 0xDEADBEEF and store the value 0xBADC0DED there. You can find this and details on the implementation at http://blog.skylined.nl/20160622001.html. That pa