Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
View analytic
Friday, May 20 • 4:00pm - 5:00pm
Stack Smashing Protection Bypass via Pthreads - A case of MiniUPNP Buffer overflow

Sign up or log in to save this to your schedule and see who's attending!

In 2015 Talos identified and reported a buffer overflow vulnerability in client side code of the popular MiniUPnP library. The vulnerability was promptly fixed by the vendor and was assigned TALOS-CAN-0035 as well as CVE 2015-6031. Martin Zeiser and Aleksandar Nikolic subsequently gave a talk at PacSec 2015 ("Universal Pwn n Play") about the client side attack surface of UPnP and this vulnerability was part of it.

Talos has developed a working exploit against Bitcoin-qt wallet which utilizes this library. The exploit developed by Talos includes a novel Stack Smashing Protection (SSP) bypass. As the bypass technique lies in the way pthreads work it perfectly illustrates how a seemingly hard to exploit issue can still be exploited due to unforeseen consequences arising from the complexity present in modern process execution chain.

In this talk, we will introduce the details of stack smashing protection implementation, discuss the relevant libc and pthread mechanisms, introduce the steps required for the successful bypass and conclude with a demonstration.


Friday May 20, 2016 4:00pm - 5:00pm
KEC 17 Market Square #101, Knoxville, TN 37902

Attendees (13)