Nowadays, in operating systems, numerous protection mechanisms prevent or limit the user-mode applicationsto access the kernels internal information. This is regularlycarried out by software-based defenses such as Address Space Layout Randomization (ASLR) and Kernel ASLR(KASLR). They play pronounced roles when the security of sandboxed applications such as Web-browser are considered.Armed with arbitrary write access in the kernel memory, if these protections are bypassed, an adversary could find a suitable where to write in order to get an elevation of privilege or code execution in ring 0. In this paper, we introduce a reliable method based on Transactional Synchronization Extensions (TSX) side-channel leakage to reveal the address of the Global Descriptor Table (GDT) and Interrupt Descriptor Table (IDT). We indicate that by detecting these addresses, one could execute instructions to sidestep the Intels User-Mode InstructionPrevention (UMIP) and the Hypervisor-based mitigation and, consequently, neutralized them. The introduced method is successfully performed after the most recent patches for Meltdown and Spectre. Moreover, the implementation of the proposed approach on different platforms, including the latest releases of Microsoft Windows, Linux, and, Mac OSX with the latest 9th generation of Intel processors, shows that the proposed mechanism is independent from the Operating System implementation. We demonstrate that a combinationof this method with call-gate mechanism (available in modernprocessors) in a chain of events will eventually lead toa system compromise despite the limitations of a super-secure sandboxed environment in the presence of Windows proprietary Virtualization Based Security (VBS). Finally, we suggest the software-based mitigation to avoid these issues with an acceptable overhead cost.
翻译:目前,在操作系统中,许多保护机制防止或限制用户-模式应用程序进入内核内部信息。这经常通过基于软件的防御系统,如地址空间布局随机化(ASLR)和Kernel ASLR(KASLR)(ASLR)(ASLR)来进行。当考虑网络浏览器等沙箱应用程序的安全性时,它们就发挥着显著的作用。我们指出,通过探测这些地址,可以执行指令,绕过这些保护,对手可以找到合适的写文件的地方,以便在环圈 0 中提升特权或代码执行。在本文中,我们采用了基于交易同步扩展扩展(TSX)的侧通道渗漏等基于软件的可靠方法,以披露全球描述器表(GDTT)和Interrupt Descripor D表(IDT)的地址。通过检测这些地址,人们可以执行指令,绕过Intels 用户-Mode Reduction(UIP) 和基于超视距存储器的软存储器的降低成本,从而消除它们。在最新运行系统运行过程中成功地采用了SWISLUDLLLLLUD的系统,在最新版本平台上显示最新版本的运行系统,在最新版本的运行中显示,这些最新版本的版本的系统显示,这些系统将显示的最新版本。