OPNsense Forum
English Forums => Development and Code Review => Topic started by: cibomato on February 15, 2017, 08:54:59 pm
-
Jetzt ist das gerade neu in OPNsense und nun das:
https://www.heise.de/newsticker/meldung/Schutz-durch-Speicherverwuerfelung-ASLR-geknackt-3627176.html
(https://www.heise.de/newsticker/meldung/Schutz-durch-Speicherverwuerfelung-ASLR-geknackt-3627176.html)
Was ist davon zu halten?
Viele Grüße,
Jochen
-
That only applies to Webbrowsers. OPNsense isn't one ;-)
-
No, it applies to any application, however if you can execute this type of attack, broken ASLR is the smallest problem (this means the attacker can already execute code).
-
A few notes from Shawn on the particular attack:
https://github.com/lattera/articles/blob/master/infosec/Exploit%20Mitigations/ASLR/2017-02-15_anc/article.md
-
ASLR is still an awesome addition to OPNsense since the AnC attack doesn't really apply to the applications installed on a typical OPNsense deployment. In order to carry out the attack, the attacker must be able to instrument the MMU, which is only possible with applications that accept and execute attacker-controlled code and provide performance APIs (like javascript in popular web browsers).