ASLR unsicher?

Started by cibomato, February 15, 2017, 08:54:59 PM

Previous topic - Next topic
Jetzt ist das gerade neu in OPNsense und nun das:
https://www.heise.de/newsticker/meldung/Schutz-durch-Speicherverwuerfelung-ASLR-geknackt-3627176.html


Was ist davon zu halten?

Viele Grüße,

Jochen

That only applies to Webbrowsers. OPNsense isn't one ;-)
Hobbyist at home, sysadmin at work. Sometimes the first is mixed with the second.

No, it applies to any application, however if you can execute this type of attack, broken ASLR is the smallest problem (this means the attacker can already execute code).


ASLR is still an awesome addition to OPNsense since the AnC attack doesn't really apply to the applications installed on a typical OPNsense deployment. In order to carry out the attack, the attacker must be able to instrument the MMU, which is only possible with applications that accept and execute attacker-controlled code and provide performance APIs (like javascript in popular web browsers).