Nytro Posted March 21, 2012 Report Posted March 21, 2012 Locking Down the Windows Kernel:Mitigating Null Pointer ExploitationTarjei MandtNorman Threat Researchtarjei.mandt @ norman.comAbstract. One of the most prevalent bug classes aecting Windows ker-nel components today is undeniably NULL pointer dereferences. Unlikeother platforms such as Linux, Windows (in staying true to backwardscompatibility) allows non-privileged users to map the null page withinthe context of a user process. As kernel and user-mode components sharethe same virtual address space, an attacker may potentially be able toexploit kernel null dereference vulnerabilities by controlling the deref-erenced data. In this paper, we propose a way to generically mitigateNULL pointer exploitation on Windows by restricting access to the lowerportion of process memory using VAD manipulation. Importantly, as theproposed method employs features already present in the memory man-ager and does not introduce any oending hooks, it can be introduced ona wide range of Windows platforms. Additionally, because the mitigationonly introduces minor changes at process creation-time, the performancecost is minimal.Keywords: null pointer vulnerabilities, exploitation, mitigationDownload:http://www.mista.nu/research/nullpage.pdf Quote