Nytro Posted March 20, 2013 Report Posted March 20, 2013 Advanced Heap Manipulation in Windows 8Zhenhua(Eric) Liuzhliu@fortinet.com VERSION 1.0ContentsABSTRACT ...................................................................................................................................................... 3Prior Works ................................................................................................................................................... 4Introduction .................................................................................................................................................. 5Sandbox ..................................................................................................................................................... 5Windows 8 Kernel Exploit mitigation improvements ............................................................................... 5Heap feng shui and Windows 8 ................................................................................................................ 6What Feng shui really is ............................................................................................................................ 7What’s left? ............................................................................................................................................... 7Uninitialized memory reference ........................................................................................................... 7Application specific attacks ................................................................................................................... 7Custom Memory Allocator .................................................................................................................... 8The future ................................................................................................................................................. 8Quick View of the Idea .................................................................................................................................. 9Basics ......................................................................................................................................................... 9Freelists ................................................................................................................................................. 9Three ways could write into the FreeLists .......................................................................................... 10Allocation Search ................................................................................................................................ 10Splitting Pool Chunks process ............................................................................................................. 11The Mandatory Search Technique .......................................................................................................... 12Kernel Pool .................................................................................................................................................. 14Implementation in Kernel Pool ............................................................................................................... 15Basics ................................................................................................................................................... 15Reliability Notes .................................................................................................................................. 17Putting It All Together ......................................................................................................................... 21User Heap .................................................................................................................................................... 22Implementation in User Heap ................................................................................................................. 22Applicable circumstance ..................................................................................................................... 25Prerequisites ....................................................................................................................................... 25The simple idea ................................................................................................................................... 26Practices in User heap ............................................................................................................................. 28A practical attack on _HEAP_USERDATA_HEADER ............................................................................. 28Uninitialized memory reference ......................................................................................................... 29Practical heap determining in IE 10 .................................................................................................... 29Conclusion ................................................................................................................................................... 31Acknowledgements ..................................................................................................................................... 31Bibliography ................................................................................................................................................ 32Attacking _HEAP_USERDATA_HEADER Source Code.................................................................................. 33Download:https://media.blackhat.com/eu-13/briefings/Liu/bh-eu-13-liu-advanced-heap-WP.pdf Quote