cracking sendmail crackaddr
play

Cracking Sendmail crackaddr Still a challenge for automated program - PowerPoint PPT Presentation

Hackito Ergo Sum October 29th, 2015 Cracking Sendmail crackaddr Still a challenge for automated program analysis? Name Lastname < name @ mail . org > ()()()()()()()()() . . . ()()() Bogdan Mihaila Technical University of Munich, Germany


  1. Hackito Ergo Sum October 29th, 2015 Cracking Sendmail crackaddr Still a challenge for automated program analysis? Name Lastname < name @ mail . org > ()()()()()()()()() . . . ()()() Bogdan Mihaila Technical University of Munich, Germany 1 / 35

  2. Sendmail crackaddr Bug Discovered 2003 by Mark Dowd Buffer overflow in an email address parsing function of Sendmail. Consists of a parsing loop using a state machine. ∼ 500 LOC 2 / 35

  3. Sendmail crackaddr Bug Discovered 2003 by Mark Dowd Buffer overflow in an email address parsing function of Sendmail. Consists of a parsing loop using a state machine. ∼ 500 LOC Bounty for Static Analyzers since 2011 by Halvar Flake Halvar extracted a smaller version of the bug as an example of a hard problem for static analyzers. ∼ 50 LOC 2 / 35

  4. Sendmail crackaddr Bug Discovered 2003 by Mark Dowd Buffer overflow in an email address parsing function of Sendmail. Consists of a parsing loop using a state machine. ∼ 500 LOC Bounty for Static Analyzers since 2011 by Halvar Flake Halvar extracted a smaller version of the bug as an example of a hard problem for static analyzers. ∼ 50 LOC Since then . . . Various talks at security conferences and a paper presenting a static analysis of the example. The solutions however required manual specification of the loop invariant. 2 / 35

  5. Backstory Halvar likes to challenge people! Halvar gave us the challenge some years ago: “The tool should automatically (i.e. without hints provided by the user) show that the vulnerable version has a bug and the fixed version is safe.” We were sure our analyzer could not yet handle it so did not look into it. Last year we gave it a try and it suddenly worked :). 3 / 35

  6. Sendmail Bug (simplified) Let’s see the bug details ... 4 / 35

  7. Sendmail Bug Code 1 #define BUFFERSIZE 200 2 #define TRUE 1 3 #define FALSE 0 4 int copy_it ( char *input , unsigned int length) { 5 char c, localbuf[BUFFERSIZE ]; 6 unsigned int upperlimit = BUFFERSIZE - 10; 7 unsigned int quotation = roundquote = FALSE; 8 unsigned int inputIndex = outputIndex = 0; 9 while (inputIndex < length) { 10 c = input[inputIndex ++]; 11 if ((c == '<') && (! quotation )) { 12 quotation = TRUE; upperlimit --; 13 } 14 if ((c == '>') && (quotation )) { 15 quotation = FALSE; upperlimit ++; 16 } 17 if ((c == '(') && (! quotation) && !roundquote) { 18 roundquote = TRUE; upperlimit--; // decrementation was missing in bug 19 } 20 if ((c == ')') && (! quotation) && roundquote) { 21 roundquote = FALSE; upperlimit ++; 22 } 23 // If there is sufficient space in the buffer , write the character. 24 if (outputIndex < upperlimit) { 25 localbuf[outputIndex] = c; 26 outputIndex ++; 27 } 28 } 29 if (roundquote) { 30 localbuf[outputIndex] = ')'; outputIndex ++; } 31 if (quotation) { 32 localbuf[outputIndex] = '>'; outputIndex ++; } 33 } 5 / 35

  8. State Machine of Parser We need to verify that outputIndex < upperlimit < BUFFERSIZE always holds in the good version. Good: Bad: ulimit-- ulimit++ ulimit-- ulimit++ < < !q !q!r !q !q!r ( ) ( ) > < > < q q !q r !q r ulimit++ ulimit-- ulimit++ In the bad version upperlimit can be steadily incremented and a write outside of the stack allocated buffer can be triggered. 6 / 35

  9. Sendmail Bug Analysis Why are these 50 LOC hard to analyze? 7 / 35

  10. Sendmail Bug Analysis Why are these 50 LOC hard to analyze? • each iteration reads/writes one character ❀ 201 loop iterations to trigger the bug 7 / 35

  11. Sendmail Bug Analysis Why are these 50 LOC hard to analyze? • each iteration reads/writes one character ❀ 201 loop iterations to trigger the bug • paths through the loop dependent on the input: ( ) < > combined with the last if -condition ❀ 10 different paths 7 / 35

  12. Sendmail Bug Analysis Why are these 50 LOC hard to analyze? • each iteration reads/writes one character ❀ 201 loop iterations to trigger the bug • paths through the loop dependent on the input: ( ) < > combined with the last if -condition ❀ 10 different paths • a naïve state space exploration in worst case would need to visit around 2 ∗ 5 201 ≈ 2 664 paths to find the bug! 7 / 35

  13. Sendmail Bug Analysis Why are these 50 LOC hard to analyze? • each iteration reads/writes one character ❀ 201 loop iterations to trigger the bug • paths through the loop dependent on the input: ( ) < > combined with the last if -condition ❀ 10 different paths • a naïve state space exploration in worst case would need to visit around 2 ∗ 5 201 ≈ 2 664 paths to find the bug! • to naïvely prove the absence of the bug we would need to test all the possible input strings e.g. with lengths from 0 to 65535 = UINT_MAX ❀ around 10 65535 ≈ 2 217702 paths that need to be tested! 7 / 35

  14. Sendmail Bug Analysis On the other hand . . . ! 8 / 35

  15. Sendmail Bug Analysis On the other hand . . . ! • finding the bug requires just finding 1 of the faulty paths! 8 / 35

  16. Sendmail Bug Analysis On the other hand . . . ! • finding the bug requires just finding 1 of the faulty paths! • smarter tools combine many paths together and reason about all of them at once (abstraction)! 8 / 35

  17. Sendmail Bug Analysis On the other hand . . . ! • finding the bug requires just finding 1 of the faulty paths! • smarter tools combine many paths together and reason about all of them at once (abstraction)! But unfortunately • abstraction might introduce imprecision and false positives 8 / 35

  18. Sendmail Bug Analysis On the other hand . . . ! • finding the bug requires just finding 1 of the faulty paths! • smarter tools combine many paths together and reason about all of them at once (abstraction)! But unfortunately • abstraction might introduce imprecision and false positives • ❀ the non-vulnerable version is flagged as vulnerable, too, by an imprecise analyzer 8 / 35

  19. Abstraction Techniques Let’s introduce one abstraction technique in more detail ... 9 / 35

  20. Abstract Interpretation Primer Static program analysis using abstract interpretation • use abstract domains to over-approximate concrete states • abstract transformers simulate the concrete program semantics on the abstract state • perform a fixpoint computation to infer invariants for each program point • merge over all paths over-approximates all possible program executions (soundness) • precision depends on the abstraction (completeness) • for termination widening is necessary (introduces imprecision) 10 / 35

  21. Abstraction Examples Some examples of concrete values and their abstractions ... 11 / 35

  22. Sets of Concrete Values and their Abstractions Concrete Points Intervals ± x = c ± x ≤ c y y 10 10 Constraints: Constraints: 2 ≤ x ∧ x ≤ 8 x = 2 ∧ y = 6 ∧ 2 ≤ y ∧ y ≤ 8 ∨ x = 3 ∧ y = 5 5 5 ∨ x = 3 ∧ y = 7 ∨ x = 3 ∧ y = 8 ∨ . . . x x 0 5 10 0 5 10 Interval Sets Polyhedra � i ( l i ≤ x ∧ x ≤ u i ) � i a i x i ≤ c y y 10 10 Constraints: Constraints: 2 ≤ x ∧ x ≤ 5 2 x − y ≤ − 2 ∨ 7 ≤ x ∧ x ≤ 8 ∧ − 2 x − y ≤ − 10 5 5 ∨ 2 ≤ y ∧ y ≤ 3 ∧ 2 x + y ≤ − 21 ∨ 5 ≤ y ∧ y ≤ 8 ∧ 3 x + 4 y ≤ 4 ∧ x + 4 y ≤ 35 x x 0 5 10 0 5 10 12 / 35

  23. Sets of Concrete Values and their Abstractions Concrete Points ± x = c y 10 Constraints: x = 2 ∧ y = 1 ∨ x = 8 ∧ y = 5 5 x 0 5 10 Affine Equalities Congruences � i a i x i = c x ≡ b ( mod a ) y y 10 10 Constraints: Constraints: x ≡ 2 ( mod 3 ) 2 x − 3 y = 3 ∧ y ≡ 1 ( mod 2 ) 5 5 x 0 5 10 x 0 5 10 13 / 35

  24. Operations on Abstractions Some examples of operations on abstractions ... 14 / 35

  25. Some Operations on Intervals Arithmetics: [ 0 , 100 ] + [ 1 , 2 ] = [ 1 , 102 ] [ 0 , 100 ] − [ 1 , 2 ] = [ − 2 , 99 ] Tests or Assumptions, Meet ⊓ Merge of paths, Join ⊔ x ∈ [ −∞ , + ∞ ] x ∈ [ 0 , 15 ] x ∈ [ 30 , 100 ] 1 4 5 x < 6 6 ≤ x ⊓ ⊔ x ∈ [ −∞ , 5 ] x ∈ [ 6 , + ∞ ] x ∈ [ 0 , 100 ] 2 3 6 15 / 35

  26. Operations on Abstractions Widening and Narrowing To analyze loops in less steps than the real iterations count ... and especially always analyze loops in finitely many steps. Termination of Analysis! 16 / 35

  27. Widening and Narrowing on Intervals y 10 9 int x = 1; 8 7 int y = 1; 6 // shown x, y values 5 4 // are at loop head 3 while (x <= 6) { 2 1 x = x + 1; 0 1 2 3 4 5 6 7 8 9 10 y = y + 2; x 1 st Iteration } y y y x ≤ 7 10 10 10 9 9 9 8 8 8 7 7 7 6 6 6 5 5 5 4 4 4 3 3 3 2 2 2 1 1 1 0 1 2 3 4 5 6 7 8 9 10 0 1 2 3 4 5 6 7 8 9 10 0 1 2 3 4 5 6 7 8 9 10 x x x 2 nd Iteration: ⊔ join 3 rd Iteration: ∇ widening 4 th Iteration: ∆ narrowing 17 / 35

  28. Abstract Interpretation Good introduction and overview material: • A gentle Introduction to Formal Verification of Computer Systems by Abstract Interpretation, P. Cousot and R. Cousot, 2010 • Abstract Interpretation Based Formal Methods and Future Challenges, P. Cousot, 2001 • Abstract Interpretation: Past, Present and Future, P. Cousot and R. Cousot, 2014 18 / 35

  29. Static Binary Analyzer Now to our Analyzer “Bindead” ... 19 / 35

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend