SLIDE 11 Proof-of-Concept Attack
Vulnerability & Preparation
Vulnerability: a real heap-overflow in IE8
How: accessing span and width attributes of an HTML column table through JavaScript.
Exploit:
- Bypasses: kBouncer, DEP, ASLR
- Controls the target address of an indirect jump instruction
- Undetectable!
○ Short ROP payload ○ Detected only if TC,TG are restricted
→ Can be triggered several times!
1. Overwrite size of a string to read data beyond its boundaries 2. Overwrite Virtual Function Table (VFT) pointer within a button object 3. Control indirect jump via access to button