Buffer OverFlow in ILASM and ILDASM

Revision as of 13:54, 21 July 2006 by Dinis.cruz (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

See Below in this post

  • To MSRC: Buffer OverFlow in ILASM and ILDASM - The entire email conversation with MSRC (secure@microsoft.com) going from the inital response to the final answer where they will not threat this as a vulnerability and will not issue a security advisory for it (the solution will be included in the next Service Pack)
  • Buffer Overflow in ILASM - original email containing my first thoughts
  • ILDASM Exception Creator- little tool created by Kerem to create .Net assemblies that crash ILDASM
  • ILDAM vulnerability ShellCode development - more code snippets and comments (now releated to trying to inject a shellcode into the vulnerable process)

The bottom line is that this is a real issue in 1.1 and 1.0 (2.0 seems to mitigate them), Microsoft has acknowlege the problem but will not release a patch any time soon.

So be careful when you ILDASM something.

I also think that this issue needs further research since when we were testing the Overflows we were finding them in several places in ILASM and ILDASM (which means that there are probably many more variations still to be discovered/mapped)

To MSRC: Buffer OverFlow in ILASM and ILDASM

First email

[sent to secure@microsoft.com on 30th november 2003]

Dear MSRC,

Please find bellow our draft notes related to a Buffer Overflow vulnerability in .Net's ILASM and ILDASM.

On the attached zip file (BufferOverFlowInILASMandILDASM.zip) you can find the PoC files and several screenshots.

At the moment this information as only been distributed to a small number of security consultants (one of them is Alex Lucas from the Microsoft's UK Security team), but I am planning to publish this information next week, since I am assuming that you will rate it as either:

   a) a bug,
   b) a low-risk vulnerability, or
   c) behaviour by design :)

Looking forward to your comments,

Best regards

Dinis Cruz Owasp .Net Project www.owasp.net

Buffer Overflow In ILASM

A buffer overflow occurs in ILASM if a *.il file contains a call to a function of +/- 64k size. For example:



call instance void [System.Windows.Forms]System.Windows.Forms.Form::AAAAAAAAAAAAAAAAAAA .... (+/- 64k) AAAAA();

(see ILASM overflow 1.gif and ILASM overflow 2.gif)

To test this issue, on the command line, assemble the provided IilasmPoc.il file using ILASM and an exception will occur.

This issue has been confirm in the .Net framework 1.1. In 2.0 this seems to be fixed since no exception is thrown

Buffer Overflow In ILDASM

To test this issue,on the command line, disassemble the provided IldasmPoc.dll using ILDASM and an exception will occur. Which causes a heap overflow.

This issue has been confirmed in the .Net framework 1.1. In v2.0.an exception is thrown but it doesn't initially seem to be exploitable

The Exception on the ILDASM 1.1 is an 'Unhanded Exception which occurs at 0x7c92142e (ntdll.dll) in ildasm.exe: 0xC0000005: Access violation reading location 0x41414141 (see ILDASM2.PNG).

The debug result of the application shows that the exception is occurring in calloc.c source code of the ntdll.dll in windows xp service pack 2 debug symbols provided code block.

The Actual section of the exception is given below.

pvReturn = HeapAlloc(_crtheap, HEAP_ZERO_MEMORY, size); if (pvReturn == NULL) cmp dword ptr [pvReturn],ebx jne $L19640+1 (7C3423B6h) pvReturn = HeapAlloc(_crtheap, HEAP_ZERO_MEMORY, size); push esi push 8 push dword ptr [__crtheap (7C38C944h)] call dword ptr [__imp__HeapAlloc@12 (7C37A07Ch)] mov dword ptr [pvReturn],eax <-- The Exception Occurs Here

ILDASM Proof of Concept generator (see ILDASM_PoC folder)

To help with the debugging of this issue we created a simple PoC which generates a 74,3 kilobytes static method using Emit Namespaces inside the MyDynamicAsm.dll,

The CLR doesn't seem to be affected by this issue since the method can be called and executed using reflection. Note that it can't be called directly from c# (due to size restrictions on the vs.net compilers).

Ironically this method could be used as a protection for ildasm usage against compiled assemblies.


Original discovery: Dinis Cruz Further research, PoC and Documentation: Dinis Cruz and Kerem Kusmezer

Dinis Cruz Owasp .Net Project Leader www.owasp.net

final response: Its a vulnerability in 1.1, but no Security Patch will be released

From: "Microsoft Security Response Center" <secure@microsoft.com> Sent: 08 December 2005 11:32

Hi Dinis,

Great timing on your response, I have just received the feedback from the product team overnight.

The outcome from the investigation is as follows:

1. The ILDASM and ILASM tools are provided as part of the .Net Framework tools, SDK provided for developers and only for developers (no direct end user threat vectors - not installed by default etc).

2. As with any development tool being used by developers that accept input, the developer must ensure that what they are using to compile/ assemble/ open is considered trusted. This is equivalent to breaking Law 1 on http://www.microsoft.com/technet/archive/community/columns/security/essays/10imlaws.mspx

3. This issue has been fixed with Visual Studio 2005/ .Net Framework 2.0 - I have asked that this issue be fixed in any update shipped for the .Net 1.1, 1.0 SDK. (We would not issue a security bulletin for this).

Can you please let me know when you will post the message Owasp community, I would like to give a heads up to our Sec PR team to ensure the understand the underlying issue.

Thanks for not issuing the technical details, greatly appreciated, I think the message you post would be important to re-emphasize that developers who take un-trusted input for anything they build/ compile...whatever is extremely risky - this is one example of where that risk is realized.

Cheers Scott D.

Dinis Cruz Owasp .Net Project Leader www.owasp.net

Re: final response: Its a vulnerability in 1.1, but no Security Patch will be released

From: "Microsoft Security Response Center" <secure@microsoft.com> Sent: 08 December 2005 16:37

Hi Dinis,

I wanted to clarify something in my previous email, the assembler portion of this issue (ILASM) is included with the .Net framework, the disassembler is not, its part of the SDK.

This implies that we will need to fix the ILASM issue in the next .Net Framework 1.0/1.1 Service Pack.

Either way in all cases having developers ensure they are use trusted input to compiling is the best way to mitigate this issue.

Please let me know your thoughts on this issue, and I apologize for providing confusing information in the previous email.

Cheers Scott D. Dinis Cruz Owasp .Net Project Leader www.owasp.net

Buffer Overflow in ILASM

ILDASM Exception Creator

ILDAM vulnerability ShellCode development