Arbitrary code execution

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

In computer security, arbitrary code execution (ACE) is used to describe an attacker's ability to execute arbitrary commands or code on a target machine or in a target process. An arbitrary code execution vulnerability is a security flaw in software or hardware allowing arbitrary code execution. A program that is designed to exploit such a vulnerability is called an arbitrary code execution exploit. The ability to trigger arbitrary code execution over a network (especially via a wide-area network such as the Internet) is often referred to as remote code execution (RCE).

Methods[edit]

Arbitrary code execution is commonly achieved through control over the instruction pointer (such as a jump or a branch) of a running process. The instruction pointer points to the next instruction in the process that will be executed. Control over the value of the instruction pointer therefore gives control over which instruction is executed next. In order to execute arbitrary code, many exploits inject code into the process (for example by sending input to it which gets stored in an input buffer in RAM) and use a vulnerability to change the instruction pointer to have it point to the injected code. The injected code will then automatically get executed. This type of attack exploits the fact that most computers (which use a Von Neumann architecture) do not make a general distinction between code and data[1][2], so that malicious code can be camouflaged as harmless input data. Many newer CPUs have mechanisms to make this harder, such as a no-execute bit[3][4].

Once the invader can execute arbitrary code directly on the OS, there is often an attempt at a privilege escalation exploit in order to gain additional control. This may involve the kernel itself or an account such as Administrator, SYSTEM, or root. With or without this enhanced control, exploits have the potential to do severe damage or turn the computer into a zombie - but privilege escalation helps with hiding the attack from the legitimate administrator of the system. An arbitrary remote code execution with privilege escalation vulnerability in widely deployed software is thus the most powerful vulnerability of them all.

Examples[edit]

Retrogaming hobbyists have managed to find vulnerabilities in classic video games that allow them to execute arbitrary code, usually using a precise sequence of button inputs in order to cause a buffer overflow, allowing them to write to protected memory. At Awesome Games Done Quick 2014, a group of speedrunning enthusiasts managed to code and create a primitive version of the games Pong and Flappy Bird in a copy of Super Mario World[5] by utilizing a buffer overflow to write arbitrary code to memory.

On June 12, 2018, security researcher Jean-Yves Avenard of Mozilla discovered an ACE vulnerability in Microsoft Windows 10.[6]

On May 1, 2018, a security researcher discovered an ACE vulnerability in the 7-Zip file archiver.[7]

PHP has been the subject of numerous ACE vulnerabilities.[8][9][10]

References[edit]

  1. ^ Gilreath, William F.; Laplante, Phillip A. (2003-03-31). Computer Architecture: A Minimalist Perspective. Springer Science & Business Media. ISBN 9781402074165.
  2. ^ Reilly, Edwin D. (2003). Milestones in Computer Science and Information Technology. Greenwood Publishing Group. ISBN 9781573565219.
  3. ^ "Tech Insight: Execute Disable Bit (XD-Bit)" (PDF). toshiba.pl. 2005.
  4. ^ "AMD has you covered" (PDF). amd.com. 2012.
  5. ^ Orland, Kyle (14 January 2014). "How an emulator-fueled robot reprogrammed Super Mario World on the fly". arstechnica.com. Retrieved 27 July 2016.
  6. ^ "Microsoft Windows CVE-2018-8213 Arbitrary Code Execution Vulnerability | Symantec". www.symantec.com. Retrieved 2018-10-31.
  7. ^ "A Vulnerability in 7-Zip Could Allow for Arbitrary Code Execution". New York State Office of Information Technology Services. Retrieved 2018-10-31.
  8. ^ "NVD - CVE-2017-12934". nvd.nist.gov. Retrieved 2018-10-31.
  9. ^ "File Operation Induced Unserialization via the "phar://" Stream Wrapper" (PDF). Secarma Labs. 2018.
  10. ^ "NVD - CVE-2017-12933". nvd.nist.gov. Retrieved 2018-10-31.