Researchers bypass Redmond's EMET, again

Version 5 still a bit soft

Researchers have again disarmed Microsoft's lauded Enhanced Mitigation Experience Toolkit (EMET) defence tool, and criticised Redmond for not improving its security controls by much.

Offensive Security researchers, the brains behind the Kali Linux security platform and the gents that popped Version 4, examined the advanced security techniques employed in Redmond's fifth iteration of EMET.

In an unattributed blog post, the research hackers say the latest release of the tool introduced new features that scuttled their previous attack vectors against version 4.

" ... we were curious to see how difficult it would be to adapt our previous disarming technique to this new version of EMET," the researchers said.

"As we managed to successfully demonstrate, the difficulty in disarming EMET 5 mitigations has not increased substantially since version 4.x.

"More than anything, only our ROP (Return-Oriented Programming) chain has increased in size, while achieving the same effect of bypassing the protections offered by EMET."

The hackers targeted 32-bit Windows systems including Windows 7 and 2008 running service pack one, Windows 8 and 8.1, service pack three and Windows 2003 service pack two.

The Internet Explorer 8 ColspanID vulnerability (MS12-037) for consistency which they used previously to disarm new ROP mitigations in EMET version 4 by targeting a global variable in the .data section located at a static offset.

Microsoft's EMET aims to increase the complexity -- and therefore the cost -- of attacking Windows platforms by introducing defence technologies such as Address Space Layer Randomisation and Data Execution Prevention.

In February Redmond released version 5 which introduced Attack Surface Reduction to help corporate security apply usage policies or block Java, Flash Player and third-party browser plug-ins. It also sported an improved Export Address Table Filtering and deep hooks mitigation by default.

In February Bromium researcher Jared DeMott discovered flaws in EMET version 4 noting the platform and others which operated on the same plane of execution as malware "offer little lasting protection".

"This is true of EMET and other similar userland protections," DeMott said. "That's because a defense that is running in the same space as potentially malicious code can typically be bypassed, since there's no 'higher' ground advantage as there would be from a kernel or hypervisor protection." ®

Similar topics

Broader topics

Other stories you might like

  • DigitalOcean tries to take sting out of price hike with $4 VM
    Cloud biz says it is reacting to customer mix largely shifting from lone devs to SMEs

    DigitalOcean attempted to lessen the sting of higher prices this week by announcing a cut-rate instance aimed at developers and hobbyists.

    The $4-a-month droplet — what the infrastructure-as-a-service outfit calls its virtual machines — pairs a single virtual CPU with 512 MB of memory, 10 GB of SSD storage, and 500 GB a month in network bandwidth.

    The launch comes as DigitalOcean plans a sweeping price hike across much of its product portfolio, effective July 1. On the low-end, most instances will see pricing increase between $1 and $16 a month, but on the high-end, some products will see increases of as much as $120 in the case of DigitalOceans’ top-tier storage-optimized virtual machines.

    Continue reading
  • GPL legal battle: Vizio told by judge it will have to answer breach-of-contract claims
    Fine-print crucially deemed contractual agreement as well as copyright license in smartTV source-code case

    The Software Freedom Conservancy (SFC) has won a significant legal victory in its ongoing effort to force Vizio to publish the source code of its SmartCast TV software, which is said to contain GPLv2 and LGPLv2.1 copyleft-licensed components.

    SFC sued Vizio, claiming it was in breach of contract by failing to obey the terms of the GPLv2 and LGPLv2.1 licenses that require source code to be made public when certain conditions are met, and sought declaratory relief on behalf of Vizio TV owners. SFC wanted its breach-of-contract arguments to be heard by the Orange County Superior Court in California, though Vizio kicked the matter up to the district court level in central California where it hoped to avoid the contract issue and defend its corner using just federal copyright law.

    On Friday, Federal District Judge Josephine Staton sided with SFC and granted its motion to send its lawsuit back to superior court. To do so, Judge Staton had to decide whether or not the federal Copyright Act preempted the SFC's breach-of-contract allegations; in the end, she decided it didn't.

    Continue reading
  • US brings first-of-its-kind criminal charges of Bitcoin-based sanctions-busting
    Citizen allegedly moved $10m-plus in BTC into banned nation

    US prosecutors have accused an American citizen of illegally funneling more than $10 million in Bitcoin into an economically sanctioned country.

    It's said the resulting criminal charges of sanctions busting through the use of cryptocurrency are the first of their kind to be brought in the US.

    Under the United States' International Emergency Economic Powers Act (IEEA), it is illegal for a citizen or institution within the US to transfer funds, directly or indirectly, to a sanctioned country, such as Iran, Cuba, North Korea, or Russia. If there is evidence the IEEA was willfully violated, a criminal case should follow. If an individual or financial exchange was unwittingly involved in evading sanctions, they may be subject to civil action. 

    Continue reading

Biting the hand that feeds IT © 1998–2022