On Thu, Oct 20, 2016 at 10:40:28AM +0200, Peter Janos wrote:
> Hello,
> 
> http://news.softpedia.com/news/researchers-bypass-aslr-protection-on-intel-ha
> swell-cpu-509460.shtml
> ??
> paper:
> http://www.cs.ucr.edu/~nael/pubs/micro16.pdf[http://www.cs.ucr.edu/~nael/pubs
> /micro16.pdf]
> ??
> could we somehow prevent this attack on OpenBSD?

if you read the paper, you will notice that they only tested on Ubuntu and OSX,
neither of which actually ship with ASLR enabled by default if I remember 
correctly.
The paper has no(!) references to OpenBSD, they never show any actual code, and 
it
appears that this is a local exploit that seems to require that the victim and 
spy
processes share the same virtual address space, meaning that ASLR isn't 
actually enabled.

Shawn Webb (HardenedBSD and trying to get ASLR into FreeBSD) has a preliminary
writeup at https://gist.github.com/lattera/c785e7088118442f10addf8c6017c7d0 with
a finished version due whenever he gets it done.

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to