text stringlengths 0 1.99k |
|---|
`c29`, `c30`, etc are just CHERI versions of `x1`, `x29`, `x30`, and so on. |
The CHERI forms of most of the usual Aarch64 instructions continue to |
behave in the natural way: `add c29, csp, #64` will add the immediate `64` |
to `csp` and store the result in `c29`. Remember that the ALU still only |
works with 64-bit integers, so the capability metadata part of the |
registers isn't included in the addition. However, the CPU will |
automatically preserve the tag bit when necessary (for example when a |
program intentionally performs pointer arithmetic on a capability). This |
is an important point to keep in mind - manipulation of capabilities that |
are already in registers *doesn't clear the tag bit*. |
Then, at `0x108f0` we encounter our first truly CHERI-unique instruction: |
`scbnds c1, c1, #16`. The SCBNDS mnemonic is short for "Set CHERI Bounds" |
and with that knowledge you can maybe guess that this instruction sets the |
capability bounds on register `c1` (which is computed as a 32-byte offset |
from the stack pointer `csp` in the instruction just prior) to the |
immediate `16`. In the context of our program, that makes perfect sense: in |
`overflow()` we declared an array of `char`s called `buffer` on the stack |
to be exactly `16` bytes in size. All in all, the `buffer` capability ends |
up being stored in register `c1` after the instruction at `0x108f0` |
executes. |
And with that, the rest of the disassembly of `overflow()` should largely |
make more sense now! Just remember that for most instructions, there's |
nothing particularly strange about the `c`-registers as the only thing that |
matters is the "value" field. We only need to really consider the |
capability nature of the values stored in registers when doing memory |
operations. Taking a closer look at the crashed `stack` program in GDB we |
can better understand what goes wrong: |
``` |
root@cheribsd-morello-purecap:~/vuln # gdb -q ./stack --args stack \ |
0123456789abcdef |
Reading symbols from stack... |
(gdb) r |
Starting program: /root/vuln/stack 0123456789abcdef |
Calling overflow() |
buffer @ 0xfffffff7fef0 [rwRW,0xfffffff7fef0-0xfffffff7ff00] |
Program received signal SIGPROT, CHERI protection violation. |
Capability bounds fault. |
0x000000004037c7f8 in strcpy (to=0xfffffff7ff00 [rwRW,0xfffffff7fef0- |
0xfffffff7ff00] "q\375\367\277\377\377", from=<optimized out>) |
at /home/user/cheri/cheribsd/lib/libc/string/strcpy.c:48 |
(gdb) x/i $pcc |
=> 0x4037c7f8 <strcpy+24>: strb w8, [c2], #1 |
(gdb) i r w8 c2 |
w8 0x0 0 |
c2 0xdc5d40007f00fef00000fffffff7ff00 0xfffffff7ff00 [rwRW, |
0xfffffff7fef0-0xfffffff7ff00] |
``` |
We already knew to expect a crash in `strcpy()`, but looking at the exact |
instruction that caused the CHERI fault we see that it's a store of the |
byte `0x00` (the NULL byte at the end of the 16 character string we passed |
as the program argument) to the capability in `c2`. Examining that |
capability (which GDB helpfully expands for us) we see that the VALUE is |
`0xfffffff7ff00`, but the BOUNDS are `0xfffffff7fef0-0xfffffff7ff00`, i.e. |
we're trying to store a byte at the memory location that is just beyond the |
range that our capability permits us to access! |
### Capability Overwrites |
We can perhaps be a little craftier in our vulnerable program. Instead of |
writing out-of-bounds, what if we intentionally write a program that let's |
us modify a pointer. While this program might look silly, I expect many |
people reading this have found themselves in a situation where their only |
primitive was being able to partially overwrite a pointer. I'm going to |
call this file `partial.c`. |
``` |
#include <stdio.h> |
#include <string.h> |
void __attribute__((noinline)) some_func(void) { |
printf("inside some_func()\n"); |
} |
int main(int argc, char** argv) { |
void (*func_ptr)(void) = &some_func; |
if (argc >= 2) { |
strcpy((char*)&func_ptr, argv[1]); |
} |
printf("Calling `func_ptr()` @ %#p\n", func_ptr); |
func_ptr(); |
return 0; |
} |
``` |
Building this from our `vuln` directory with `./build.sh partial.c partial` |
and hopping back into the CheriBSD VM, we can start exploring. This time |
around, we'll explicitly keep our inputs small to avoid triggering an out- |
of-bounds write. The size of `func_ptr` itself will be 16 bytes (because |
it's a capability), so the capability `&func_ptr` that gets passed to |
`strcpy()` will have a bounds of 16 bytes. Therefore we should keep our |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.