Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability: Memory leaks | ASLR/PIC Support Needed to Mitigate Security Risks #1674

Open
vrajesh11 opened this issue Oct 9, 2024 · 0 comments
Labels

Comments

@vrajesh11
Copy link

SPECIFIC ISSUE ENCOUNTERED

During the dynamic scan of our Android app, we identified a vulnerability: Not Using Built-in Binary Protection (ASLR/PIC), which exposes app components to memory corruption attacks.

We would like to know which version of the app has ASLR and PIC enabled.

For reference:
PIC stands for Position Independent Code.
ASLR stands for Address Space Layout Randomization."

VERSIONS USED

  • ARCore SDK for Android: 1.33.0

STEPS TO REPRODUCE THE ISSUE

This test examines the individual components of the application to see if they were compiled using Position Independent Code (PIC) wherever applicable.

Business Impact (IF ANY)

Some components in this application do not protect against a specific type of attack that can allow an attacker to perform custom actions such as executing custom code or easily extracting interesting memory areas of the application.
These could potentially give them access to sensitive information from the app or the device.

ADDITIONAL COMMENTS

Not Using Built/in Binary Protection (ASLRHPIC) Exposes App Components to Memory Corruption Attacks.
PIC protection is not implemented for certain components of the application. ( libarcore_sdk_jni.so)

PIC ( Position Independent Code ) is required to ensure ASLR (Address Space Layout Randomization) which is a security feature that protects binaries when they are loaded and maintained in memory by randomizing the address space used in the application.

  • ASLR forces an attacker to guess memory addresses making it difficult to execute malicious code without first causing the application to crash.

  • ASLR also complicates the process of dumping specific application memory areas that the attacker might be interested in.

Regulatory:
CWE: https://cwe.mitre.org/data/definitions/119.html

@vrajesh11 vrajesh11 added the bug label Oct 9, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant