期刊文献+

Tenda AX12路由器0-Day栈溢出漏洞挖掘方法

Tenda AX12 Router 0-Day Stack Overflow Vulnerability Mining Method
下载PDF
导出
摘要 随着5G技术对物联网发展的加速,预计到2025年将会有约250亿台物联网设备连接到人们的生活。其中承担物联网设备网络管理角色的路由器使用量非常大,但是路由器存在众多安全问题,通过路由器设备进行攻击,可以非法获取用户信息。为了维护网络安全,提前发现路由器的漏洞具有重要的研究意义。本文以Tenda AX12路由器为研究对象,从固件入手对其进行0-Day栈溢出漏洞挖掘研究,并提出了基于危险函数追踪的逆向分析漏洞挖掘方法。首先从危险函数中分析函数所在前端的对应位置,将前后端对应;然后对固件中的Web服务进行分析,对其中可能发生栈溢出的httpd二进制代码进行危险函数分析,该方法使用反汇编代码对危险函数的普通形式和展开形式进行定位,并对危险函数进行参数分析和动态检测;接着通过搭建仿真模拟机在模拟机上运行该服务的二进制文件,并在Web前端页面对潜在漏洞位置进行数据包捕捉;最后根据前期分析的危险函数参数情况对包进行改写并发送,以此来触发漏洞,验证漏洞的存在性,同时验证该危险函数是否发生栈溢出。为了更真实地确定漏洞存在,我们又在真实设备上验证漏洞的真实存在性和可利用性。实验结果表明了该漏洞的挖掘检测方法的有效性,我们分别在不同型号的路由器上挖掘到4个0-Day漏洞,并且经过与SaTC工具进行对比实验结果表明该检测方法能够更准确的定位到出现漏洞的函数位置。 As 5G technology accelerates the development of the Internet of Things,it is expected that there will be about 25 billion IoT devices connected to people’s lives by 2025.Among them,the routers that play the role of network management of IoT devices are used a lot,but there are many security problems in the routers.Attacks through router devices can illegally obtain user information.In order to maintain network security,it is of great research significance to discover the vulnerabilities of routers in advance.This paper takes the Tenda AX12 router as the research object,we start from the firmware,the 0-Day stack overflow vulnerability mining research is carried out,and propose a reverse analysis vulnerability mining method based on dangerous function tracing.First,analyze the corresponding position of the front end of the function from the dangerous function,and correspond the front end and the back end;then analyze the Web service in the firmware,and analyze the dangerous function of the httpd binary code in which stack overflow may occur.The common form and expanded form of the dangerous function are located,and the parameter analysis and dynamic detection of the dangerous function are carried out;then the binary file of the service is run on the emulator by building a simulation machine,and the potential vulnerability location is packaged on the Web front-end page.Capture;finally,rewrite and send the packet according to the dangerous function parameters analyzed in the previous stage,so as to trigger the vulnerability,verify the existence of the vulnerability,and verify whether the dangerous function has a stack overflow.In order to more realistically determine the existence of the vulnerability,we verify the real existence and exploitability of the vulnerability on real devices.The experimental results show the effectiveness of the mining and detection method of this vulnerability.We have mined four 0-Day vulnerabilities on different types of routers,and compared with the SaTC tool,the experimental results show that the detection method can more accurately locate the location of the function where the vulnerability occurs.
作者 郑炜 许晴晴 李奇 陈翔 孙家泽 ZHENG Wei;XU Qingqing;LI Qi;CHEN Xiang;SUN Jiaze(School of Software Engineering,Northwestern Polytechnical University,Xi’an 710100,China;School of Information Science and Technology,Nantong University,Nantong 226019,China;School of Computer Science,Xi’an University of Posts and Telecommunications,Xi’an 710121,China)
出处 《信息安全学报》 CSCD 2024年第3期157-175,共19页 Journal of Cyber Security
基金 国家自然科学基金专项项目(国家自然重点基金)课题(No.62141208) 国家重点研发计划课题(No.2020YFC0833105Z1)的资助 国家自然科学基金项目(No.62272387) 陕西省科技厅重点研发计划项目(No.2023-YBGY-030) 西安市重点产业链核心技术攻关项目(No.23ZDCYJSGG0028-2022)。
关键词 物联网 路由器 危险函数strcpy 0-Day栈溢出漏洞 SaTC IOT router dangerous function strcpy 0-Day stack overflow vulnerability SaTC
  • 相关文献

参考文献5

二级参考文献64

  • 1刘奇旭,张翀斌,张玉清,张宝峰.安全漏洞等级划分关键技术研究[J].通信学报,2012,33(S1):79-87. 被引量:36
  • 2孙淑华,马恒太,张楠,卿斯汉,王晓翠.后门植入、隐藏与检测技术研究[J].计算机应用研究,2004,21(7):78-81. 被引量:11
  • 3Cowan C, Wangle P, Pu C, et al. Buffer overflows:attacks and defenses for the vulnerability of the decade: DARPA Information Survivability Conference and Exposition [ C ]// [ S. l ] : IEEE Computer Sciety Press, 2000 : 154 - 163.
  • 4eEye Digital Security. Research. Published Advisories [ EB/OL ]. (2007 - 01 - 20 ) [ 2008 - 11 - 01 ]. http ://research. eeye. com/ht- ml/advisories/published/index, html.
  • 5Evans D,Larochelle D. Improving Security Using Extensible Light- weight Static Analysis[ J]. IEEE Software, 2002,19 ( 1 ) :42 - 51.
  • 6Viega J, Bloch J T, Kohno T, et al. ITS4 : A Static Vulnerability Scan- ner for C and C ++ Code[ C]//The 16th Annual Conference Of Com- puter Security Applications, New Orleans, 2000:257 - 267.
  • 7Wheeler D A. Flawfinder[ EB/OL] . ( 2001 - 05 - 28 ) [ 2008 - 09 - 24 ]. http://www, dwheeler, com/flawfinder/ .
  • 8Wanger D, Foster J S, Brewer E A. A first step towards automated de- tection of buffer overrun vulnerabilities: Network and Distributed Sys- tem Security Symposium [ C ]//San Diego, 2000:3 - 17.
  • 9Ruwase O, Lam M S. A Practical Dynamic Buffer A Practical Dynamic Buffer Overflow Detector. ( 2003 - 07 - 22 ) [ 2008 - 09 - 25 ]. ht- tp ://suif. stanford, edu/papers/tunji04, pdf.
  • 10Cowan C, Calton P, Dave M, et al. Stackguard : Automatic adaptive detection and prevention of buffer-overflow attacks [ G ]//Proceedings of the 7th conference on USENIX Security Symposium. San Antonio, 1998:63 - 77.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部