Vulnerability Discovered by Tyler Bohan and Cory Duplantis of Cisco Talos

Talos has identified an exploitable out-of-bounds write vulnerability in the ELF Section Header parsing functionality of Hopper ( TALOS-2016-0222 /CVE-2016-8390). Hopper is a reverse engineering tool for macOS and linux allowing the user to disassemble and decompile 32/64bit Intel-based Mac, Linux, windows and iOS executables. During the parsing of ELF section headers, there is a user controlled size that is not validated, a malicious threat actor could craft an ELF file with specific section headers to trigger this vulnerability, potentially leading to remote code execution. A malicious threat actor could use a zip file containing the crafted executable to target threat researchers, sent via phishing or file sharing sites. This type of exploit can also be used as an anti-analysis measure in an attempt to defeat sandboxes and automated disassembly.

Hopper has been updated the changelog can be read at this URL:

Vulnerability Spotlight: Hopper Disassembler ELF Section Header Size Code Execut ...

Talos has released rules that detect attempts to exploit this vulnerability to protect our customers. Please note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or

Snort Rules: 40488-40489

本文系统(linux)相关术语:linux系统 鸟哥的linux私房菜 linux命令大全 linux操作系统

主题: LinuxiOSWindowsHead
tags: vulnerability,Hopper,ELF,file,Talos,threat
本文标题:Vulnerability Spotlight: Hopper Disassembler ELF Section Header Size Code Execut ...

技术大类 技术大类 | 系统(linux) | 评论(0) | 阅读(105)