Paper: Dylib hijacking on OS X


Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks.

A few years ago, DLL hijacking on

Windows

was really hot, despite the fact that the concept had been discussed by none other than the NSA as far back as 1998.

Many applications load dynamic link libraries (DLLs) without specifying a path name to indicate where the library is to be found in the operating system. When such a path name is absent, the operating system looks for the DLL file in a number of well-defined directories. An attacker could thus ‘hijack’ the DLL by placing a rogue DLL file into one of those directories, so that the operating system will find the rogue DLL first.



Patching vulnerabilities and the introduction of a number of OS-level mitigations has made DLL hijacking much less of an issue on

Windows

these days. But could other operating systems, such as

Mac OS X

, be vulnerable to a similar kind of attack?

This is what

Synack

researcher Patrick Wardle wondered. He set himself the task of finding a way to make

OS X

applications load arbitrary binaries.

Today, he presents the results of his research at the


CanSecWest


conference in Vancouver. He has also written a paper providing the technical details of his research – which

Virus Bulletin

has also published today.

It turns out that

OS X

is vulnerable to this kind of attack – which is known as ‘Dylib hijacking’ in this case. In his paper, Patrick takes the reader through his search for flaws, making it an excellent read for anyone who wants to harden the operating system by looking for these kinds of logic flaws.

Dylib hijacking is not as trivial as DLL hijacking once was on

Windows

and, of course, being able to make a vulnerable application load a rogue binary still requires the attacker to store the library on the target’s machine. As such, the attack is more suitable for making an existing infection maintain persistence (a subject that Patrick

spoke about

at VB2014) than as an infection vector.

Moreover, Patrick shows how a man-in-the-middle attacker could use only a very small amount of social engineering to bypass

Apple

‘s

Gatekeeper

, which is supposed to prevent malicious content from being loaded on

OS X

.



You can read the paper

here

in HTML format or

here

as a PDF. (Remember that all content published by

Virus Bulletin

can be read free of charge, with no registration required.)

Posted on 19 March 2015 by

Martijn Grooten


Posted

in

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *