Viewer Discretion Advised: (De)coding an iOS Vulnerability


Over the years, ring-0 vulnerabilities in mobile devices have become increasingly difficult to find and exploit. Attackers and defenders alike must find new attack vectors, as well as develop tools to expedite the research process and increase coverage. One significant challenge is a more confining sandbox. While vendors usually put less emphasis on the security of mechanisms which are not operable from within the sandbox, sandboxing applications appropriately is not always that easy.

This talk is a real-world journey of finding, we will be uncovering a deeply buried vulnerability in the iOS kernelcache. The vulnerability, which is hidden within the video-decoder driver, can be triggered by processing maliciously crafted codec frames. The driver is normally not accessible to the standard application. This vulnerability, however, is still exploitable from within a sandboxed process or application. During this talk, concepts, tools and methods of work will be given: from initial search till getting familiar with a complete closed-source environment, as well as a real-world example of finding “sandbox-restrictive” vulnerabilities and exploiting them from the most narrowed context nevertheless.

Location: BALLROOM 1 Date: August 31, 2018 Time: 11:30 am - 12:30 pm Adam Donenfeld