<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How Secure Is Second Life &#8211; Really?</title>
	<atom:link href="http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/feed" rel="self" type="application/rss+xml" />
	<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html</link>
	<description>Always Fairly Unbalanced</description>
	<lastBuildDate>Tue, 04 Oct 2016 13:18:56 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1</generator>
	<item>
		<title>By: Azlø Bildcher</title>
		<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/comment-page-1#comment-79749</link>
		<dc:creator>Azlø Bildcher</dc:creator>
		<pubDate>Sun, 13 Jan 2013 02:52:08 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=125#comment-79749</guid>
		<description>&quot;Deadlycodec&quot;...(!!)

So much  -v  ultimately reveals your Homer&#039;s elbow....

as does your overuse of ctrl c and ctrl v.....</description>
		<content:encoded><![CDATA[<p>&#8220;Deadlycodec&#8221;&#8230;(!!)</p>
<p>So much  -v  ultimately reveals your Homer&#8217;s elbow&#8230;.</p>
<p>as does your overuse of ctrl c and ctrl v&#8230;..</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Deadlycodec</title>
		<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/comment-page-1#comment-2615</link>
		<dc:creator>Deadlycodec</dc:creator>
		<pubDate>Sun, 22 Nov 2009 12:23:17 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=125#comment-2615</guid>
		<description>And as someone who is actually experienced in finding vulnerabilities, I have to beg to differ on the coolness factor. For one, for a hacker picking something apart to understand how it works is always cool - that&#039;s a major part of the ideology on which the subculture is based. It isn&#039;t just about breaking into computers, legally or otherwise. It&#039;s about exploration, knowledge, and learning - the very things that others have even heard me describe as part of the meaning of life. Fact is, I enjoy what I do with or without validation and honestly most of the stuff I do these days is kept under wraps, which reinforces that point.

And secondly, sloppy bounds checking code (or any other insecure code) implies the presence of more sloppy and insecure code elsewhere, which may or may not take the form of an integer overflow, an off-by-one, and/or your standard stack or heap overflow, or any number of other vulnerabilities, not to mention the ever-common business logic error and client-side enforcement bug that we&#039;ve seen pop up time and again in Second Life. Maybe even an exploitable null pointer dereference, though the latter is unlikely. In an application with this much code, that is a very reasonable assumption. Ask any researcher what he thinks when auditing code when he comes across a vuln, even one that doesn&#039;t appear to be exploitable such as this, and he&#039;ll tell you something similar.

The nature of your comments imply that you have an e-grudge and a Napoleon complex. Wouldn&#039;t be surprised if you were Sapinski himself. If you are, at least you learned not to put your name behind comments that make you look stupid. That&#039;s always a plus. Anyways, you don&#039;t seem qualified to really be able to say much on this topic at all, so excuse me for not taking you all that seriously. I guess this behavior should be expected from a guy who lost his virginity at age 18 at SLCC of all places. Seems like rather than making your own name through your own deeds, you&#039;d rather discredit and attack others which implies that you are relatively unskilled.
</description>
		<content:encoded><![CDATA[<p>And as someone who is actually experienced in finding vulnerabilities, I have to beg to differ on the coolness factor. For one, for a hacker picking something apart to understand how it works is always cool &#8211; that&#8217;s a major part of the ideology on which the subculture is based. It isn&#8217;t just about breaking into computers, legally or otherwise. It&#8217;s about exploration, knowledge, and learning &#8211; the very things that others have even heard me describe as part of the meaning of life. Fact is, I enjoy what I do with or without validation and honestly most of the stuff I do these days is kept under wraps, which reinforces that point.</p>
<p>And secondly, sloppy bounds checking code (or any other insecure code) implies the presence of more sloppy and insecure code elsewhere, which may or may not take the form of an integer overflow, an off-by-one, and/or your standard stack or heap overflow, or any number of other vulnerabilities, not to mention the ever-common business logic error and client-side enforcement bug that we&#8217;ve seen pop up time and again in Second Life. Maybe even an exploitable null pointer dereference, though the latter is unlikely. In an application with this much code, that is a very reasonable assumption. Ask any researcher what he thinks when auditing code when he comes across a vuln, even one that doesn&#8217;t appear to be exploitable such as this, and he&#8217;ll tell you something similar.</p>
<p>The nature of your comments imply that you have an e-grudge and a Napoleon complex. Wouldn&#8217;t be surprised if you were Sapinski himself. If you are, at least you learned not to put your name behind comments that make you look stupid. That&#8217;s always a plus. Anyways, you don&#8217;t seem qualified to really be able to say much on this topic at all, so excuse me for not taking you all that seriously. I guess this behavior should be expected from a guy who lost his virginity at age 18 at SLCC of all places. Seems like rather than making your own name through your own deeds, you&#8217;d rather discredit and attack others which implies that you are relatively unskilled.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Deadlycodec</title>
		<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/comment-page-1#comment-2614</link>
		<dc:creator>Deadlycodec</dc:creator>
		<pubDate>Sun, 22 Nov 2009 11:25:00 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=125#comment-2614</guid>
		<description>
&quot;I had missed the comment that a &quot;particular instance didn&#039;t appear to be exploitable as it were.&quot;

And if you were such an sooper awesome haxzor, you could have figured that out all by yourself! I mean, I am assuming that you read my blog post, since you mentioned the /gs flag which implies you knew it was a stack overflow. That tidbit wasn&#039;t mentioned in this piece. Now, if you had read that blog post then there is no way you could have mistaken it for an exploitable vuln. I said it clearly several times.

Then again, you come across like a code kiddie who pretends to know more than he does, citing the /gs flag as though it mitigates stack-based overflows in their entirety, or maybe you assumed it mitigated all memory corruption bugs. So either way, that kinda makes you dumb. If anyone is paying you to do security for them, they&#039;re in for a very rude awakening with that level of expertise.

BTW, here is yet another paper that shows weaknesses in the Buffer Security Check option from Visual Studio:


&lt;a href=&quot;http://blogs.technet.com/srd/archive/2009/03/16/gs-cookie-protection-effectiveness-and-limitations.aspx&quot; rel=&quot;nofollow&quot;&gt;http://blogs.technet.com/srd/archive/2009/03/16/gs-cookie-protection-effectiveness-and-limitations.aspx&lt;/a&gt;

Those are CVE&#039;s that impacted widely used software - the vulns are very well known. And this paper doesn&#039;t actually detail methodologies for bypassing the mechanism, but rather exposes some fundamental flaws in the system that left critical parts of code unprotected, which allowed for many, many, computers to be compromised. There are even ways to bypass /SafeSEH with /gs protection.


</description>
		<content:encoded><![CDATA[<p>&#8220;I had missed the comment that a &#8220;particular instance didn&#8217;t appear to be exploitable as it were.&#8221;</p>
<p>And if you were such an sooper awesome haxzor, you could have figured that out all by yourself! I mean, I am assuming that you read my blog post, since you mentioned the /gs flag which implies you knew it was a stack overflow. That tidbit wasn&#8217;t mentioned in this piece. Now, if you had read that blog post then there is no way you could have mistaken it for an exploitable vuln. I said it clearly several times.</p>
<p>Then again, you come across like a code kiddie who pretends to know more than he does, citing the /gs flag as though it mitigates stack-based overflows in their entirety, or maybe you assumed it mitigated all memory corruption bugs. So either way, that kinda makes you dumb. If anyone is paying you to do security for them, they&#8217;re in for a very rude awakening with that level of expertise.</p>
<p>BTW, here is yet another paper that shows weaknesses in the Buffer Security Check option from Visual Studio:</p>
<p><a href="http://blogs.technet.com/srd/archive/2009/03/16/gs-cookie-protection-effectiveness-and-limitations.aspx" rel="nofollow">http://blogs.technet.com/srd/archive/2009/03/16/gs-cookie-protection-effectiveness-and-limitations.aspx</a></p>
<p>Those are CVE&#8217;s that impacted widely used software &#8211; the vulns are very well known. And this paper doesn&#8217;t actually detail methodologies for bypassing the mechanism, but rather exposes some fundamental flaws in the system that left critical parts of code unprotected, which allowed for many, many, computers to be compromised. There are even ways to bypass /SafeSEH with /gs protection.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: derf</title>
		<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/comment-page-1#comment-2613</link>
		<dc:creator>derf</dc:creator>
		<pubDate>Sat, 21 Nov 2009 23:06:47 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=125#comment-2613</guid>
		<description>I am reasonably convinced now that you didn&#039;t find anything cool.  I had missed the comment that a &quot;particular instance didn&#039;t appear to be exploitable as it were.&quot;  Thanks
</description>
		<content:encoded><![CDATA[<p>I am reasonably convinced now that you didn&#8217;t find anything cool.  I had missed the comment that a &#8220;particular instance didn&#8217;t appear to be exploitable as it were.&#8221;  Thanks</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Deadlycodec</title>
		<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/comment-page-1#comment-2612</link>
		<dc:creator>Deadlycodec</dc:creator>
		<pubDate>Sat, 21 Nov 2009 14:29:40 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=125#comment-2612</guid>
		<description>Not only that, but without actually downloading the binaries and running them in a debugger, how is it even possible to tell what protection that switch will provide, if any? I say this because this protection is dependent on which version of Visual Studio is being used to compile the binaries that everyone is using, which are downloaded from Linden Lab&#039;s servers - people don&#039;t usually compile the viewer themselves.

I&#039;ll correct an earlier statement I made. The /gs switch and SafeSEH are not synonymous. It may still be possible to attack via structured exception handling, which is unprotected by that switch at least in older versions of visual studio (I haven&#039;t checked the newer ones) in which an additional compiler switch must be added to enable this added protection. Furthermore, gs does not protect all functions and if it isn&#039;t used properly may not provide very much protection at all. Additionally, how are the libraries that Second Life uses compiled? They contain code (duh!) that is a part of the viewer too and if those aren&#039;t completely secure, they may present an additional attack vector. A perfect example would be that Quicktime vulnerability discovered by Dino Dai Zovi awhile back. See here:

&lt;a href=&quot;http://securityevaluators.com/content/case-studies/sl/&quot; rel=&quot;nofollow&quot;&gt;http://securityevaluators.com/content/case-studies/sl/&lt;/a&gt;

Now, I am satisfied that I have sufficiently argued my point. And I do it with my name behind it. So I&#039;ll be back if and when you can find something else to be smug about but somehow I doubt you&#039;ll find anything very compelling. Later.
</description>
		<content:encoded><![CDATA[<p>Not only that, but without actually downloading the binaries and running them in a debugger, how is it even possible to tell what protection that switch will provide, if any? I say this because this protection is dependent on which version of Visual Studio is being used to compile the binaries that everyone is using, which are downloaded from Linden Lab&#8217;s servers &#8211; people don&#8217;t usually compile the viewer themselves.</p>
<p>I&#8217;ll correct an earlier statement I made. The /gs switch and SafeSEH are not synonymous. It may still be possible to attack via structured exception handling, which is unprotected by that switch at least in older versions of visual studio (I haven&#8217;t checked the newer ones) in which an additional compiler switch must be added to enable this added protection. Furthermore, gs does not protect all functions and if it isn&#8217;t used properly may not provide very much protection at all. Additionally, how are the libraries that Second Life uses compiled? They contain code (duh!) that is a part of the viewer too and if those aren&#8217;t completely secure, they may present an additional attack vector. A perfect example would be that Quicktime vulnerability discovered by Dino Dai Zovi awhile back. See here:</p>
<p><a href="http://securityevaluators.com/content/case-studies/sl/" rel="nofollow">http://securityevaluators.com/content/case-studies/sl/</a></p>
<p>Now, I am satisfied that I have sufficiently argued my point. And I do it with my name behind it. So I&#8217;ll be back if and when you can find something else to be smug about but somehow I doubt you&#8217;ll find anything very compelling. Later.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Deadlycodec</title>
		<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/comment-page-1#comment-2611</link>
		<dc:creator>Deadlycodec</dc:creator>
		<pubDate>Sat, 21 Nov 2009 13:55:31 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=125#comment-2611</guid>
		<description>@derf

And here is more on the /gs switch:

www.symantec.com/avcenter/reference/GS_Protections_in_Vista.pdf

Once you understand how a system works, finding ways to circumvent it isn&#039;t so much of an issue. A minor obstacle.

Anyways, I specifically stated that this particular instance didn&#039;t appear to be exploitable as it were. So what exactly are me arguing about again?
</description>
		<content:encoded><![CDATA[<p>@derf</p>
<p>And here is more on the /gs switch:</p>
<p><a href="http://www.symantec.com/avcenter/reference/GS_Protections_in_Vista.pdf" rel="nofollow">http://www.symantec.com/avcenter/reference/GS_Protections_in_Vista.pdf</a></p>
<p>Once you understand how a system works, finding ways to circumvent it isn&#8217;t so much of an issue. A minor obstacle.</p>
<p>Anyways, I specifically stated that this particular instance didn&#8217;t appear to be exploitable as it were. So what exactly are me arguing about again?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Deadlycodec</title>
		<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/comment-page-1#comment-2610</link>
		<dc:creator>Deadlycodec</dc:creator>
		<pubDate>Sat, 21 Nov 2009 12:17:36 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=125#comment-2610</guid>
		<description>FYI that ngsoftware paper was on ret2libc attacks, and doesn&#039;t really take into account stack canaries,etc. in the most modern xpm implementations, however, it is still possible to defeat it and you&#039;re still an imbecile for googling a compiler switch and claiming it totally mitigates memory corruption bugs without doing any further research.  Here is a better paper:
www.uninformed.org/?v=7&amp;a=2&amp;t=pdf

Also there is a really good paper by Leviathan Security called Exploitation Techniques and Mitigations on Windows, but you&#039;ll need to find it yourself.

Simply put, these sorts of mechanisms don&#039;t stop attacks, they just tend to make them a little more complicated. Every mechanism that has been designed, has gradually been defeated. That pattern has been pretty consistent, and will continue to be.
</description>
		<content:encoded><![CDATA[<p>FYI that ngsoftware paper was on ret2libc attacks, and doesn&#8217;t really take into account stack canaries,etc. in the most modern xpm implementations, however, it is still possible to defeat it and you&#8217;re still an imbecile for googling a compiler switch and claiming it totally mitigates memory corruption bugs without doing any further research.  Here is a better paper:<br />
<a href="http://www.uninformed.org/?v=7&#038;a=2&#038;t=pdf" rel="nofollow">http://www.uninformed.org/?v=7&#038;a=2&#038;t=pdf</a></p>
<p>Also there is a really good paper by Leviathan Security called Exploitation Techniques and Mitigations on Windows, but you&#8217;ll need to find it yourself.</p>
<p>Simply put, these sorts of mechanisms don&#8217;t stop attacks, they just tend to make them a little more complicated. Every mechanism that has been designed, has gradually been defeated. That pattern has been pretty consistent, and will continue to be.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Deadlycodec</title>
		<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/comment-page-1#comment-2609</link>
		<dc:creator>Deadlycodec</dc:creator>
		<pubDate>Sat, 21 Nov 2009 11:41:16 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=125#comment-2609</guid>
		<description>@derf

/gs only applies to Second Life when compiled with visual studio, a windows application.  Here is a nice little summary of the SafeSEH crap, which, like every other protection mechanism, is less than full proof:

&quot;Flipping a single compiler switch will not make an application secure. It can help make an application more secure, but security vulnerabilities come in many different forms. Overruns of stack-based buffers are an important class of security vulnerability, but they are far from the end of the story when it comes to the techniques that hackers will use to attack an application. Despite initially appearing relatively harmless, heap-based buffer overruns are now known to be an exploitable vulnerability, and other attacks like SQL injection, cross-site scripting, and Denial of Service can all happily succeed against an application that relies on /GS for security.&quot;

It&#039;s just fucking Data Execution Prevention aka DEP, which can still be defeated.

&quot;To use the formal terminology that has been adopted by Microsoft, /GS and SAFESEH are examples of software-enforced data execution prevention (DEP). Software-enforced DEP also can be complemented by hardware-enforced DEP, in which the processor will refuse to execute instructions if they are located within a memory page that has been marked as non-executable. Windows XP SP2 and Windows Server 2003 currently support these technologies, but few shipping processors have No Execute (NX) support. AMD and Intel have high-end offerings in the 64-bit world with NX technology, and future 32-bit processors may also ship with these security enhancements.&quot;

OH WAIT, DOES THIS MEAN THAT DERF SHOULD LURK MOAR?

www.ngssoftware.com/papers/xpms.pdf - explains a few methodologies for defeating this mechanism. Now, go read up on stack protection mechanisms and when you have the expertise, THEN come back and argue with me, kthx.
</description>
		<content:encoded><![CDATA[<p>@derf</p>
<p>/gs only applies to Second Life when compiled with visual studio, a windows application.  Here is a nice little summary of the SafeSEH crap, which, like every other protection mechanism, is less than full proof:</p>
<p>&#8220;Flipping a single compiler switch will not make an application secure. It can help make an application more secure, but security vulnerabilities come in many different forms. Overruns of stack-based buffers are an important class of security vulnerability, but they are far from the end of the story when it comes to the techniques that hackers will use to attack an application. Despite initially appearing relatively harmless, heap-based buffer overruns are now known to be an exploitable vulnerability, and other attacks like SQL injection, cross-site scripting, and Denial of Service can all happily succeed against an application that relies on /GS for security.&#8221;</p>
<p>It&#8217;s just fucking Data Execution Prevention aka DEP, which can still be defeated.</p>
<p>&#8220;To use the formal terminology that has been adopted by Microsoft, /GS and SAFESEH are examples of software-enforced data execution prevention (DEP). Software-enforced DEP also can be complemented by hardware-enforced DEP, in which the processor will refuse to execute instructions if they are located within a memory page that has been marked as non-executable. Windows XP SP2 and Windows Server 2003 currently support these technologies, but few shipping processors have No Execute (NX) support. AMD and Intel have high-end offerings in the 64-bit world with NX technology, and future 32-bit processors may also ship with these security enhancements.&#8221;</p>
<p>OH WAIT, DOES THIS MEAN THAT DERF SHOULD LURK MOAR?</p>
<p><a href="http://www.ngssoftware.com/papers/xpms.pdf" rel="nofollow">http://www.ngssoftware.com/papers/xpms.pdf</a> &#8211; explains a few methodologies for defeating this mechanism. Now, go read up on stack protection mechanisms and when you have the expertise, THEN come back and argue with me, kthx.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: derf</title>
		<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/comment-page-1#comment-2608</link>
		<dc:creator>derf</dc:creator>
		<pubDate>Sat, 21 Nov 2009 09:16:34 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=125#comment-2608</guid>
		<description>Secondlife is compiled with /gs.  Idiots.
</description>
		<content:encoded><![CDATA[<p>Secondlife is compiled with /gs.  Idiots.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: makomk</title>
		<link>http://alphavilleherald.com/2009/10/how-secure-is-second-life-really.html/comment-page-1#comment-2607</link>
		<dc:creator>makomk</dc:creator>
		<pubDate>Sat, 31 Oct 2009 11:59:53 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=125#comment-2607</guid>
		<description>&quot;Anyways, the only other thing I wanted to address was Timeless Prototype&#039;s claims that vulnerabilities are only found where researchers are looking. This isn&#039;t true. Anyone with a willingness to learn and the ability to grasp the information, and an understanding of programming, data types,etc can find vulnerabilities.&quot;

Yep. The one remotely-exploitable buffer overflow in the Second Life client I&#039;m aware of was discovered accidentally by someone reading the source code. (It&#039;s long dead, thankfully - the last vulnerable version is now far too old to be able to connect to the grid.) Now, actually going from there to an exploit is harder, of course.
</description>
		<content:encoded><![CDATA[<p>&#8220;Anyways, the only other thing I wanted to address was Timeless Prototype&#8217;s claims that vulnerabilities are only found where researchers are looking. This isn&#8217;t true. Anyone with a willingness to learn and the ability to grasp the information, and an understanding of programming, data types,etc can find vulnerabilities.&#8221;</p>
<p>Yep. The one remotely-exploitable buffer overflow in the Second Life client I&#8217;m aware of was discovered accidentally by someone reading the source code. (It&#8217;s long dead, thankfully &#8211; the last vulnerable version is now far too old to be able to connect to the grid.) Now, actually going from there to an exploit is harder, of course.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

