EMET knocks out EMET. And the winner is ... nobody. Except Linux advocates
24 Feb 2016 at 07:38, Darren Pauli
FireEye security wonks Abdulellah Alsaheel and Raghav Pande have twisted the barrels of Microsoft's lauded EMET Windows defence gun 180 degrees and fired.
The result of their research is p0wnage of the enhanced mitigation toolkit so that instead of defending Windows it attacks it.
The attacks the pair found affect older versions of Windows which rely on EMET for modern defences like address space layout randomisation and data execution prevention.
Windows 10 already has much of EMET's payload baked in save for some newly-added features in the latest version 5.5, which is also patched against Alsaheel's and Pande's hack.
The duo say their research targets an area of EMET code that unloads the software.
"The code systematically disables EMET’s protections and returns the program to its previously unprotected state," the pair says.
"One simply needs to locate and call this function to completely disable EMET.
"Jumping to this function results in subsequent calls, which remove EMET’s installed hooks."
Various historical EMET bypasses have focused on exploiting missing features and implementation flaws.
By contrast, Alsaheel's and Pande's hack turns EMET's protections, all while fitting into a short basic return-oriented programming chain.
"This new technique uses EMET to unload EMET protections," they say. "It is reliable and significantly easier than any previously published EMET disabling or bypassing technique." ®
...better to update to latest 5.5....