{"id":4292,"date":"2017-11-21T00:36:00","date_gmt":"2017-11-20T23:36:00","guid":{"rendered":"http:\/\/borncity.com\/win\/?p=4292"},"modified":"2018-09-07T17:22:20","modified_gmt":"2018-09-07T15:22:20","slug":"aslr-fails-in-windows-8-8-1-and-10-but-there-is-a-fix","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2017\/11\/21\/aslr-fails-in-windows-8-8-1-and-10-but-there-is-a-fix\/","title":{"rendered":"ASLR fails in Windows 8, 8.1 and 10 &ndash; but there is a fix"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2013\/03\/winb.jpg\" width=\"58\" height=\"58\" align=\"left\" \/>[<a href=\"http:\/\/www.borncity.com\/blog\/2017\/11\/20\/fix-windows8-8-1-windows10-patzen-bei-aslr\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Here is Microsoft's next security glitch. Developers have made a mistake that causes the ASLR mechanism not always work properly in Windows 8, Windows 8.1 and Windows 10. But there's a fix.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Address_space_layout_randomization\" target=\"_blank\" rel=\"noopener\">Address Space Layout Randomization (ASLR)<\/a> is a computer security technology designed to make it harder for attackers to exploit a buffer overflow. This technique is actually included in all modern operating systems. For Windows Vista, Microsoft has implemented ASLR throughout the entire system for the first time.<\/p>\n<h2>Windows 10: ASLR is included in Defender<\/h2>\n<p>To enable the feature, users had to install Microsoft EMET on Windows Vista or Windows 7 to enable ASLR in system-wide and\/or application-specific states. However, EMET will be discontinued in 2018 and Microsoft has integrated its functions into Windows 10.<\/p>\n<p><img decoding=\"async\" title=\"ASLR in Defender\" src=\"https:\/\/i.imgur.com\/D5OwI1w.jpg\" alt=\"ASLR in Defender\" \/><\/p>\n<p>In Windows Defender Security Center (accessible via <em>Settings<\/em> app) under <em>App &amp; browser control <\/em>and subgroup <em>Exploit protection settings<\/em>.<\/p>\n<h2>A discovery during investigating an Office flaw<\/h2>\n<p>A few hours ago I've published the blog post <a href=\"https:\/\/borncity.com\/win\/2017\/11\/20\/has-microsoft-lost-access-to-parts-of-office-source-code\/\">Has Microsoft lost access to parts of Office source code?<\/a>, where Office Equation editor has been patched. Investigating this vulnerability, CERT\/CC vulnerability analyst Will Dormann discovered that ASLR did not randomly randomize the storage code locations of application binary files under certain conditions. While in Windows 7 and EMET the memory addresses of loaded modules were random by ASLR on restarting Windows, this was no longer the case in Windows 10. Dormann published his findings in a <a href=\"https:\/\/twitter.com\/wdormann\/status\/930916460473577474\" target=\"_blank\" rel=\"noopener\">Tweet<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p dir=\"ltr\" lang=\"en\">Actually, with Windows 7 and EMET System-wide ASLR, the loaded address for eqnedt32.exe is different on every reboot. But with Windows 10 with either EMET or WDEG, the base for eqnedt32.exe is 0x10000 EVERY TIME.<br \/>\nConclusion: Win10 cannot be enforce ASLR as well as Win7! <a href=\"https:\/\/t.co\/Jp10nqk1NQ\">pic.twitter.com\/Jp10nqk1NQ<\/a><\/p>\n<p>\u2014 Will Dormann (@wdormann) <a href=\"https:\/\/twitter.com\/wdormann\/status\/930916460473577474?ref_src=twsrc%5Etfw\">15. November 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The erroneous formula editor EQNEDT32. EXE was loaded to the same memory address each time the program was restarted. According to <a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/817544\" target=\"_blank\" rel=\"noopener\">this CERT alert<\/a>, an incorrect registry entry from Windows 8 (and hence in Windows 8.1 and Windows 10) prevents the reliable use of ASLR.<\/p>\n<h2>Fix: Add some registry values<\/h2>\n<p>Fortunately, there is a fix to make ASLR work again under Windows 8 &#8211; 10. Create a. reg file with the following content:<\/p>\n<pre><code>Windows Registry Editor Version 5.00\r\n\r\n[HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\kernel]\r\n\"MitigationOptions\"=hex:00,01,01,00,00,00,00,00,00,00,00,00,00,00,00,00<\/code><\/pre>\n<p>Then import this reg file with administrator credentials. This should fix the flaw in Windows ASLR. (via\u00a0 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/windows-8-and-later-fail-to-properly-apply-aslr-heres-how-to-fix\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer<\/a>)<\/p>\n<p>Addendum: There is a statement from Microsoft &#8211; see my blog post\u00a0<a href=\"https:\/\/borncity.com\/win\/2017\/11\/23\/windows-8-8-1-10-microsoft-says-aslr-flaw-is-a-feature\/\" rel=\"bookmark\">Windows 8\/8.1\/10: Microsoft says ASLR flaw is a feature.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Here is Microsoft's next security glitch. Developers have made a mistake that causes the ASLR mechanism not always work properly in Windows 8, Windows 8.1 and Windows 10. But there's a fix.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[773,69,76,23],"class_list":["post-4292","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-defender","tag-security","tag-windows-10","tag-windows-8-1"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=4292"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4292\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=4292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=4292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=4292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}