Dark Mode
Capec-237 Detail
Escaping a Sandbox by Calling Code in Another Language
Detailed Software Likelihood: Low Typical Severity: Very High
Parents: 480
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-237 | capec | https://capec.mitre.org/data/definitions/237.html | |
| CWE-693 | cwe | http://cwe.mitre.org/data/definitions/693.html | |
| REF-91 | reference_from_CAPEC | J. Cappos, J. Rasley, J. Samuel, I. Beschastnikh, C. Barsan, A. Krishnamurthy, T. Anderson, Retaining Sandbox Containment Despite Bugs in Privileged Memory-Safe Code, The 17th ACM Conference on Computer and Communications Security (CCS '10), 2010 | |
| REF-92 | reference_from_CAPEC | https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Exploit%3AJava%2FByteVerify.C | Malware Protection Center: Threat Research and Response, 2007, Microsoft Corporation |
Explore
-
Probing: The attacker probes the target application to see whether calling code of another language is allowed within a sandbox.
-
Analysis: The attacker analyzes the target application to get a list of cross code weaknesses in the standard libraries of the sandbox.
| Techniques |
|---|
| The attacker probes the target application to see whether calling code of another language is allowed within a sandbox. |
| Techniques |
|---|
| The attacker analyzes the target application to get a list of cross code weaknesses in the standard libraries of the sandbox. |
Experiment
-
Verify the exploitable security weaknesses: The attacker tries to craft malicious code of another language allowed by the sandbox to verify the security weaknesses of the standard libraries found in the Explore phase.
| Techniques |
|---|
| The attacker tries to explore the security weaknesses by calling malicious code of another language allowed by the sandbox. |
Exploit
-
Exploit the security weaknesses in the standard libraries: The attacker calls malicious code of another language to exploit the security weaknesses in the standard libraries verified in the Experiment phase. The attacker will be able to obtain access to privileges that were not intentionally exposed by the sandbox, thus escaping the sandbox.
| Techniques |
|---|
| The attacker calls malicious code of another language to exploit the security weaknesses in the standard libraries. |
Not present
- None: No specialized resources are required to execute this type of attack.
| High |
|---|
| The attacker must have a good knowledge of the platform specific mechanisms of signing and verifying code. Most code signing and verification schemes are based on use of cryptography, the attacker needs to have an understand of these cryptographic operations in good detail. |
| Authorization | Access Control | Accountability | Authentication | Non-Repudiation |
|---|---|---|---|---|
| Bypass Protection Mechanism | Bypass Protection Mechanism | Gain Privileges | Gain Privileges | Gain Privileges |
| Execute Unauthorized Commands (Run Arbitrary Code) | ||||
| Gain Privileges |
- Exploit: Java/ByteVerify.C is a detection of malicious code that attempts to exploit a vulnerability in the Microsoft Virtual Machine (VM). The VM enables Java programs to run on Windows platforms. The Microsoft Java VM is included in most versions of Windows and Internet Explorer. In some versions of the Microsoft VM, a vulnerability exists because of a flaw in the way the ByteCode Verifier checks code when it is initially being loaded by the Microsoft VM. The ByteCode Verifier is a low level process in the Microsoft VM that is responsible for checking the validity of code - or byte code - as it is initially being loaded into the Microsoft VM. Java/ByteVerify.C attempts to download a file named "msits.exe", located in the same virtual directory as the Java applet, into the Windows system folder, and with a random file name. It then tries to execute this specific file. This flaw enables attackers to execute arbitrary code on a user's machine such as writing, downloading and executing additional malware. This vulnerability is addressed by update MS03-011, released in 2003.