Dark Mode
Capec-68 Detail
Subvert Code-signing Facilities
Standard Software Hardware Likelihood: Low Typical Severity: Very High
Parents: 233
Threats: T73 T263 T281 T293 T307 T338 T387 T400
Many languages use code signing facilities to vouch for code's identity and to thus tie code to its assigned privileges within an environment. Subverting this mechanism can be instrumental in an attacker escalating privilege. Any means of subverting the way that a virtual machine enforces code signing classifies for this style of attack.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-68 | capec | https://capec.mitre.org/data/definitions/68.html | |
| CWE-325 | cwe | http://cwe.mitre.org/data/definitions/325.html | |
| CWE-328 | cwe | http://cwe.mitre.org/data/definitions/328.html | |
| CWE-1326 | cwe | http://cwe.mitre.org/data/definitions/1326.html | |
| T1553.002 | ATTACK | https://attack.mitre.org/wiki/Technique/T1553/002 | Subvert Trust Controls: Code Signing |
Not present
- A framework-based language that supports code signing (such as, and most commonly, Java or .NET)
- Deployed code that has been signed by its authoring vendor, or a partner.
- The attacker will, for most circumstances, also need to be able to place code in the victim container. This does not necessarily mean that they will have to subvert host-level security, except when explicitly indicated.
- The Attacker needs no special resources beyond the listed prerequisites in order to conduct this style of attack.
| High |
|---|
| Subverting code signing is not a trivial activity. Most code signing and verification schemes are based on use of cryptography and the attacker needs to have an understanding of these cryptographic operations in good detail. Additionally the attacker also needs to be aware of the way memory is assigned and accessed by the container since, often, the only way to subvert code signing would be to patch the code in memory. Finally, a knowledge of the platform specific mechanisms of signing and verifying code is a must. |
| Authorization | Access Control | Confidentiality |
|---|---|---|
| Gain Privileges | Gain Privileges | Gain Privileges |
- In old versions (prior to 3.0b4) of the Netscape web browser Attackers able to foist a malicious Applet into a client's browser could execute the "Magic Coat" attack. In this attack, the offending Applet would implement its own getSigners() method. This implementation would use the containing VM's APIs to acquire other Applet's signatures (by calling _their_ getSigners() method) and if any running Applet had privileged-enough signature, the malicious Applet would have inherited that privilege just be (metaphorically) donning the others' coats.
- Some (older) web browsers allowed scripting languages, such as JavaScript, to call signed Java code. In these circumstances, the browser's VM implementation would choose not to conduct stack inspection across language boundaries (from called signed Java to calling JavaScript) and would short-circuit "true" at the language boundary. Doing so meant that the VM would allow any (unprivileged) script to call privileged functions within signed code with impunity, causing them to fall prey to luring attacks.
- The ability to load unsigned code into the kernel of earlier versions of Vista and bypass integrity checking is an example of such subversion. In the proof- of-concept, it is possible to bypass the signature-checking mechanism Vista uses to load device drivers.