mirror of
https://github.com/bitdefender/bddisasm.git
synced 2024-12-22 22:18:09 +00:00
Added new shemu flag: SHEMU_FLAG_SUD_ACCESS is raised whenever the code accesses the SharedUserData page.
This commit is contained in:
parent
c8735b437a
commit
5a617986b7
@ -1187,16 +1187,15 @@ ShemuGetOperandValue(
|
||||
else if (op->Type == ND_OP_MEM)
|
||||
{
|
||||
uint64_t gla = ShemuComputeLinearAddress(Context, op);
|
||||
uint32_t offset;
|
||||
uint8_t seg;
|
||||
|
||||
if (op->Info.Memory.IsAG)
|
||||
{
|
||||
// Address generation instruction, the result is the linear address itself.
|
||||
Value->Value.Qwords[0] = gla;
|
||||
goto done_gla;
|
||||
}
|
||||
else
|
||||
{
|
||||
uint32_t offset;
|
||||
uint8_t seg;
|
||||
|
||||
if (Context->Ring == 3)
|
||||
{
|
||||
@ -1226,6 +1225,13 @@ ShemuGetOperandValue(
|
||||
Context->Flags |= SHEMU_FLAG_TIB_ACCESS_WOW32;
|
||||
}
|
||||
|
||||
// Check for accesses inside the KUSER_SHARED_DATA (SharedUserData). This page contains some
|
||||
// global system information, it may host shellcodes, and is hard-coded at this address.
|
||||
if (gla >= 0x7FFE0000 && gla < 0x7FFE1000)
|
||||
{
|
||||
Context->Flags |= SHEMU_FLAG_SUD_ACCESS;
|
||||
}
|
||||
|
||||
// Check if we are reading a previously saved RIP. Ignore RET category, which naturally uses the saved RIP.
|
||||
// Also, ignore RMW instruction which naturally read the current value - this could happen if the code
|
||||
// modifies the return value, for example "ADD qword [rsp], r8".
|
||||
@ -1262,7 +1268,8 @@ ShemuGetOperandValue(
|
||||
|
||||
ShemuSetGprValue(Context, op->Info.Memory.Base, op->Info.Memory.BaseSize, regval, false);
|
||||
}
|
||||
}
|
||||
|
||||
done_gla:;
|
||||
}
|
||||
else if (op->Type == ND_OP_IMM)
|
||||
{
|
||||
@ -2414,7 +2421,7 @@ check_far_branch:
|
||||
}
|
||||
|
||||
// We may, in the future, emulate far branches, but they imply some tricky context switches (including
|
||||
// the default TEB), so it may not be as straight forward as it seems. For now, al we wish to achieve
|
||||
// the default TEB), so it may not be as straight forward as it seems. For now, all we wish to achieve
|
||||
// is detection of far branches in long-mode, from Wow 64.
|
||||
stop = true;
|
||||
break;
|
||||
|
Binary file not shown.
@ -1673,6 +1673,10 @@ handle_shemu(
|
||||
{
|
||||
printf(" SHEMU_FLAG_STACK_PIVOT\n");
|
||||
}
|
||||
if (ctx.Flags & SHEMU_FLAG_SUD_ACCESS)
|
||||
{
|
||||
printf(" SHEMU_FLAG_SUD_ACCESS\n");
|
||||
}
|
||||
if (ctx.Flags & SHEMU_FLAG_KPCR_ACCESS)
|
||||
{
|
||||
printf(" SHEMU_FLAG_KPCR_ACCESS\n");
|
||||
|
@ -254,6 +254,7 @@ typedef unsigned int SHEMU_STATUS;
|
||||
#define SHEMU_FLAG_TIB_ACCESS_WOW32 0x00000040 // The code accesses the Wow32Reserved field inside TIB.
|
||||
#define SHEMU_FLAG_HEAVENS_GATE 0x00000080 // The code uses Heaven's gate to switch into 64 bit mode.
|
||||
#define SHEMU_FLAG_STACK_PIVOT 0x00000100 // The code switched the stack using XCHG esp, *.
|
||||
#define SHEMU_FLAG_SUD_ACCESS 0x00000200 // The code accesses the KUSER_SHARED_DATA page.
|
||||
// Kernel specific flags.
|
||||
#define SHEMU_FLAG_KPCR_ACCESS 0x00010000 // KPCR current thread access via gs:[0x188]/fs:[0x124].
|
||||
#define SHEMU_FLAG_SWAPGS 0x00020000 // SWAPGS was executed.
|
||||
|
@ -7,6 +7,6 @@
|
||||
|
||||
#define DISASM_VERSION_MAJOR 1
|
||||
#define DISASM_VERSION_MINOR 34
|
||||
#define DISASM_VERSION_REVISION 1
|
||||
#define DISASM_VERSION_REVISION 2
|
||||
|
||||
#endif // DISASM_VER_H
|
||||
|
@ -12,7 +12,7 @@ from setuptools import find_packages, setup, Command, Extension, Distribution
|
||||
from codecs import open
|
||||
|
||||
VERSION = (0, 1, 3)
|
||||
LIBRARY_VERSION = (1, 34, 1)
|
||||
LIBRARY_VERSION = (1, 34, 2)
|
||||
LIBRARY_INSTRUX_SIZE = 864
|
||||
|
||||
packages = ['pybddisasm']
|
||||
|
Loading…
Reference in New Issue
Block a user