←back to thread

Memory Integrity Enforcement

(security.apple.com)
473 points circuit | 1 comments | | HN request time: 0.423s | source
Show context
pizlonator ◴[] No.45188131[source]
This is really impressive.

It’s my understanding that this won’t protect you in the case where the attacker has a chance to try multiple times.

The approach would be something like: go out of bounds far enough to skip the directly adjacent object, or do a use after free with a lot of grooming, so that you get a a chance of getting a matching tag. The probability of getting a matching tag is 1/16.

But this post doesn’t provide enough details for me to be super confident about what I’m saying. Time will tell! If this is successful then the remaining exploit chains will have to rely on logic bugs, which would be super painful for the bad guys

replies(3): >>45188201 #>>45189018 #>>45198401 #
1. amelius ◴[] No.45198401[source]
It also won't help with supply-chain attacks. Executed by e.g. a state actor who is playing the long game.