LogoFAIL: Security Implications of Image Parsing During System Boot
...Enter LogoFAIL, our latest research revealing significant security vulnerabilities in the image parsing libraries used by nearly all BIOS vendors to display logo images during boot. Our research highlights the risks associated with parsing complex file formats at such a delicate stage of the platform startup. During this talk, we will show how some UEFI BIOSes allow attackers to store custom logo images, which are parsed during boot, on the EFI system partition (ESP) or inside unsigned sections of a firmware update. We also shed light on the implications of these vulnerabilities, which extend beyond mere graphical rendering. In fact, successful exploitation of these vulnerabilities allows attackers to hijack the execution flow and achieve arbitrary code execution. LogoFAIL vulnerabilities can compromise the security of the entire system rendering “below-the-OS“ security measures completely ineffective (e.g., Secure Boot). Finally, our talk will include a detailed explanation of how we successfully escalate privileges from OS to firmware level by exploiting a real device vulnerable to LogoFAIL...
By: Alex Ermolov , Anton Ivanov , Alex Matrosov , Fabio Pagani , Sam Thomas , Yegor Vasilenko
Full Abstract and Presentation Materials:
#logofail-security-implications-of-image-parsing-during-system-boot-35042
1 view
0
0
8 months ago 00:44:15 1
LogoFAIL: Security Implications of Image Parsing During System Boot