{"id":10608,"date":"2022-07-07T09:32:17","date_gmt":"2022-07-07T09:32:17","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?post_type=session&#038;p=10608"},"modified":"2023-05-26T08:26:03","modified_gmt":"2023-05-26T08:26:03","slug":"timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm","status":"publish","type":"session","link":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/","title":{"rendered":"Timekiller: Leveraging Asynchronous Clock to Escape from QEMU\/KVM"},"content":{"rendered":"<p style=\"text-align: justify;\">Asynchronous clock is used extensively in hypervisors, which is designed to avoid the blocking of the calling thread, thereby improving the responsiveness of the software. There are many devices using asynchronous clock to process their task in QEMU, such as Network,USB,Disk and Crypto device. However, we find that a attacker can leverage asynchronous clock to do some race condition attack, which can help to make a exploit.<\/p>\n<p style=\"text-align: justify;\">In this talk, we demonstrate <strong>how to achieve a full guest-to-host escape exploitation just through a heap overflow write vulnerability<\/strong>.<\/p>\n<p style=\"text-align: justify;\">We will show how to turn a malloc-use-free primitive to a malloc primitive and turn heap overflow write to arbitrary address write (AAW) by leveraging the asynchronous clock, which makes this hard-to-exploit vulnerability exploitable without the help of other devices in QEMU &#8211; <strong>this is a new attack approach which we call Timekiller.<\/strong> As far as we know, this is the first attack technique leveraging the asynchronous clock to finish a guest-to-host escape exploit.<\/p>\n<p style=\"text-align: justify;\"><strong>This is the first public virtual machine escape exploit in the virtio-crypto device (full 0-day)<\/strong>. Combining Timekiller and structures in virtio-crypto device, <strong>we can exploit most heap overflow write vulnerabilities in QEMU.<\/strong><\/p>\n","protected":false},"template":"","class_list":["post-10608","session","type-session","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Timekiller: Leveraging Asynchronous Clock to Escape from QEMU\/KVM - HITBSecConf2024 - Abu Dhabi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Timekiller: Leveraging Asynchronous Clock to Escape from QEMU\/KVM - HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"og:description\" content=\"Asynchronous clock is used extensively in hypervisors, which is designed to avoid the blocking of the calling thread, thereby improving the responsiveness of the software. There are many devices using asynchronous clock to process their task in QEMU, such as Network,USB,Disk and Crypto device. However, we find that a attacker can leverage asynchronous clock to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-26T08:26:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/\",\"name\":\"Timekiller: Leveraging Asynchronous Clock to Escape from QEMU\/KVM - HITBSecConf2024 - Abu Dhabi\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\"},\"datePublished\":\"2022-07-07T09:32:17+00:00\",\"dateModified\":\"2023-05-26T08:26:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Session\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Timekiller: Leveraging Asynchronous Clock to Escape from QEMU\/KVM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\",\"name\":\"HITBSecConf2024 - Abu Dhabi\",\"description\":\"Nov 25 - 28, Abu Dhabi, UAE\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Timekiller: Leveraging Asynchronous Clock to Escape from QEMU\/KVM - HITBSecConf2024 - Abu Dhabi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/","og_locale":"en_US","og_type":"article","og_title":"Timekiller: Leveraging Asynchronous Clock to Escape from QEMU\/KVM - HITBSecConf2024 - Abu Dhabi","og_description":"Asynchronous clock is used extensively in hypervisors, which is designed to avoid the blocking of the calling thread, thereby improving the responsiveness of the software. There are many devices using asynchronous clock to process their task in QEMU, such as Network,USB,Disk and Crypto device. However, we find that a attacker can leverage asynchronous clock to [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/","og_site_name":"HITBSecConf2024 - Abu Dhabi","article_modified_time":"2023-05-26T08:26:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/","name":"Timekiller: Leveraging Asynchronous Clock to Escape from QEMU\/KVM - HITBSecConf2024 - Abu Dhabi","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website"},"datePublished":"2022-07-07T09:32:17+00:00","dateModified":"2023-05-26T08:26:03+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/timekiller-leveraging-asynchronous-clock-to-escape-from-qemu-kvm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/"},{"@type":"ListItem","position":2,"name":"Session","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/"},{"@type":"ListItem","position":3,"name":"Timekiller: Leveraging Asynchronous Clock to Escape from QEMU\/KVM"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/","name":"HITBSecConf2024 - Abu Dhabi","description":"Nov 25 - 28, Abu Dhabi, UAE","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/session\/10608"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/types\/session"}],"version-history":[{"count":1,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/session\/10608\/revisions"}],"predecessor-version":[{"id":12035,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/session\/10608\/revisions\/12035"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/media?parent=10608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}