Poniżej publikujemy list, który ukazał się na liście BugTraq, a z którego wynika, że w OpenSSH występuje poważny błąd. Jednak jak podano kilka chwil później, informacja o błędzie nie jest zgodna z prawdą. Dlatego szybko poprawiamy tę wiadomość i przepraszamy za ewentualne wprowadzenie was, drodzy czytelnicy, w błąd.
UWAGA - INFORMACJA O BŁĘDZIE JEST NIEZGODNA Z PRAWDĄ FOR ENGLISH-SPEAKING USERS - THIS MAIL IS FAKE From mmhs@hushmail.com Mon Jan 6 20:25:42 2003 Date: Sat, 4 Jan 2003 19:37:03 -0800 From: mmhs@hushmail.com To: bugtraq@securityfocus.com Subject: OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS -----BEGIN PGP SIGNED MESSAGE----- *********** OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS *********** MICKEY MOUSE HACKING SQUADRON ADVISORY #2 DISCLAIMER - ---------- The nation's zeroth private security intelligence firm, Mickey Mouse Hacking Squadron uniquely addresses the challenges faced by both public- and private-sector organizations in protecting critical information assets. Our intelligence is timely, delivered 24 x 7, 365 (*) days per year; relevant, fully customizable, and actionable intelligence is only valuable if it makes a difference. (*) in the case of a leap year, we of course provide a 24 x 7, 366 days premier service. TECHNICAL BACKGROUND - -------------------- The following advisory is based on the excellent advisory published by Global InterSec LLC *six months ago*: http://www.globalintersec.com/adv/openssh-2002062801.txt After more than six months of intensive underground research, our ISO 31337 certified security department evidenced that the bug (an integer overflow, resulting in a heap overflow) described in the aforementioned advisory still exists in OpenSSH 3.5p1 and 3.4p1, and remains trivially exploitable. All existing PAM enabled versions of OpenSSH (3.5p1, 3.4p1 and below) are therefore affected. Due to various advisories posted to various fora by unnamed security companies, this bug was supposed to be nonexistent or nonexploitable. Fortunately, Global InterSec LLC shed some light on the whole affair and revealed the malignant nature of the oversight to the world. Their results were applied to the latest OpenSSH versions by privately trained Mickey Mouse Hacking Squadron security specialists and revealed that the exploitation techniques developed by Global InterSec LLC are still applicable to the newest OpenSSH. PROOF OF CONCEPT - ---------------- The following proof of concept is reproducing Global InterSec LLC findings, enhanced with the patented research performed by Mickey Mouse Hacking Squadron against OpenSSH 3.5p1. First of all, the OpenSSH 3.5p1 server has to be built (with PAM support enabled): $ tar xzf openssh-3.5p1.tar.gz $ cd openssh-3.5p1 $ configure --with-pam [...] $ make sshd [...] Before the SSH server is actually executed, the sshd_config file should be modified in order to enable PAM ("PAMAuthenticationViaKbdInt yes"). # sshd In order to reveal the nature of the OpenSSH vulnerability, the next step is to connect to the SSH server: $ ssh werewolf.research.mmhs.com Password: Thanks to the "Password:" prompt, it is clear that PAM is actually enabled (otherwise, the prompt would have been "user@host's password:"). This unique fingerprinting technique was investigated by Mickey Mouse Hacking Squadron, and is already present in the latest version of the Mickey Mouse Hacking Squadron award winning network vulnerability assessment tool. After the previous command was executed, the freshly spawned sshd process has to be examined with a debugger, in order to set the correct breakpoints within the input_userauth_info_response_pam() function of OpenSSH, as demonstrated in the Global InterSec LLC advisory: # gdb sshd 6552 (gdb) disassemble input_userauth_info_response_pam [...] 0x80531bc: push %esi 0x80531bd : call 0x807306c [...] (gdb) break *0x80531bd Breakpoint 1 at 0x80531bd: file auth2-pam.c, line 158. (gdb) continue Continuing. Now that the buggy call to xfree() can be intercepted, the SSH client should trigger the integer overlow and the resulting heap overflow: $ ssh werewolf.research.mmhs.com Password: After that, the xfree() breakpoint is reached, and the next call to free() should therefore be intercepted in order to comply with the technique developed by Global InterSec LLC: Breakpoint 1, 0x080531bd in input_userauth_info_response_pam (type=61, seqnr=7, ctxt=0x809c050) at auth2-pam.c:158 158 xfree(resp); (gdb) disassemble xfree [...] 0x807308e : call 0x804ba14 [...] (gdb) break *0x807308e Breakpoint 2 at 0x807308e: file xmalloc.c, line 55. (gdb) continue Continuing. Breakpoint 2, 0x0807308e in xfree (ptr=0x809dfb8) at xmalloc.c:55 55 free(ptr); (gdb) x /10x 0x809dfb8 0x809dfb8: 0x41414141 0x41414141 0x41414141 0x41414141 0x809dfc8: 0x41414141 0x41414141 0x41414141 0x41414141 0x809dfd8: 0x41414141 0x41414141 >From here on, as demonstrated by Global InterSec LLC, exploitation becomes trivial. For more information on exploiting calls to free() see the excellent Phrack article "Once upon a free()" [2]. WORK AROUND - ----------- As mentioned in http://www.openssh.com/txt/preauth.adv, and as demonstrated by noir in http://www.phrack.org/phrack/60/p60-0x06.txt, "you can prevent privilege escalation if you enable UsePrivilegeSeparation in sshd_config." Love, - -- Mickey Mouse Hacking Squadron -----BEGIN PGP SIGNATURE----- Version: Hush 2.2 (Java) Note: This signature can be verified at https://www.hushtools.com/verify wlkEARECABkFAj4XqFwSHG1taHNAaHVzaG1haWwuY29tAAoJEMZ9fu0iAPxbgYEAoL0W 0oGQQvqwwZAGADonQ2TOUjNmAJ4zuUfANSpju97UjXdD65bkCy6M1A== =YvOU -----END PGP SIGNATURE----- Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Big $$$ to be made with the HushMail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427
Archiwalny news dodany przez użytkownika: honey.
Kliknij tutaj by zobaczyć archiwalne komentarze.