<<< Date Index >>>     <<< Thread Index >>>

[0xbadc0ded #03] DeleGate (SSL-filter) <= 8.9.2



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

==========================================================================
0xbadc0ded Advisory #03 - 2004/05/06 - DeleGate <= 8.9.2 (SSL-filter)
==========================================================================

Reference      http://0xbadc0ded.org/advisories/0401.txt
PGP-key        http://0xbadc0ded.org/advisories/pubkey.asc

Application    DeleGate <= 8.9.2 (SSL-filter)
Discovered By  Joel Eriksson <je@xxxxxxxxxx>
Researched By  Joel Eriksson <je@xxxxxxxxxx>

Overview

  DeleGate is a multi-purpose application level gateway which runs on
  a variety of platforms, such as Unix, Windows, MacOS X and OS/2.
  DeleGate can be used to mediate communication of various protocols,
  including but not limited to HTTP, FTP, NTTP, SMTP, POP, Telnet and
  SOCKS. It has the ability to apply caching and conversion for mediated
  data, access control from clients and routing towards servers. It
  is also able to translate between protocols and apply SSL (TLS) to
  arbitrary protocols.

Problem

  A remotely exploitable buffer overflow vulnerability exists in the
  SSLway filter that is used when SSL should be applied to a client
  or server connection.

  The bug can be triggered using a certificate with field contents
  large enough to make the subject or issuer name larger than 256 bytes.
  The vulnerability is caused by this piece of code in filters/sslway.c:

    static ssl_prcert(ssl,show,outssl,outfd,what)
            SSL *ssl;
            char *what;
    {       X509 *peer;
            char subjb[256],*sb,issrb[256],*is;
            char *dp,ident[256];
    
            ident[0] = 0;
            if( peer = SSL_get_peer_certificate(ssl) ){
                    sb = 
X509_NAME_oneline(X509_get_subject_name(peer),subjb,1024);
                    is = 
X509_NAME_oneline(X509_get_issuer_name(peer),issrb,1024);

  The second argument to X509_NAME_oneline() is the buffer to write to and
  the third argument is the size of that buffer. In the case above a
  buffer size of 1024 is specified, but the buffers are only 256 bytes
  large. This allows us to, for instance, overwrite the saved return
  address in ssl_prcert()'s stack frame.

Exploit
 
  X509_NAME_oneline() converts chars below 0x20 or above 0x7e to '\xHH'
  where HH is the hexadecimal value of the char. This makes the bug pretty
  hard to exploit on at least x86 Unix variants since we will usually need
  to write chars outside that range to construct a valid address where we
  can place shellcode. Creative use of a partially overwritten pointer or
  address is likely to be possible, but I haven't investigated that
  thouroughly.

  For instance, the "peer" or "ssl" pointers may be of use, since at least
  the SSL struct contains pointers to callback functions, and of course
  partially overwriting the saved ebp or eip is a possibility. Any pointer
  that is dereferenced and written or called to can possibly be abused.

  What I find most ironic about this flaw and other flaws where a
  restricted set of characters can be written is that the address space
  randomization feature in kernel patches such as PaX can actually make
  the flaws easier to exploit. The sendmail prescan() bug comes to mind..

  The only protection against standard return-to-lib(c) techniques in PaX
  is address space randomization, with 16 bits of entropy (e.g. 65536
  possibilities). This means bruteforcing the offset can be done in a few
  minutes on most systems.

  For bugs that the attacker only has one shot to succeed with,
  randomization may be considered good enough by some. However, in the
  case of daemons that handle each connection in a separate process (which
  is the case here) or for local SUID/SGID vulnerabilities, randomization
  is no adequate protection.

  To create an SSL certificate that can be used to trigger this bug, it's
  easiest to use the OpenSSL command line tool:

    [je@vudo ~]$ cat>openssl.cnf<<EOF
    > [ req ]
    > distinguished_name = req_dn
    > prompt = no
    > [ req_dn ]
    > CN=bof
    > 0.OU=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    > 1.OU=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    > 2.OU=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    > 3.OU=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    EOF
    [je@vudo ~]$ openssl req -x509 -new -nodes -out bof.pem -keyout bof.pem 
-config openssl.cnf
    Generating a 512 bit RSA private key
    .........++++++++++++
    ..........++++++++++++
    writing new private key to 'bof.pem'

  For an example of an actual exploit using the return-to-lib(c) technique
  to defeat address space randomization as provided by PaX, and possibly
  also restricted charset such as in X509_NAME_oneline(), take a look at:

    http://0xbadc0ded.org/exploits/pax-poc.tar.gz

Fix

  Upgrade to DeleGate 8.9.3 or edit filters/sslway.c and change:

    sb = X509_NAME_oneline(X509_get_subject_name(peer),subjb,1024);
    is = X509_NAME_oneline(X509_get_issuer_name(peer),issrb,1024);

  to:

    sb = X509_NAME_oneline(X509_get_subject_name(peer),subjb,sizeof(subjb));
    is = X509_NAME_oneline(X509_get_issuer_name(peer),issrb,sizeof(issrb));

Disclosure Timeline

  2004/05/02 Notified the DeleGate team
  2004/05/05 DeleGate 8.9.3 was released with fix (without notifying us)
  2004/05/06 Public release

==========================================================================
The 0xbadc0ded.org team is hosted and sponsored by Bitnux: www.bitnux.com
==========================================================================

Bitnux is a company located in Sweden focused on security
research and system development. We offer services such as:

  - Code Reviews
  - Exploit Development
  - Reverse Engineering of Code
  - Security Revisions of Systems and Software
  - Custom System Development for Unix/Linux/BSD and Windows

E-mail : info@xxxxxxxxxx
Phone  : +46-70-228 64 16
Chat   : http://bitnux.com/live

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFAmiNuqnq6VG/4jhQRAokjAKDQbc79S5KGkawUYBSAyPnVaF6RKACeJimZ
d3DpniP2OMX/HiCEHKuAGaA=
=jfZJ
-----END PGP SIGNATURE-----