exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Atstake Security Advisory 03-05-12.1

Atstake Security Advisory 03-05-12.1
Posted May 13, 2003
Authored by David Goldsmith, Jeremy Rauch, Atstake | Site atstake.com

Atstake Security Advisory A051203-1 - The Apple AirPort XORs a password with a fixed maximum of 32 bytes against a predefined key. If a password is set to one character, a simple sniff of the 32 byte block will reveal 31 bytes of the XOR key. The final byte can be obtained by XORing the obfuscated first byte against the first character of the plaintext password.

tags | advisory
systems | apple
SHA-256 | 72c9a3c6b408f1e2bd344bc4e089fb5e6fd14d01b2497ba07065546cd0280432

Atstake Security Advisory 03-05-12.1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



@stake, Inc.
www.atstake.com

Security Advisory

Advisory Name: Apple AirPort Administrative Password Obfuscation
Release Date: 05/12/2003
Application: AirPort Base Station (ALL)
Platform: AirPort Base Station
Severity: Sensitive information disclosure
Author: Jeremy Rauch <jrauch@atstake.com>
Dave G. <daveg@atstake.com>
Vendor Status: Notified, see response below
CVE Candidate: CAN-2003-0270
Reference: www.atstake.com/research/advisories/2003/a051203-1.txt


Overview:

Apple's AirPort device is a wireless access point, providing
802.11 services to network clients. Authentication credentials are
obfuscated, and then sent over the network. If an AirPort is
administered over the Ethernet interface or via an insecure (non WEP)
wireless connection, an attacker that can sniff the network can
obtain administrative access to the AirPort.


Details:

Apple's AirPort device is a wireless access point, providing
802.11 services to network clients. This device is managed through a
proprietary administrative protocol over a TCP port (5009/tcp).
Authentication credentials are obfuscated, and then sent over the
network.

The authentication credentials, a password with a maximum length of
32 characters, are XOR'd against a predefined key. When sent over
the network, the password is sent out in a 32 byte fixed block.
@stake was able to determine the key by setting a one character
password and monitoring the network traffic. This revealed 31 bytes
of the XOR 'key'. The final byte can be obtained by XORing the
obfuscated first byte against the first character of the plaintext
password.

If an AirPort is administered over the Ethernet interface or via an
insecure (non WEP) wireless connection, an anonymous attacker that
can sniff the network can obtain administrative access to the
AirPort. If WEP is enabled, then the attack is limited to WEP
authenticated attackers.


Vendor Response:

The recommendation is to administer the AirPort Base Station either
via a wired connection or via a WEP-protected wireless connection.


Recommendation:

The only way to securely administer the AirPort Base Station is by
connecting to it via a cross-over cable. In environments where this
is not practical, it is advised that the AirPort Base Station be
managed through the Ethernet network, and not the wireless network.


Common Vulnerabilities and Exposures (CVE) Information:

The Common Vulnerabilities and Exposures (CVE) project has assigned
the following names to these issues. These are candidates for
inclusion in the CVE list (http://cve.mitre.org), which standardizes
names for security problems.

CAN-2003-0270 Apple AirPort Administrative Password Obfuscation


@stake Vulnerability Reporting Policy:
http://www.atstake.com/research/policy/

@stake Advisory Archive:
http://www.atstake.com/research/advisories/

PGP Key:
http://www.atstake.com/research/pgp_key.asc

@stake is currently seeking application security experts to fill
several consulting positions. Applicants should have strong
application development skills and be able to perform application
security design reviews, code reviews, and application penetration
testing. Please send resumes to jobs@atstake.com.

Copyright 2003 @stake, Inc. All rights reserved.





-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA+AwUBPr+6AUe9kNIfAm4yEQKLIQCgs7QHABeuD5xQkx2V+n+lGqPzqnoAljk5
wSw2iptcVgJtq6NnFMUT8R8=
=lyTk
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close