what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ieee1394.txt

ieee1394.txt
Posted Oct 27, 2004
Site pacsec.jp

IEEE1394 Specification allows client devices to directly access host memory, bypassing operating system limitations. A malicious client device can read and modify sensitive memory, causing privilege escalation, information leakage and system compromise.

tags | advisory
SHA-256 | 5908ecd32dc1bc51bdc80887e043a5b00259a45eb5d176b1d23bc4137217fdfd

ieee1394.txt

Change Mirror Download
Firewire/IEEE 1394 Considered Harmful to Physical Security

Advisory URL: http://pacsec.jp/advisories.html

Summary:
--------

IEEE1394 Specification allows client devices to directly access host
memory, bypassing operating system limitations. A malicious client device
can read and modify sensitive memory, causing privilege escalation,
information leakage and system compromise. Any system with sensitive
information or in an unsecured physical location, esp. public access
systems, should re-evaluate their system security and consider additional
physical security measures if they are equipped with "firewire" ports.
These ports are sometimes also called "iLink" on some Sony models.

Details:
--------

In the presentation, "Owned by an iPod" which Maximilian Dornseif, from
Laboratory for Dependable Distributed Systems at RWTH Aachen University,
will be giving at the PacSec.jp/core04 conference in Tokyo on Nov 11/12,
several new techniques involving the IEEE 1394 interface commonly
found on laptops, desktops, and some servers will be demonstrated.

These techniques could be used in both malicious and beneficial applications.
The beneficial applications are in the areas of system forensics and
external debugging. The malicious applications are that anyone with
physical access to the firewire port could tamper with system operation
and compromise security without measures such as power cycling or rebooting.

Systems that counted on physical access limitation such as blocking access
to reset and power switches and other measures to limit compromise though
such procedures as rebooting, need to re-examine their security.

As usual, physical access to a computer usually implies the ability
for compromise - however, with this new technique, merely plugging
in a malicious Firewire/1394 client device with special software
could be enough to tamper with a target. It becomes easier to
violate security if the combination of physical access and 1394
interfaces is available.

Security policies and procedures should be re-evaluated
and consider this new information where needed.

Fix:
----

On some systems that require untrusted/unauthenticated physical
access by strangers and still require restricted operations, removal
of wire headers connecting external case firewire jacks may provide
some limited remediation.

On laptops epoxy may be used to permanently disable the external jack
if such loss of functionality can be tolerated.

The primary precaution is that employees should be warned that they
should not plug unknown/untrusted firewire devices into computers
containing sensitive information.

As this capability is built into the specification and chipsets at
the hardware level, software fixes are still under investigation and
will be discussed at the presentation.


Systems Affected:
-----------------

- Any operating system and any processor platform with IEEE 1394 interfaces.
In some cases even if the operating system in question does not support
the interface, compromise may still be possible if the hardware is powered.

--
World Security Pros. Cutting Edge Training, Tools, and Techniques
Tokyo, Japan Nov 11-12 2004 http://pacsec.jp
pgpkey http://dragos.com/ kyxpgp
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close