exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

IVIZ-08-010.txt

IVIZ-08-010.txt
Posted Sep 18, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of SafeBoot Device Encryption fails to sanitize the BIOS keyboard buffer after reading passwords, resulting in plain text password leakage to unprivileged local users. Affected is McAfee Safeboot Device Encryption version 4, Build 4750 and below.

tags | advisory, local
SHA-256 | 78a8f15592e7899a1c913eeb459f8791629f0e1831fb0927ed20feae27499353

IVIZ-08-010.txt

Change Mirror Download
-----------------------------------------------------------------------
[ iViZ Security Advisory 08-010 17/09/2008 ]
-----------------------------------------------------------------------
iViZ Techno Solutions Pvt. Ltd.
http://www.ivizsecurity.com
-----------------------------------------------------------------------

* Title: McAfee SafeBoot Device Encryption
Plain Text Password Disclosure
* Date: 17/09/2008
* Software: McAfee SafeBoot Device Encryption v4, Build 4750 and below

--[ Synopsis:

The password checking routine of SafeBoot Device Encryption fails to
sanitize the BIOS keyboard buffer after reading passwords, resulting
in plain text password leakage to unprivileged local users.

--[ Affected Software:

* SafeBoot Device Encryption v4, Build 4750 and below

--[ Non Affected Software:

* SafeBoot Device Encryption v4, Build 4760 and above
* SafeBoot Device Encryption v5.x

--[ Technical description:

SafeBoot's pre-boot authentication routines use the BIOS API to
read user input via the keyboard. The BIOS internally copies the
keystrokes in a RAM structure called the BIOS Keyboard buffer
inside the BIOS Data Area. This buffer is not flushed after use,
resulting in potential plain text password leakage once the OS
is fully booted, assuming the attacker can read the password at
physical memory location 0x40:0x1e.


--[ Impact:

Plain text password disclosure. Local guest access is required,
but no physical access to the machine.

--[ Full Technical Whitepaper

http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf

--[ Vendor response:

Vendor quoted:

"SafeBoot Device Encryption v4, Build 4750 and below are subject to this
vulnerability. Builds 4760 and above are not. Customers should upgrade
to the current version of SafeBoot Device Encryption v4, or migrate to
the current McAfee Endpoint Encryption for PC v5 platform which replaced
the earlier product in March 2007."


--[ Credits:

This vulnerability was discovered by Security Researcher
Jonathan Brossard from iViZ Techno Solutions Pvt. Ltd.

Jonathan would like to thank the people present at his
Defcon presentation who sent him informations regarding
the vulnerability affecting this particular product.

--[ Disclosure timeline:

* First private disclosure to vendor on August 19th 2008
* McAfee asked for more technical details on August 20th 2008
* First Public disclosure on September 17th 2008

--[ Reference:

http://www.ivizsecurity.com/security-advisory.html
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close