Date: Thu, 24 Jan 2002 14:51:47 -0500 (EST)
From: CERT Advisory <[email protected]>
To: [email protected]Subject: CERT Advisory CA-2002-02 Buffer Overflow in AOL ICQ
-----BEGIN PGP SIGNED MESSAGE-----
CERT Advisory CA-2002-02 Buffer Overflow in AOL ICQ
Original release date: January 24, 2002
Last revised: --
Source: CERT/CC
A complete revision history can be found at the end of this file.
Systems Affected
* AOL Mirabilis ICQ Versions 2001A and prior
* Voice Video & Games plugin installed with AOL Mirabilis ICQ
Versions 2001B Beta v5.18 Build #3659 and prior
Overview
There is a remotely exploitable buffer overflow in ICQ. Attackers that
are able to exploit the vulnerability may be able to execute arbitrary
code with the privileges of the victim user. Full details are
discussed in VU#570167. An exploit is known to exist, but we do not
believe it has been distributed in the wild. We have not seen active
scanning for this vulnerability, nor have we received any reports of
this vulnerability being exploited.
I. Description
ICQ is a program for communicating with other users over the Internet.
ICQ is widely used (by over 122 million people according to ICQ Inc,
an AOL Time Warner owned subsidiary). A buffer overflow exists in the
ICQ client for Windows. The buffer overflow occurs during the
processing of a Voice Video & Games feature request message. This
message is supposed to be a request from another ICQ user inviting the
victim to participate interactively with a third-party application. In
versions prior to 2001B, the buffer overflow occurs in code within the
ICQ client. In version 2001B the code containing the buffer overflow
was moved to an external plug-in.
Therefore, all versions prior to the latest build of 2001B are
vulnerable. Upon connection to an AOL ICQ server, vulnerable builds of
the 2001B client will be instructed by the server to disable the
vulnerable plug-in. Since versions of the ICQ client prior to 2001B do
not have an external plug-in to disable, they are vulnerable even
after connecting to the server. AOL Time Warner is recommending all
users of vulnerable versions of ICQ upgrade to 2001B Beta v5.18 Build
#3659.
During normal operation, ICQ clients can exchange messages with one
another through the ICQ servers or via a direct connection. The buffer
overflow specifically occurs during the processing of the Voice Video
& Games request via a Type, Length, Value (TLV) tuple with type 0x2711
from the ICQ server, or via a crafted direct connection request.
Some versions of the ICQ client open port 4000/UDP for client-server
communication. Other versions open port 5190/TCP for this
communication. As with the previously reported AIM vulnerability, AOL
has modified the ICQ server infrastructure to filter malicious
messages that attempt to exploit this vulnerability, preventing it
from being exploited through an AOL ICQ server. Exploiting the
vulnerability through other means (man-in-the-middle attacks,
third-party ICQ servers, DNS spoofing, network sniffing, etc.) may
still be possible. Also, since UDP packets can be broadcast on a
network, a malicious TLV packet with a spoofed source IP address may
be accepted as a legitimate server message.
The ICQ client also listens on a variably assigned TCP port for direct
connection requests. A person who wishes to establish a direct
connection can query an ICQ server for the IP address and listening
port of the victim. Versions 2000A and prior accept direct connections
from anyone by default. Later versions of ICQ can be configured to
accept direct connections from anyone. Since ICQ requests can be sent
directly from one client to another, blocking requests through a
central server is not a completely effective solution. The effective
solution is to apply a patch, when available, that fixes the buffer
overflow, or upgrade to 2001B Beta v5.18 Build #3659 with the Voice
Video & Games feature disabled.
This vulnerability has been assigned the identifier CAN-2002-0028 by
the Common Vulnerabilities and Exposures (CVE) group:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0028
II. Impact
An attacker can execute arbitrary code with the privileges of the
victim user.
III. Solution
All users should upgrade to version 2001B Beta v5.18 Build #3659.
There is currently no patch available for the ICQ plug-in for 2001B or
versions of the ICQ client prior to 2001B. Version 2001B Beta v5.18
Build #3659's installer will delete the vulnerable plug-in. In
addition, for users who log in to the server with versions of 2001B
prior to Beta v5.18 Build #3659, access to the vulnerable plug-in will
be disabled. Users with versions prior to 2001B must upgrade to
mitigate this vulnerability.
Block ICQ/SMS requests at the firewall
Blocking connections to login.icq.com and access to ports 4000/UDP,
5190/TCP and the TCP port that your client chooses to listen on may
prevent exploitation of this vulnerability. Note that the client may
establish a new listening port each time it is run. Note also that
this does not protect you from attacks within the perimeter of your
firewall.
Block untrusted messages
ICQ permits the user to deny direct connections from anyone without
authorization or accept direct connections from known peers only. We
recommend denying direct connections from anyone without
authorization. By accepting direct connections from known peers, you
may still be vulnerable to attacks that originate from known peers if
the peer has been compromised.
Appendix A. - Vendor Information
This appendix contains information provided by vendors for this
advisory. When vendors report new information to the CERT/CC, we
update this section and note the changes in our revision history. If a
particular vendor is not listed below, we have not received their
comments.
AOL Time Warner
See http://web.icq.com/help/quickhelp/1,,117,00.html
_________________________________________________________________
The CERT Coordination Center thanks Daniel Tan and AOL Time Warner for
their assistance in discovering and analyzing this vulnerability.
_________________________________________________________________
Author: Jason A. Rafail
_________________________________________________________________
Appendix B. - References
1. http://www.kb.cert.org/vuls/id/570167
2. http://www.securityfocus.com/bid/3813
3. http://web.icq.com/help/quickhelp/1,,117,00.html
______________________________________________________________________
This document is available from:
http://www.cert.org/advisories/CA-2002-02.html
______________________________________________________________________
CERT/CC Contact Information
Email: [email protected]
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.
CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) /
EDT(GMT-4) Monday through Friday; they are on call for emergencies
during other hours, on U.S. holidays, and on weekends.
Using encryption
We strongly urge you to encrypt sensitive information sent by email.
Our public PGP key is available from
http://www.cert.org/CERT_PGP.key
If you prefer to use DES, please call the CERT hotline for more
information.
Getting security information
CERT publications and other security information are available from
our web site
http://www.cert.org/
To subscribe to the CERT mailing list for advisories and bulletins,
send email to [email protected]. Please include in the body of your
message
subscribe cert-advisory
* "CERT" and "CERT Coordination Center" are registered in the U.S.
Patent and Trademark Office.
______________________________________________________________________
NO WARRANTY
Any material furnished by Carnegie Mellon University and the Software
Engineering Institute is furnished on an "as is" basis. Carnegie
Mellon University makes no warranties of any kind, either expressed or
implied as to any matter including, but not limited to, warranty of
fitness for a particular purpose or merchantability, exclusivity or
results obtained from use of the material. Carnegie Mellon University
does not make any warranty of any kind with respect to freedom from
patent, trademark, or copyright infringement.
_________________________________________________________________
Conditions for use, disclaimers, and sponsorship information
Copyright 2002 Carnegie Mellon University.
Revision History
January 24, 2002: Initial release
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
iQCVAwUBPFBhSKCVPMXQI2HJAQH5HAQAgW7wzSjezC68o+q8fDGgokZzgEK8+28I
9PS9W4/Ah48+6LEnIW1gE0yfqTnt/vIONFZf0Wy2hfgUTJbLAj3kA5lGiCIu7aog
XSUwSnY7YOYa7i6tEWL0OoFWVtAWDlCf6ty1bt5UQqVAiLZcMzJlCehnLK/WHYq8
FrCx65d/sR0=
=DlDC
-----END PGP SIGNATURE-----