The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Time modification flaw in BSD securelevels on NetBSD and Linux


<< Previous INDEX Search src / Print Next >>
Date: Mon, 9 Jan 2006 13:28:38 +0100
From: RedTeam Pentesting <release@redteam-pentesting.de.>
To: [email protected]
Subject: Time modification flaw in BSD securelevels on NetBSD and Linux
Message-ID: <20060109122838.GD28428@rwth-aachen.de.>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="bjuZg6miEcdLYP6q"
Content-Disposition: inline
User-Agent: Mutt/1.5.9i
X-Virus-Scanned: antivirus-gw at tyumen.ru


--bjuZg6miEcdLYP6q
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Advisory: Time modification flaw in BSD securelevels on NetBSD and Linux=20

The implementations of securelevels on NetBSD and Linux contain an=20
integer overflow, allowing the protection of system time to be
completely
circumvented.


Details
=3D=3D=3D=3D=3D=3D=3D

Product: NetBSD
         Linux
Affected Versions: NetBSD-current: source prior to December 5, 2005
                   NetBSD 2.1
                   NetBSD 2.0.3
                   NetBSD 1.6.2
                   Linux vanilla kernel 2.6.15 and below
Fixed Versions: NetBSD-current:         December 5, 2005
                NetBSD-3   branch:      December 6, 2005
                NetBSD-2.1 branch:      December 6, 2005
                NetBSD-2.0 branch:      December 6, 2005
                NetBSD-2   branch:      December 6, 2005
                NetBSD-1.6 branch:      December 6, 2005
Vulnerability Type: System time modification
Security-Risk: Medium
Advisory-URL:
http://www.redteam-pentesting.de/advisories/rt-sa-2005-16.txt
Advisory-Status: public
CVE: CVE-2005-4352
CVE-URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-4352


Introduction
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

BSD-Securelevels try to harden the system by restricting certain
functions. The manpage[1] states: "The kernel runs with five different
levels of security. Any super-user process can raise the security level,
but no process can lower it."

When running a securelevel equal or higher than two kernel time changes
are restricted. While it is possible to set the clock forward, it is
not possible to turn it backwards. By setting the clock forward to the
end of unixtime an integer overflow will be triggered and the clock will
be reset.


More Details
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

By setting the system time to the end of unixtime, it is possible to
reset the system time to the lowest possible integer of unixtime. When
the systemclock reaches "Tue Jan 19 03:14:08 UTC 2038", the 32-bit
signed integer containing the time will overflow and the system time
will be reset to "Fri Dec 13 20:45:52 UTC 1901". This is known as the
Year 2038 Problem.
The flaw is also present when running a securelevel of two or greater,
allowing the restrictions on kernel time changes to be circumvented.


Proof of Concept
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

# date 203801190414.07
Di 19 Jan 2038 04:14:07 CET
# date
Fr 13 Dez 1901 21:45:53 CET


Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

No workaround is available.


Fix
=3D=3D=3D

The problem has been fixed in all affected versions of NetBSD.
No fix is available for the Linux implementation of securelevels.


Security Risk
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

The security risk is to be considered medium. System time is
crucial for the reliability and stability of a system. Time
modification can cause denial of service and other major problems.
For instance expired certificates can still be used.


History
=3D=3D=3D=3D=3D=3D=3D

2005-11-05 Problem discovered while testing a product of iPisec Ltd.
2005-11-29 Discussed the issue with iPisec management and technicians
2005-12-02 Contacted the maintainer of BSD-Securelevels on Linux
2005-12-02 Response from the maintainer of BSD-Securelevels on Linux he
           wants to do what *BSD will be doing
2005-12-04 Contacted NetBSD security
2005-12-05 Response from NetBSD security - problem has been fixed
2005-12-15 Forwarded the *BSD responses to the Linux maintainer
2006-01-05 No further response from the Linux maintainer
2006-01-09 Coordinated public release


Reference
=3D=3D=3D=3D=3D=3D=3D=3D=3D
[1] http://www.freebsd.org/cgi/man.cgi?query=3Dsecurelevel


RedTeam
=3D=3D=3D=3D=3D=3D=3D

RedTeam offers interested business parties penetration tests to validate
their security. Doing security research RedTeam likes to enhance the
common knowledgebase in security related areas. More information about
RedTeam can be found at http://www.redteam-pentesting.de.

--=20
RedTeam Pentesting            Tel.: +49-(0)241-963 1300
Dennewartstr. 25-27           Fax : +49-(0)241-963 1304
52068 Aachen           http://www.redteam-pentesting.de

--bjuZg6miEcdLYP6q
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iQEVAwUBQ8JW9tG/HXWsgFSuAQIwbAf/eTPZZcYMw0lI6KryfrVJzOtLU5BAKJBC
s42no+ZdYo9lSFjfzePEJVy1YUSSAXsJEs1SOPV8NNbfmEeQUnBm0/jqo0id3GEd
F6x5yW9i2U1Hs1OCQYxZq5tQhKwc/RjH9KhTsxhxSUJYPO5GyO2uiRUkzw2mBzOB
CnV8nJpXLXOgaYb704y00J5geJfqsyx2sQGLIndpc7YOtCuwckQRmDnY7NgC0FSa
G2CS+LVR5XJAomX8s141Sx6qmZHCHX9T9pMZ4wezVegOpFuPbZuYkLkHInf0eyEG
0iFeVCIkhjF80nVZpFojFneqWxY4Tt1AzSBnov6FsEl9l8EFakqB0g==
=v785
-----END PGP SIGNATURE-----

--bjuZg6miEcdLYP6q--


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру