Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 6 Jan 2003 12:00:55 -0800 (PST)
From:      twig les <twigles@yahoo.com>
To:        Mike Tancsa <mike@sentex.net>, freebsd-security@freebsd.org
Subject:   Re: Fwd: OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS
Message-ID:  <20030106200055.85752.qmail@web10108.mail.yahoo.com>
In-Reply-To: <5.2.0.9.0.20030106130825.04a3e0f8@marble.sentex.ca>

next in thread | previous in thread | raw e-mail | index | archive | help

I didn't see anything about a patch on the openssh.org
site but I may have missed it, any word?  Was the team
even notified before the posting (posting has a
gleeful tone about it).


--- Mike Tancsa <mike@sentex.net> wrote:
> 
> FYI, for those not on bugtraq.
> 
>          ---Mike
> 
> >Mailing-List: contact
> bugtraq-help@securityfocus.com; run by ezmlm
> >List-Id: <bugtraq.list-id.securityfocus.com>
> >List-Post: <mailto:bugtraq@securityfocus.com>
> >List-Help: <mailto:bugtraq-help@securityfocus.com>
> >List-Unsubscribe:
> <mailto:bugtraq-unsubscribe@securityfocus.com>
> >List-Subscribe:
> <mailto:bugtraq-subscribe@securityfocus.com>
> >Delivered-To: mailing list
> bugtraq@securityfocus.com
> >Delivered-To: moderator for
> bugtraq@securityfocus.com
> >Date: Sat,  4 Jan 2003 19:37:03 -0800
> >To: bugtraq@securityfocus.com
> >Subject: OPENSSH REMOTE ROOT COMPROMISE ALL
> VERSIONS
> >From: mmhs@hushmail.com
> >X-Spam-Status: No, hits=4.7 required=7.0
> >        
> tests=CASHCASHCASH,DISCLAIMER,KNOWN_MAILING_LIST,
> >              
>
LINES_OF_YELLING,LINES_OF_YELLING_2,LINES_OF_YELLING_3,
> >              
>
NO_REAL_NAME,PGP_SIGNATURE,SPAM_PHRASE_01_02,SUBJ_ALL_CAPS
> >         version=2.43
> >X-Spam-Level: ****
> >X-Virus-Scanned: By Sentex Communications
> (avscan1/20020517)
> >
> >
> >-----BEGIN PGP SIGNED MESSAGE-----
> >
> >*********** OPENSSH REMOTE ROOT COMPROMISE ALL
> VERSIONS ***********
> >
> >MICKEY MOUSE HACKING SQUADRON ADVISORY #2
> >
> >DISCLAIMER
> >- ----------
> >
> >The nation's zeroth private security intelligence
> firm, Mickey Mouse
> >Hacking Squadron uniquely addresses the challenges
> faced by both public-
> >and private-sector organizations in protecting
> critical information
> >assets.
> >
> >Our intelligence is timely, delivered 24 x 7, 365
> (*) days per year;
> >relevant, fully customizable, and actionable
> intelligence is only
> >valuable if it makes a difference.
> >
> >(*) in the case of a leap year, we of course
> provide a 24 x 7, 366 days
> >premier service.
> >
> >TECHNICAL BACKGROUND
> >- --------------------
> >
> >The following advisory is based on the excellent
> advisory published by
> >Global InterSec LLC *six months ago*:
> >
>
>http://www.globalintersec.com/adv/openssh-2002062801.txt
> >
> >After more than six months of intensive underground
> research, our ISO
> >31337 certified security department evidenced that
> the bug (an integer
> >overflow, resulting in a heap overflow) described
> in the aforementioned
> >advisory still exists in OpenSSH 3.5p1 and 3.4p1,
> and remains trivially
> >exploitable. All existing PAM enabled versions of
> OpenSSH (3.5p1, 3.4p1
> >and below) are therefore affected.
> >
> >Due to various advisories posted to various fora by
> unnamed security
> >companies, this bug was supposed to be nonexistent
> or nonexploitable.
> >Fortunately, Global InterSec LLC shed some light on
> the whole affair and
> >revealed the malignant nature of the oversight to
> the world.
> >
> >Their results were applied to the latest OpenSSH
> versions by privately
> >trained Mickey Mouse Hacking Squadron security
> specialists and revealed
> >that the exploitation techniques developed by
> Global InterSec LLC are
> >still applicable to the newest OpenSSH.
> >
> >PROOF OF CONCEPT
> >- ----------------
> >
> >The following proof of concept is reproducing
> Global InterSec LLC
> >findings, enhanced with the patented research
> performed by Mickey Mouse
> >Hacking Squadron against OpenSSH 3.5p1.
> >
> >First of all, the OpenSSH 3.5p1 server has to be
> built (with PAM support
> >enabled):
> >
> >$ tar xzf openssh-3.5p1.tar.gz
> >$ cd openssh-3.5p1
> >$ configure --with-pam
> >[...]
> >$ make sshd
> >[...]
> >
> >Before the SSH server is actually executed, the
> sshd_config file should
> >be modified in order to enable PAM
> ("PAMAuthenticationViaKbdInt yes").
> >
> ># sshd
> >
> >In order to reveal the nature of the OpenSSH
> vulnerability, the next
> >step is to connect to the SSH server:
> >
> >$ ssh werewolf.research.mmhs.com
> >Password:
> >
> >Thanks to the "Password:" prompt, it is clear that
> PAM is actually
> >enabled (otherwise, the prompt would have been
> "user@host's password:").
> >This unique fingerprinting technique was
> investigated by Mickey Mouse
> >Hacking Squadron, and is already present in the
> latest version of the
> >Mickey Mouse Hacking Squadron award winning network
> vulnerability
> >assessment tool.
> >
> >After the previous command was executed, the
> freshly spawned sshd
> >process has to be examined with a debugger, in
> order to set the correct
> >breakpoints within the
> input_userauth_info_response_pam() function of
> >OpenSSH, as demonstrated in the Global InterSec LLC
> advisory:
> >
> ># gdb sshd 6552
> >(gdb) disassemble input_userauth_info_response_pam
> >[...]
> >0x80531bc <input_userauth_info_response_pam+192>:  
>     push   %esi
> >0x80531bd <input_userauth_info_response_pam+193>:
> >     call   0x807306c <xfree>
> >[...]
> >(gdb) break *0x80531bd
> >Breakpoint 1 at 0x80531bd: file auth2-pam.c, line
> 158.
> >(gdb) continue
> >Continuing.
> >
> >Now that the buggy call to xfree() can be
> intercepted, the SSH client
> >should trigger the integer overlow and the
> resulting heap overflow:
> >
> >$ ssh werewolf.research.mmhs.com
> >Password: <type a thousand 'A' characters here and
> hit enter>
> >
> >After that, the xfree() breakpoint is reached, and
> the next call to
> >free() should therefore be intercepted in order to
> comply with the
> >technique developed by Global InterSec LLC:
> >
> >Breakpoint 1, 0x080531bd in
> input_userauth_info_response_pam (type=61,
> >     seqnr=7, ctxt=0x809c050) at auth2-pam.c:158
> >158                     xfree(resp);
> >(gdb) disassemble xfree
> >[...]
> >0x807308e <xfree+34>:   call   0x804ba14 <free>
> >[...]
> >(gdb) break *0x807308e
> >Breakpoint 2 at 0x807308e: file xmalloc.c, line 55.
> >(gdb) continue
> >Continuing.
> >
> >Breakpoint 2, 0x0807308e in xfree (ptr=0x809dfb8)
> at xmalloc.c:55
> 
=== message truncated ===


=====
-----------------------------------------------------------
If you give a man a fish, he can eat for a day
If you bludgeon him to death, you can eat the fish yourself                       
-----------------------------------------------------------

__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030106200055.85752.qmail>