lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201510010856.t918u6cu021841@sf01web2.securityfocus.com>
Date: Thu, 1 Oct 2015 08:56:06 GMT
From: matthias.deeg@...s.de
To: bugtraq@...urityfocus.com
Subject: [SYSS-2015-006] Kaspersky Total Security - Use of One-Way Hash
 withouth a Salt

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-006
Product: Kaspersky Total Security (KTS)
Vendor: Kaspersky Lab ZAO
Affected Version(s): 15.0.1.415
Tested Version(s): 15.0.1.415
Vulnerability Type: Use of a One-Way Hash without a Salt (CWE-759)
Risk Level: Low
Solution Status: Fixed
Vendor Notification: 2015-02-19
Solution Date: 2015-10-01
Public Disclosure: 2015-10-01
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg and Sven Freund (SySS GmbH)

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Overview:

Kaspersky Total Security is an endpoint protection software with many
features defending users against different threats.

The vendor Kaspersky describes the product as follows (see [1]):

"Kaspersky Total Security - Multi-Device is our ultimate security
solution protecting your privacy, money, identity, photos, files & 
family against Internet threats, cybercrime and malware. That's why we
call it total security."

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Vulnerability Details:

The SySS GmbH found out that the administrator password for protecting
different functions of the Kaspersky Total Security software, like
managing backups or stopping protection services, is stored as raw,
unsalted MD5 hash value in the Windows registry.

The used registry value

"HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\KasperskyLab\AVP15.0.1\settings\OPEP"

is by default readable by every user.

The use of the cryptographic one-way hash function MD5 without using a 
salt for storing sensitive data like admin passwords allows an attacker
with access to this data to perform efficient password guessing attacks
using pre-computed dictionaries, for instance rainbow tables.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Proof of Concept (PoC):

The configured admin password is stored as raw, unsalted MD5 hash value
of the UTF-16 (wide char) string representation of the set password.

For instance, it can be read using the following command:

C:\Users\SySS>reg query HKLM\SOFTWARE\Wow6432Node\KasperskyLab\AVP15.0.1\settings /v OPEP

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\KasperskyLab\AVP15.0.1\settings
    OPEP    REG_SZ    CFB37E7C04BEA837D23005199B1CD62B


The read string in this example is a raw, unsalted MD5 hash value of the
UTF-16 string "syss", as the following output illustrates:

$ echo -en "s\x00y\x00s\x00s\x00" | md5sum
cfb37e7c04bea837d23005199b1cd62b  -

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Solution:

According to information by Kaspersky, the described security issue has
been fixed in newer software releases.

Please contact the manufacturer for further information or support.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Disclosure Timeline:

2015-02-19: Vulnerability reported to manufacturer
2015-02-19: Manufacturer acknowledges e-mail with SySS security advisory          
2015-03-17: Rescheduling of the publication date in agreement with the
            manufacturer
2015-04-14: Rescheduling of the publication date in agreement with the
            manufacturer
2015-09-28: SySS asks for further information about software fix
2015-10-01: Public release of security advisory on agreed publication
            date

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

References:

[1] Product Web site for Kaspersky Total Security
    http://www.kaspersky.com/total-security-multi-device
[2] SySS Security Advisory SYSS-2015-006
    https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-006.txt
[3] SySS Responsible Disclosure Policy
    https://www.syss.de/en/news/responsible-disclosure-policy/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Credits:

This security vulnerability was found by Matthias Deeg and Sven Freund
of the SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB

E-Mail: sven.freund (at) syss.de
Public Key: https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Sven_Freund.asc
Key fingerprint = DCDB 7627 C1E3 9CE8 62DF 2666 8A5F A853 415D 46DC

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Disclaimer:

The information provided in this security advisory is provided "as is" 
and without warranty of any kind. Details of this security advisory may 
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web 
site.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=A8jl
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ