lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <00c901c2b922$a1aa89d0$c500a8c0@bbcsw2kpro>
From: smenard at nbnet.nb.ca (Stephen Menard)
Subject: leaky ethernet routers

> 
> 
> We urge people to read the paper before they cry wolf...
> 
> 
The world is falling in.....nifty-neato 
READ the PDF ping your test net...do some net traffic,,... ping again
yep simple, but timming is important to see the traffic you want

why does my.... [nasty hole nasty hole]
<fill in the blank>  database fill field ERROR

... D-Link 604 DSL router...
tell me stuff in padding? Orif explains ALL too well

Is that why i see  --^-^--  ICMP pings  ;-) on the wire; 
or are them early DARPA network guys -brighter- than we thought?

no exploit needed  :-)    Thanks BUGTRAQ ... for removing them

ping -s 1 vic.t.im.ip    #is too simple why does it work
:-{p

----- Original Message ----- 

From: "Ofir Arkin" <ofir@...-security.com>
To: <bugtraq@...urityfocus.com>
Sent: Friday, January 10, 2003 1:02 PM
Subject: More information regarding Etherleak


> 
> This e-mail's purpose is to clear several issues surrounding the
> Etherleak paper:
> 
> - Who is Vulnerable?
> - Why this vulnerability is so wide spread?
> - Why the examples are only with Linux device drivers?
> - Why we have contacted CERT?
> - Are Device Drivers under Microsoft-based OSs are vulnerable?
> - How can you test your network card and device driver?
> - Why is this better then a sniffer?
> - Why the vulnerability is important?
> 
> 
> Who is vulnerable?
> ------------------
> Josh Anderson and I tested several Ethernet cards and device drivers.
> 
> We have found several device drivers which are vulnerable but we never
> attempted to find them all. It is simply because there are too many.
> Therefore we have contacted CERT more than 6 months ago and sent them
> the Etherleak paper and asked them to contact OS manufactures, Network
> device manufactures, Chipset manufactures, motherboard manufactures and
> other manufactures and vendors who might need to check their device
> driver's implementations.
> 
> In our tests we have experienced this bug under 4 different operating
> systems:
> 
> - Linux
> - NetBSD
> - FreeBSD
> - Microsoft Windows
> 
> 
> One of the Ethernet cards and device drivers we have tested was a Compaq
> PCMCIA Ethernet card under Windows 2000 (with the latest SP at the time)
> which demonstrated the vulnerability (among other Ethernet cards which
> have demonstrated the vulnerability under Microsoft Windows 2000).
> 
> It is clear to us that device drivers under the various Microsoft
> operating systems are vulnerable.
> 
> Microsoft's statement to CERT:
> "Microsoft does not ship any drivers that contain the vulnerability.
> However, we have found samples in our documentation that, when compiled
> without alteration, could yield a driver that could contain this issue.
> We have made corrections to the samples in our documentation, and will
> include tests for this issue in our certification process."
> 
> If you read the statement carefully you can understand that there are
> OTHER manufactures which have built device drivers for their networking
> equipment that are based on Microsoft's documentation and therefore
> MIGHT BE VULNERABLE.
> 
> Microsoft does not make vulnerable device drivers BUT Microsoft's sample
> code was vulnerable and therefore Microsoft has added a test to the
> device driver's certification test which will test for the bug. The
> situation is that CURRENT Microsoft certified device drivers MIGHT BE
> VULNERABLE.
> 
> 
> Different vendors were contacted by CERT more than 6 months ago and had
> an enormous amount of time to fix this issue before it went public. The
> authors did not receive a list of vendors who were notified by CERT. The
> authors were aware that Microsoft was one of the vendors who were
> contacted and notified regarding this vulnerability.
> 
> The examples in the paper are given from the Linux operating system
> because it helps to illustrate the problem.
> 
> 
> Why this vulnerability is so wide spread?
> -----------------------------------------
> Some networking gear manufactures choose to purchase (in some cases)
> chipsets from a chipset manufacture rather then developing their own (or
> using their own). Therefore you might find networking cards from one
> vendor with chipsets of another chipset manufacture (for example some
> low-end SMC cards are using RealTek chipsets). Some other manufactures
> are embedding networking cards with their products (such as motherboards
> with LAN). To minimize the cost, sometimes, low-end chipsets, which many
> of whom have vulnerable device drivers on different operating system,
> are used (some vulnerable device drivers are even shipped with some
> cards...).
> 
> 
> How can you test your network card and device driver?
> -----------------------------------------------------
> You need to send packets which are less than 46 data bytes long (the
> minimum packet size) to examine if you experience this vulnerability
> with your Ethernet card and device driver. Any packet less than 46 data
> bytes long would do the trick but we have found the following examples
> helpful:
> 
> - An ICMP Echo request packet with 1 data byte in its payload (total of
> 29 
>   bytes). The rest - 17 data bytes will be filled with information (you
> can  
>   see for yourself in the paper we have written what kind of information
> it 
>   will be) if your Ethernet card's device driver is vulnerable.
> 
> - You can also use Raw Packets and then have 28 data bytes as room for 
>   padded data.
> 
> 
> Why is this better then a sniffer? or Why is this bug important?
> ----------------------------------------------------------------
> First Example: 
> You can extract information that you will never be able to see on a
> switched environment. 
> 
> A Second Exmaple:
> In some cases you will be able to extract information directly from a
> Router on your LAN (try this with a Linux or a NetBSD machine acting as
> a router with vulnerable Ethernet cards (and their device drivers) and
> see for yourself how easily information is being gleaned) or from
> another networking equipment on your LAN.
> 
> A Third Example:
> Another example might be a corporate network (just think about the
> scenario of a nice flat switched network).
> 
> 
> There are special instances were the padded information might cross
> layer 2 boundaries, but they are very unique in nature and depend on
> many factors.
> 
> Combining the information is not a trivial task for script kiddies. If
> you are experienced with networking and seen and analyzed network
> traffic in the past you will be able to understand what are the portions
> of information you are absorbing (see the examples in the paper).
> 
> In our tests we were able to extract pop3 passwords, other clear text
> passwords, cookies, and other interesting pieces of information.
> 
> 
> We hope this email will help the community and more people to understand
> why this bug class is important and problematic.
> 
> 
> We urge people to read the paper before they cry wolf...
> 
> 
> Yours,
> Ofir Arkin [ofir@...-security.com]
> Founder
> The Sys-Security Group
> http://www.sys-security.com
> PGP CC2C BE53 12C6 C9F2 87B1 B8C6 0DFA CF2D D360 43FA
> 
> 
> 
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ