[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030427013743.8E8A53810F@mail.secnap.net>
From: scheidell at secnap.net (Michael Scheidell)
Subject: 3com NBX IP Phone Call manager Denial of Service - Update
Revision Date: April 25, 2003
Reason for Revision: 3com updated nbx firmware to 4_1_21, Add bugtraq-id
Systems: 3com NBX IP Phone Call manager, FW Versions through 4_1_21
Severity: Critical
Category: Denial of Service
Classification: Boundary Condition Error
BugTraq-ID: 6297
CERT VU#:[VU#317417]
Vendor URL: www.3com.com, www.windriver.com
Author: Michael S. Scheidell, SECNAP Network Security
Original Release date: December 2nd, 2002
Notifications: (3com, WindRiver and CERT) Notified October 31st, 2002
Last contact with 3com: November 22nd, 2002
Attempted contact with 3com: April 15th, 2003
Last contact with WindRiver: December 6rd, 2002
Discussion: (From 3com's and WindRiver's web site)
3Com® SuperStack® 3 NBX® and 3Com NBX 100 networked telephony solutions
offer wide-ranging price/performance alternatives to fit your business
needs today and tomorrow. 3Com® SuperStack® 3 NBX® Networked Telephony
Solution Delivers robust, full-featured business communications for up to
1500 devices (lines/stations) Ensures high system availability with the
Wind River VxWorks real-time operating system (also used in pacemakers and
artificial hearts), so server and PC downtime does not impact your
telephone service.
VxWorks and pSOSystem are the most widely adopted real-time operating
systems (RTOSs) in the embedded industry -- for good reason. They are
flexible, scalable, reliable, and available on all popular CPU platforms.
They are also, by most measures, the fastest RTOSs available today.
Exploit: It was possible to make the remote FTP server crash by issuing
this command :
CEL aaaa[...]aaaa where string is 2048 bytes long. This can be done with
netcat, a windows client by telnetting to the nbx server on port 21 or by
running the vxworks_ftpd.nasl test in nessus (www.nessus.org)
The 3com NBX uses VXWORKS Embedded Real time Operating system and what
appears to be their own internal ftp server. This buffer overflow problem
seems to be one similar to the AIX ftpd reported in CVE 1999-0789 and has
been assigned bugtraq id 6297
By sending a specific string of data to the ftp server, an attacker can
not only disable the ftp server, but the integrated web based
administrative console and the call manager preventing diagnostics,
control and all incoming, outgoing or internal calls. Any calls in
progress cannot be disconnected, and in the case of long distance calls,
could result in excessive long distance bills and extended loss of use of
the phone system.
This condition is not recovered without a Hard reboot (power off/on).
Since the 3com nbx is based on an embedded Unix operating system
(vxworks), an abrupt power off could cause loss of data, including
corruption of voice mails in progress or logs.
A company who uses the VoIP features for remote locations, and who has the
call manager located on the outside of their firewall, or has no firewall
can have their voice communications disrupted easily. Even if the company
has call manager located on internal network, people with internal network
access can also disrupt communications. We have tested 3com nbx firmware
version 4_0_17 (with ftpd version 5.4) and nbx firmware version 4_1_4 and
4_1_21 (ftpd version 5.4.2) and this bug seems to be present in all three
systems.
3com Response:
3com confirmed problem and received a field patch, TSR(296292) from
WindRiver to address the problem. Neither WindRiver nor 3com has provided
a test bed or access to a fixed system for us verify fix. 3com will be
working to integrate this TSR into a future release of the nbx build but
has no date yet for release. Also, since ftpd is only used for debugging
and diagnostics, a future firmware will allow the administrator the
ability to turn off ftpd if not used.
We contacted 3com on Febuary 28th and March 14th to obtain above firmware
and then again on April 15th to report that Firmware 4_1_21 did not yet
fix the problem.
No response from 3com yet.
VxWorks Response:
The defect has been corrected. A solution has been provided to and is
being used by 3COM. We will be providing an update to CERT. We also plan
to issue patches to our population of customers for Tornado 2.0.2 /
VxWorks 5.4 and Tornado 2.2 / VxWorks 5.5. Testing on all CPU architecture
platforms for T2.0.2 and T2.2 is started now and we anticipate the patch
for T2.0.2 to be completed before Christmas and T2.2 by mid-Jan, 2003
CERT Response:
Cert has assigned VU #317417 and stated that as soon as they get vendor
confirmation they will publish report.
Solution:
Please contact vendor once new software is released
Workaround:
There appears to be on way to turn off the built in ftp server in this
version of the software, nor anyway to do ip address limits via tcp
wrapper or acls. The only way we know of to prevent a denial of service
attack on the 3com nbx is to place it behind its own firewall. If call
manager is placed on the Internet side of the firewall or in the DMZ, care
should be taken to prohibit any access to ftp port (tcp port 21) This may
be impossible on an internal network unless 3com nbx is itself placed
behind a firewall, or on a separate VLAN or network segment. Care should
be taken in this approach, since some firewalls may interfere with the
VoIP operations.
see "Firewall limits vex VoIP users" at Nwfusion
http://www.nwfusion.com/news/2002/0625bleeding.html
Credit:
This problem was originally found during a routine security audit by
Michael Scheidell, SECNAP Network Security, www.secnap.net using the
Nessus vulnerabilities scanner, www.nessus.org.,
Additional assistance by Leonid Rosenboim [lr24@...com.co.il] in verifying
that this may be an old bug, already fixed in current vxworks sources but
might not have been tested by 3com yet.
Additional Information:
A tcpdump/pcap packet of the exploit and ftpd/nbx response can be found at
http://www.secnap.net/private/nbx.pcap
If you have snort or ISS's trons IDS, a signature to detect this attack
can be found at on www.snort.org
To test your systems for this vulnerability, you can use Nessus at
www.nessus.org. Either update your signatures, or download this nessus
signature: vxworks_ftpd.nasl at
http://cgi.nessus.org/plugins/dump.php?id=11185
For a report on Security Risk Factors with IP Telephony based Networks
see:
Security_Risk_Factors_with_IP_Telephony_based_Networks
Also reference article "is VoIP vulnerable ?"on NWfusion.com
http://www.nwfusion.com/news/2002/0624voip.html
Original copy of this report can be found here
<http://www.secnap.net/security/nbx001.html>
Copyright:
Above Copyright(c) 2002, 2003, SECNAP Network Security, LLC. World rights
reserved.
This security report can be copied and redistributed electronically
provided it is not edited and is quoted in its entirety without written
consent of SECNAP Network Security, LLC. Additional information or
permission may be obtained by contacting SECNAP Network Security at
561-368-9561
Powered by blists - more mailing lists