[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200405130700.i4D70a611135@singularity.tronunltd.com>
From: Ian.Latter at mq.edu.au (Ian Latter)
Subject: (AUSCERT AA-2004.02) AUSCERT Advisory - Denial of Service Vulnerability in IEEE 802.11 Wireless Devices (fwd)
Interesting isn't it .. since it came up I've been wondering how
hard it would be for one of these; http://www.wifiseeker.com/
.. to be "upgraded" to work as a sort of wireless flash-bang (for
the life of the battery) .. throw it in a garden and walk off ...
.. give our grounds keepers IT Security shirts and badges ;-)
----- Original Message -----
>From: "Sean Batt" <sean@...mbs.anu.edu.au>
>To: <full-disclosure@...ts.netsys.com>
>Subject: [Full-Disclosure] (AUSCERT AA-2004.02) AUSCERT Advisory - Denial of Service
Vulnerability in IEEE 802.11 Wireless Devices (fwd)
>Date: Thu, 13 May 2004 15:22:19 +1000
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>
==========================================================================
=
> AA-2004.02 AUSCERT Advisory
>
> Denial of Service Vulnerability in IEEE 802.11 Wireless Devices
> 13 May 2004
> Last Revised: --
>
> - ---------------------------------------------------------------------------
>
>
> 1. Description
>
> A vulnerability exists in hardware implementations of the IEEE
> 802.11 wireless protocol[1] that allows for a trivial but effective
> attack against the availability of wireless local area network
> (WLAN) devices.
>
> An attacker using a low-powered, portable device such as an
> electronic PDA and a commonly available wireless networking card
> may cause significant disruption to all WLAN traffic within range,
> in a manner that makes identification and localisation of the
> attacker difficult.
>
> The vulnerability is related to the medium access control (MAC)
> function of the IEEE 802.11 protocol. WLAN devices perform Carrier
> Sense Multiple Access with Collision Avoidance (CSMA/CA), which
> minimises the likelihood of two devices transmitting
> simultaneously. Fundamental to the functioning of CSMA/CA is the
> Clear Channel Assessment (CCA) procedure, used in all
> standards-compliant hardware and performed by a Direct Sequence
> Spread Spectrum (DSSS) physical (PHY) layer.
>
> An attack against this vulnerability exploits the CCA function at
> the physical layer and causes all WLAN nodes within range, both
> clients and access points (AP), to defer transmission of data for
> the duration of the attack. When under attack, the device behaves
> as if the channel is always busy, preventing the transmission of
> any data over the wireless network.
>
> Previously, attacks against the availability of IEEE 802.11
> networks have required specialised hardware and relied on the
> ability to saturate the wireless frequency with high-power
> radiation, an avenue not open to discreet attack. This
> vulnerability makes a successful, low cost attack against a
> wireless network feasible for a semi-skilled attacker.
>
> Although the use of WLAN technology in the areas of critical
> infrastructure and systems is still relatively nascent, uptake of
> wireless applications is demonstrating exponential growth. The
> potential impact of any effective attack, therefore, can only
> increase over time.
>
> 2. Platform
>
> Wireless hardware devices that implement IEEE 802.11 using a DSSS
> physical layer. Includes IEEE 802.11, 802.11b and low-speed (below
> 20Mbps) 802.11g wireless devices. Excludes IEEE 802.11a and
> high-speed (above 20Mbps) 802.11g wireless devices.
>
> 3. Impact
>
> Devices within range of the attacking device will be affected. If
> an AP is within range, all devices associated with that AP are
> denied service; if an AP is not within range, only those devices
> within range of the attacking device are denied service.
>
> Minimum threat characteristics:
>
> o An attack can be mounted using commodity hardware and
> drivers - no dedicated or high-power wireless hardware is
> required
>
> o An attack consumes limited resources on attacking device,
> so is inexpensive to mount
>
> o Vulnerability will not be mitigated by emerging MAC layer
> security enhancements ie IEEE 802.11 TGi
>
> o Independent vendors have confirmed that there is
> currently no defence against this type of attack for DSSS
> based WLANs
>
> The range of a successful attack can be greatly improved by an
> increase in the transmission power of the attacking device, and
> the use of high-gain antennae.
>
> 3. Workarounds/Mitigation
>
> At this time a comprehensive solution, in the form of software or
> firmware upgrade, is not available for retrofit to existing
> devices. Fundamentally, the issue is inherent in the protocol
> implementation of IEEE 802.11 DSSS.
>
> IEEE 802.11 device transmissions are of low energy and short range,
> so the range of this attack is limited by the signal strength of
> the attacking device, which is typically low. Well shielded WLANs
> such as those for internal infrastructures should be relatively
> immune, however individual devices within range of the attacker
> may still be affected. Public access points will remain
> particularly vulnerable.
>
> The model of a shared communications channel is a fundamental
> factor in the effectiveness of an attack on this vulnerability.
> For this reason, it is likely that devices based on the newer IEEE
> 802.11a standard will not be affected by this attack where the
> physical layer uses Orthogonal Frequency Division Multiplexing
> (OFDM).
>
> It is recognised that the 2.4G Hz band suffers from radio
> interference problems, and it is expected that operators of the
> technology will already have in place measures to shield their
> networks as well as a reduced reliance on this technology for
> critical applications.
>
> The effect of the DoS on WLANs is not persistent - once the jamming
> transmission terminates, network recovery is essentially immediate.
>
> The results of a successful DoS attack will not be directly
> discernable to an attacker, so an attack of this type may be
> generally less attractive to mount.
>
> At this time, AusCERT continues to recommend that the application
> of wireless technology should be precluded from use in safety,
> critical infrastructure and/or other environments where
> availability is a primary requirement. Operators of wireless LANs
> should be aware of the increased potential for undesirable activity
> directed at their networks.
>
> REFERENCES:
>
> [1] IEEE-SA Standards Board, "IEEE Std IEEE 802.11-1999 Information
> Technology - Telecommunications and Information Exchange Between
> Systems-Local and Metropolitan Area Networks - Specific Requirements
> - Part 11: Wireless LAN Medium Access Control (MAC) And Physical Layer
> (PHY) Specifications," IEEE 1999.
> http://standards.ieee.org/getieee802/download/802.11-1999.pdf
>
> - -------------------------------------------------------------------------
> AusCERT would like to thank the Queensland University of Technology (QUT)
> Information Security Research Centre (ISRC) for the information contained
> in this advisory. AusCERT would like to thank all vendors that participated
> in this process and provided recommendations for mitigation and/or
> confirmed details of the vulnerability.
> - -------------------------------------------------------------------------
>
> - ---------------------------------------------------------------------------
>
> AusCERT has made every effort to ensure that the information contained
> in this document is accurate. However, the decision to use the information
> described is the responsibility of each user or organisation. The decision to
> follow or act on information or advice contained in this security bulletin is
> the responsibility of each user or organisation, and should be considered in
> accordance with your organisation's site policies and procedures. AusCERT
> takes no responsibility for consequences which may arise from following or
> acting on information or advice contained in this security bulletin.
>
> If you believe that your computer system has been compromised or attacked in
> any way, we encourage you to let us know by completing the secure National IT
> Incident Reporting Form at:
>
> http://www.auscert.org.au/render.html?it=3192
>
> AusCERT also maintains a World Wide Web service which is found on:
> http://www.auscert.org.au.
>
> Internet Email: auscert@...cert.org.au
> Facsimile: (07) 3365 7031
> Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
> AusCERT personnel answer during Queensland business
> hours which are GMT+10:00 (AEST). On call after hours
> for member emergencies only.
>
> Postal:
> Australian Computer Emergency Response Team
> The University of Queensland
> Brisbane
> Qld 4072
> AUSTRALIA
>
>
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Revision History
>
>
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> -----BEGIN PGP SIGNATURE-----
>
> iQCVAwUBQKLIGSh9+71yA2DNAQIH3gP8CtJ1vKa6zmDxAIUo20JE2CmmCYiWmyQq
> lLomjl0hZLx+TPJPg2O6I9wlBCDy8grv96B8FT3RLDy7nqoT/QQAc02YiR6EnJl4
> Q9inQOgBhd6FUcW984uxl6MyK0K8wWrPg35dg8jW1ZbQBe8tWzABaOTdbqjAQgES
> rg0vm/7RE5g=
> =L8tY
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
--
Ian Latter
Internet and Networking Security Officer
Macquarie University
Powered by blists - more mailing lists