lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200803301243.m2UChkHY015536@post.webmailer.de>
Date: Sun, 30 Mar 2008 14:43:46 +0200 (MEST)
From: "Tobias Klein" <tk@...pkit.de>
To: bugtraq@...urityfocus.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: [TKADV2008-002] avast! 4.7 aavmker4.sys Kernel
	Memory Corruption

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Advisory:               avast! 4.7 aavmker4.sys Kernel Memory Corruption 
Advisory ID:            TKADV2008-002
Revision:               1.0
Release Date:           2008/03/30
Last Modified:          2008/03/30
Date Reported:          2008/03/16
Author:                 Tobias Klein (tk at trapkit.de)
Affected Software:      avast! 4.7 Professional Edition
                        avast! 4.7 Home Edition
Remotely Exploitable:   No
Locally Exploitable:    Yes
Vendor URL:             http://www.avast.com
Vendor Status:          Vendor has released a fixed version
Patch development time: 13 days


======================
Vulnerability details:
======================

The kernel driver aavmker4.sys shipped with avast! 4.7 contains a vulnerability in 
the code that handles IOCTL requests. Exploitation of this vulnerability can result 
in:

1) local denial of service attacks (system crash due to a kernel panic), or

2) local execution of arbitrary code at the kernel level (complete system compromise)

The issue can be triggered by sending a specially crafted IOCTL request.

No special user rights are necessary to exploit the vulnerability.


======================
Technical description:
======================

The IOCTL call 0xb2d60030 of the aavmker4.sys kernel driver shipped with avast! 
4.7 accepts user supplied input that doesn't get validated enough. In consequence 
it is possible to overwrite arbitrary memory addresses with arbitrary values.

Disassembly of aavmker4.sys (version 4.7.1098.0):

[...]
.text:00010D28                 cmp     eax, 0B2D60030h  <-- (1)
.text:00010D2D                 jz      short loc_10DAB
[...]
.text:00010DAB loc_10DAB:                             
.text:00010DAB                 xor     edi, edi
.text:00010DAD                 cmp     byte_1240C, 0
.text:00010DB4                 jz      short loc_10DC9
[...]
.text:00010DC9 loc_10DC9:                         
.text:00010DC9                 mov     esi, [ebx+0Ch]  <-- (2)
.text:00010DCC                 cmp     [ebp+InputBufferLength], 878h  <-- (3)
.text:00010DD3                 jz      short loc_10DDF
[...]
.text:00010DDF
.text:00010DDF loc_10DDF:                            
.text:00010DDF                 mov     [ebp+var_4], edi
.text:00010DE2                 cmp     [esi], edi  <-- (4)
.text:00010DE4                 jz      short loc_10E34
.text:00010DE6                 mov     eax, [esi+870h]  <-- (5)
.text:00010DEC                 mov     [ebp+v38_uc], eax
.text:00010DEF                 cmp     dword ptr [eax], 0D0DEAD07h  <-- (6)
.text:00010DF5                 jnz     short loc_10E00
.text:00010DF7                 cmp     dword ptr [eax+4], 10BAD0BAh  <-- (7)
.text:00010DFE                 jz      short loc_10E06
[...]
.text:00010E06 loc_10E06: 
.text:00010E06                 xor     edx, edx
.text:00010E08                 mov     eax, [ebp+v38_uc]
.text:00010E0B                 mov     [eax], edx
.text:00010E0D                 mov     [eax+4], edx
.text:00010E10                 add     esi, 4  <-- (8)
.text:00010E13                 mov     ecx, 21Ah  <-- (9)
.text:00010E18                 mov     edi, [eax+18h]  <-- (10)
.text:00010E1B                 rep movsd  <-- (11)
[...]

 (1) Vulnerable IOCTL control code  
 (2) ESI now points to user controlled IOCTL input data
 (3) The size of the IOCTL input data must be 0x878
 (4) Minor check of the user supplied data
 (5) EAX now also points to the user controlled IOCTL input data
 (6) + (7) Minor checks of the user supplied data
 (8) The user supplied data (ESI) is used as source data for the following memcpy 
     function
 (9) The number of bytes that get copied by the following memcpy function (ECX)
(10) A user controlled memory address (EDI) is used as a destination for the 
     following memcpy function
(11) The memcpy function copies 0x21a bytes of user controlled data to a user 
     controlled memory address 

This can be exploited to control the kernel execution flow and to execute arbitrary 
code at the kernel level.


=========
Solution:
=========

Update to avast! 4.8 Professional Edition or avast! 4.8 Home Edition.

  - http://www.avast.com/eng/download-avast-professional.html
  - http://www.avast.com/eng/download-avast-home.html


========
History:
========

  2008/03/16 - Vendor notified using info@...st.com
  2008/03/17 - Vendor response with PGP key
  2008/03/18 - Detailed vulnerability information sent to the vendor 
  2008/03/19 - Vendor confirms the vulnerability
  2008/03/29 - Vendor releases updated version
  2008/03/30 - Full technical details released to general public


========
Credits:
========

  Vulnerability found and advisory written by Tobias Klein.


===========
References:
===========

  [1] http://www.avast.com/eng/avast-4-home_pro-revision-history.html

  [2] http://www.trapkit.de/advisories/TKADV2008-002.txt


========
Changes:
========

  Revision 0.1 - Initial draft release to the vendor
  Revision 1.0 - Public release


===========
Disclaimer:
===========

The information within this advisory may change without notice. Use 
of this information constitutes acceptance for use in an AS IS 
condition. There are no warranties, implied or express, with regard 
to this information. In no event shall the author be liable for any 
direct or indirect damages whatsoever arising out of or in connection 
with the use or spread of this information. Any use of this 
information is at the user's own risk. 


==================
PGP Signature Key:
==================

  http://www.trapkit.de/advisories/tk-advisories-signature-key.asc


Copyright 2008 Tobias Klein. All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBR++EWpF8YHACG4RBEQKQ+ACgknAvgNWbSozd2x6nl+OCm2Xow0UAoL0N
Q2Nlb3TYjsNpgFAL/BF3ODUf
=7nKB
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ