[yocto-security] ConnMan #ConnManDo Vulnerability

Sona Sarmadi sona.sarmadi at enea.com
Mon Aug 21 01:45:04 PDT 2017


Hi Daisuke Noguchi,

Is this issue under embargo? The Mitre's web site says:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12865:

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.


Best regards
//Sona

> -----Original Message-----
> From: "Daisuke Noguchi[NRIセキュア 野口]" [mailto:noguchi at nri-
> secure.co.jp]
> Sent: Monday, August 21, 2017 5:20 AM
> To: yocto-security at yoctoproject.org
> Cc: noguchi at nri-secure.co.jp; nishibata at nri-secure.co.jp; cstd at nri-
> secure.co.jp
> Subject: ConnMan #ConnManDo Vulnerability
> 
> Hello yocto Security Team
> 
> We found the RCE vulnerability in ConnMan.
> Please check the following MD and apply the patch.
> 
> ==============Mark Down======================= # ConnManDo
> 
> # ConnMan
> ConnMan is a network manager developed for operating systems of
> embedded device. It is widely used in IoT devices.
> 
> # Overview
> ConnMan's DNS-proxy feature has a serious vulnerability. This vulnerability
> allows attacker to remote crash or remote code execution. This vulnerability
> has enough reproducibility and it is very likely for attackers to utilize this
> vulnerability for target attacks.
> 
> We discovered this vulnerability and worked closely with Intel PSIRT. And as a
> result of that we are releasing this advisory as a co-ordinated effort and
> named this vulnerability as "ConnManDo".
> 
> # Problem
> We discovered stack overflow vulnerability which cause crash in DNS-proxy
> feature of ConnMan. In some case, this vulnerability cause arbitrary code
> execution as exec user privilege of ConnMan. And we confirmed the
> reproducibility.
> 
> As a prerequisite for this attack, it is necessary to take over the response
> from the DNS server where the victim device communicates directly. This
> means that victim client should not connect with unreliable network (like a
> free access point).
> 
> # Affected version
> ConnMan 1.34 or earlier. The latest ConnMan update includes bug fix.
> 
> # CVE Number and CVSS(v3) Rating
> [CVE-2017-12865](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-
> 2017-12865)
> 8.1 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
> 
> # Impact type
> DoS, RCE
> 
> # Countermeasures
> You can apply software updates from the URLs below.
> 
> https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id
> =5c281d182ecdd0a424b64f7698f32467f8f67b71
> https://git.kernel.org/pub/scm/network/connman/connman.git/
> https://tracker.debian.org/pkg/connman
> 
> # Q&A
> ## Q. How does the vulnerability work?
> A. ConnMan has a DNS-proxy feature that forwards DNS queries from the
> localhost to an external DNS server. There is a vulnerability in handling this
> DNS resonse from an external DNS server.
> 
> There is message compression specification for DNS communication, and it
> has processing to expand compressed messages in the response. Recursively
> expanded messages cause stack overflow.
> 
> ## Q. What are the risks?
> A. Due to the crash of the ConnMan process, there is a possibility that name
> resolution by DNS can't be performed on the device. If there is no setting to
> automatically restart the connmand process, this problem cause disabling
> network access feature of device.
> 
> In some case, this vulnerability cause remote code execution(RCE) as exec
> user privilege of ConnMan. As a result of RCE an attacker can gather
> information, spoof, eavesdrop and make a back door.
> 
> ## Q. Can I detect if someone has exploited this against me?
> A. It's hard to say, maybe you can find this by analyzing crash dump.
> 
> ## Q. Can IDS/IPS detect this attack?
> A. Configuring your IDS/IPS to detect invalid architechture of DNS responses
> enables your IDS/IPS to detect the partial attacks.
> 
> ## Q. Can I find the PoC?
> A. We have generated the PoC which cause DoS and RCE against some Linux
> distributions. We don't have any plan to publish the PoC in near future. To
> check if your device is affected or not, please check the version of ConnMan.
> 
> ## Q. How do you report this vulnerability?
> A. After discovering this vulnerability, we reported to Intel PSIRT. Notification
> to ConnMan developers was made by Intel PSIRT. We were cooperating with
> Intel PSIRT in development of defect fix patch.
> 
> 
> # References
> MITRE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12865
> 
> 
> Warm & regards,
> ------------------------------------------------------------
> Daisuke Noguchi
> Seinor Security Consultant
> NRI Secure Technologies, Ltd. Cyber Security Technical Development
> Department
> Tokyo Office   TEL +81-3-6831-8514 Fax +81-3-6706-0599
> 
> 
> 
> ----------------------------------------------------------------
> このメールは、本来の宛先の方のみに限定された機密情報が含まれてい
> る場合がございます。お心あたりのない場合は、送信者にご連絡のうえ、
> このメールを削除いただきますようお願い申し上げます。
> 
> PLEASE READ :This e-mail is confidential and intended for the named
> recipient only. If you are not an intended recipient, please notify the sender
> and delete this e-mail.
> ----------------------------------------------------------------


More information about the yocto-security mailing list