SSH CRC-32 Compensation Attack Detector Vulnerability
BID:2347
Info
SSH CRC-32 Compensation Attack Detector Vulnerability
| Bugtraq ID: | 2347 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 08 2001 12:00AM |
| Updated: | Feb 08 2001 12:00AM |
| Credit: | Discovered by Michal Zalewski <[email protected]> on Feb 8, 2001. |
| Vulnerable: |
SSH Communications Security SSH 1.2.31 SSH Communications Security SSH 1.2.30 SSH Communications Security SSH 1.2.29 SSH Communications Security SSH 1.2.28 SSH Communications Security SSH 1.2.27 SSH Communications Security SSH 1.2.26 SSH Communications Security SSH 1.2.25 SSH Communications Security SSH 1.2.24 Secure Computing SafeWord Agent For SSH 1.0 OpenSSH OpenSSH 2.2 OpenSSH OpenSSH 2.1.1 OpenSSH OpenSSH 2.1 OpenSSH OpenSSH 1.2.3 OpenSSH OpenSSH 1.2.2 NetScreen ScreenOS 3.1.1 r2 NetScreen ScreenOS 3.1 r9 NetScreen ScreenOS 3.1 r2 NetScreen ScreenOS 3.1 r1 NetScreen ScreenOS 3.0.3 r1.1 NetScreen ScreenOS 3.0.1 r2 NetScreen ScreenOS 2.6.1 r5 NetScreen ScreenOS 2.6.1 r4 NetScreen ScreenOS 2.6.1 r3 NetScreen ScreenOS 2.6.1 r2 NetScreen ScreenOS 2.6.1 r1 NetScreen ScreenOS 2.6.1 Cisco PIX Firewall 5.3 (1) Cisco PIX Firewall 5.2 (5) Cisco IOS 12.2XQ Cisco IOS 12.2XH Cisco IOS 12.2XE Cisco IOS 12.2XD Cisco IOS 12.2XA Cisco IOS 12.2T Cisco IOS 12.2 Cisco IOS 12.1YF Cisco IOS 12.1YD Cisco IOS 12.1YC Cisco IOS 12.1YB Cisco IOS 12.1YA Cisco IOS 12.1XY Cisco IOS 12.1XV Cisco IOS 12.1XU Cisco IOS 12.1XT Cisco IOS 12.1XS Cisco IOS 12.1XR Cisco IOS 12.1XQ Cisco IOS 12.1XP Cisco IOS 12.1XM Cisco IOS 12.1XL Cisco IOS 12.1XK Cisco IOS 12.1XJ Cisco IOS 12.1XI Cisco IOS 12.1XH Cisco IOS 12.1XG Cisco IOS 12.1XF Cisco IOS 12.1XE Cisco IOS 12.1XD Cisco IOS 12.1XC Cisco IOS 12.1XB Cisco IOS 12.1XA Cisco IOS 12.1T Cisco IOS 12.1EZ Cisco IOS 12.1EY Cisco IOS 12.1EX Cisco IOS 12.1EC Cisco IOS 12.1E Cisco IOS 12.1DC Cisco IOS 12.1DB Cisco IOS 12.10S Cisco IOS 12.0S Cisco Catalyst 6000 6.2 (0.110) |
| Not Vulnerable: |
SSH Communications Security SSH2 2.4 SSH Communications Security SSH2 2.3 SSH Communications Security SSH2 2.2 SSH Communications Security SSH2 2.1 SSH Communications Security SSH2 2.0 OpenSSH OpenSSH 2.3 Cisco WebNS 5.0 B11s Cisco WebNS 5.0 1B6s Cisco WebNS 4.1 0B22s Cisco WebNS 4.0 1B42s Cisco PIX Firewall 6.0 (1) Cisco PIX Firewall 5.3 (2) Cisco PIX Firewall 5.2 (6) Cisco IOS 12.2(3) Cisco IOS 12.2(2.2)T Cisco IOS 12.2(2)XA Cisco IOS 12.2(1b) Cisco IOS 12.2(1.1) Cisco IOS 12.2(1)XQ Cisco IOS 12.2(1)XH Cisco IOS 12.2(1)XD1 Cisco IOS 12.1(8a)E Cisco IOS 12.1(6.5)EC3 Cisco IOS 12.1(6)EZ1 Cisco IOS 12.1(6)EY Cisco IOS 12.1(5)YF2 Cisco IOS 12.1(5)YD2 Cisco IOS 12.1(5)YC1 Cisco IOS 12.1(5)YB4 Cisco IOS 12.1(5)XY6 Cisco IOS 12.1(5)XV3 Cisco IOS 12.1(5)XU1 Cisco IOS 12.1(5)XR2 Cisco IOS 12.1(5)XG5 Cisco IOS 12.1(4)XM4 Cisco IOS 12.1(3)XT3 Cisco IOS 12.1(3)XP4 Cisco IOS 12.0(18)S Cisco Catalyst 6000 6.3 (0.7)PAN Cisco Catalyst 6000 6.2 (0.111) Cisco Catalyst 6000 6.1 (2.13) |
Discussion
SSH CRC-32 Compensation Attack Detector Vulnerability
Secure Shell, or SSH, is an encrypted remote access protocol. SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications. An integer-overflow bug in the CRC32 compensation attack detection code may allow remote attackers to write values to arbitrary locations in memory.
This would occur in situations where large SSH packets are recieved by either a client or server, and a 32 bit representation of the SSH packet length is assigned to a 16 bit integer. The difference in data representation in these situations will cause the 16 bit variable to be assigned to zero (or a really low value).
As a result, future calls to malloc() as well as an index used to reference locations in memory can be corrupted by an attacker. This could occur in a manner that can be exploited to write certain numerical values to almost arbitrary locations in memory.
This can lead to an attacker executing arbitrary code with the privileges of the SSH server (usually root) or the SSH client.
**UPDATE**:
There have been reports suggesting that exploitation of this vulnerability may be widespread.
Since early september, independent, reliable sources have confirmed that this vulnerability is being exploited by attackers on the Internet. Security Focus does not currently have the exploit code being used, however this record will be updated if and when it becomes available.
NOTE: Cisco 11000 Content Service Switch family is vulnerable to this issue. All WebNS releases prior, but excluding, versions: 4.01 B42s, 4.10 22s, 5.0 B11s, 5.01 B6s, are vulnerable.
Secure Computing SafeWord Agent for SSH is reportedly prone to this issue, as it is based on a vulnerable version of SSH.
** NetScreen ScreenOS is not directly vulnerable to this issue, however the referenced exploit will cause devices using vulnerable versions of the software to stop functioning properly. This will result in a denial of service condition for NetScreen devices. This issue is in the Secure Command Shell (SCS) administrative interface, which is an implementation of SSHv1. SCS is not enabled on NetScreen devices by default.
Secure Shell, or SSH, is an encrypted remote access protocol. SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications. An integer-overflow bug in the CRC32 compensation attack detection code may allow remote attackers to write values to arbitrary locations in memory.
This would occur in situations where large SSH packets are recieved by either a client or server, and a 32 bit representation of the SSH packet length is assigned to a 16 bit integer. The difference in data representation in these situations will cause the 16 bit variable to be assigned to zero (or a really low value).
As a result, future calls to malloc() as well as an index used to reference locations in memory can be corrupted by an attacker. This could occur in a manner that can be exploited to write certain numerical values to almost arbitrary locations in memory.
This can lead to an attacker executing arbitrary code with the privileges of the SSH server (usually root) or the SSH client.
**UPDATE**:
There have been reports suggesting that exploitation of this vulnerability may be widespread.
Since early september, independent, reliable sources have confirmed that this vulnerability is being exploited by attackers on the Internet. Security Focus does not currently have the exploit code being used, however this record will be updated if and when it becomes available.
NOTE: Cisco 11000 Content Service Switch family is vulnerable to this issue. All WebNS releases prior, but excluding, versions: 4.01 B42s, 4.10 22s, 5.0 B11s, 5.01 B6s, are vulnerable.
Secure Computing SafeWord Agent for SSH is reportedly prone to this issue, as it is based on a vulnerable version of SSH.
** NetScreen ScreenOS is not directly vulnerable to this issue, however the referenced exploit will cause devices using vulnerable versions of the software to stop functioning properly. This will result in a denial of service condition for NetScreen devices. This issue is in the Secure Command Shell (SCS) administrative interface, which is an implementation of SSHv1. SCS is not enabled on NetScreen devices by default.
Exploit / POC
SSH CRC-32 Compensation Attack Detector Vulnerability
CORE has developed a working commercial exploit for their IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
The following proof of concept code is available:
CORE has developed a working commercial exploit for their IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
The following proof of concept code is available:
Solution / Fix
SSH CRC-32 Compensation Attack Detector Vulnerability
Solution:
Patches have been made available by a number of vendors, as well as by CORE SDI.
F-Secure SSH Server earlier than version 5.0 are vulnerable to this issue. It is advisable to upgrade to the latest version of F-Secure SSH Server.
http://www.f-secure.com/news/2000/news_2001013000.shtml
SSH Secure Shell 3.0.1 and later are not vulnerable to this issue. Users are advised to obtain the newest version from the vendor.
http://commerce.ssh.com
Cisco users should contact the Technical Assistance Centre for patching/upgrading information.
NetScreen has released an advisory (NetScreen Security Alert 110602) which addresses this issue with new maintenance releases. Some updated maintenance releases are still pending. Users should refer to the information in the attached reference for details on obtaining fixes. Users are also advised to contact the vendor for exact details about affected versions and which upgrades are appropriate to their release.
Cisco IOS 12.1XR
Cisco IOS 12.1XD
Cisco IOS 12.1XQ
Cisco IOS 12.1XJ
Cisco IOS 12.1EX
Cisco IOS 12.1XI
Cisco IOS 12.1XS
Cisco IOS 12.2XE
Cisco IOS 12.2T
Cisco IOS 12.1T
Cisco IOS 12.1XV
Cisco IOS 12.1XA
Cisco IOS 12.1YD
Cisco IOS 12.1XM
Cisco IOS 12.1YF
Cisco IOS 12.1XU
Cisco IOS 12.1XC
Cisco IOS 12.2
Cisco IOS 12.1XY
Cisco IOS 12.1XL
Cisco IOS 12.2XH
Cisco IOS 12.1XT
Cisco IOS 12.1EC
Cisco IOS 12.1YC
Cisco IOS 12.1E
Cisco IOS 12.2XA
Cisco IOS 12.2XD
Cisco IOS 12.1YA
Cisco IOS 12.1YB
Cisco IOS 12.1EZ
Cisco IOS 12.1XG
Cisco IOS 12.2XQ
Cisco IOS 12.1XF
Cisco IOS 12.1XH
Cisco IOS 12.1EY
Cisco IOS 12.1XP
OpenSSH OpenSSH 1.2.2
SSH Communications Security SSH 1.2.24
SSH Communications Security SSH 1.2.25
SSH Communications Security SSH 1.2.26
SSH Communications Security SSH 1.2.27
SSH Communications Security SSH 1.2.28
SSH Communications Security SSH 1.2.29
OpenSSH OpenSSH 1.2.3
SSH Communications Security SSH 1.2.30
OpenSSH OpenSSH 2.1
OpenSSH OpenSSH 2.1.1
OpenSSH OpenSSH 2.2
Cisco PIX Firewall 5.2 (5)
Cisco PIX Firewall 5.3 (1)
Solution:
Patches have been made available by a number of vendors, as well as by CORE SDI.
F-Secure SSH Server earlier than version 5.0 are vulnerable to this issue. It is advisable to upgrade to the latest version of F-Secure SSH Server.
http://www.f-secure.com/news/2000/news_2001013000.shtml
SSH Secure Shell 3.0.1 and later are not vulnerable to this issue. Users are advised to obtain the newest version from the vendor.
http://commerce.ssh.com
Cisco users should contact the Technical Assistance Centre for patching/upgrading information.
NetScreen has released an advisory (NetScreen Security Alert 110602) which addresses this issue with new maintenance releases. Some updated maintenance releases are still pending. Users should refer to the information in the attached reference for details on obtaining fixes. Users are also advised to contact the vendor for exact details about affected versions and which upgrades are appropriate to their release.
Cisco IOS 12.1XR
Cisco IOS 12.1XD
Cisco IOS 12.1XQ
Cisco IOS 12.1XJ
Cisco IOS 12.1EX
Cisco IOS 12.1XI
Cisco IOS 12.1XS
Cisco IOS 12.2XE
Cisco IOS 12.2T
Cisco IOS 12.1T
Cisco IOS 12.1XV
Cisco IOS 12.1XA
Cisco IOS 12.1YD
Cisco IOS 12.1XM
Cisco IOS 12.1YF
Cisco IOS 12.1XU
Cisco IOS 12.1XC
Cisco IOS 12.2
Cisco IOS 12.1XY
Cisco IOS 12.1XL
Cisco IOS 12.2XH
Cisco IOS 12.1XT
Cisco IOS 12.1EC
Cisco IOS 12.1YC
Cisco IOS 12.1E
Cisco IOS 12.2XA
Cisco IOS 12.2XD
Cisco IOS 12.1YA
Cisco IOS 12.1YB
Cisco IOS 12.1EZ
Cisco IOS 12.1XG
Cisco IOS 12.2XQ
Cisco IOS 12.1XF
Cisco IOS 12.1XH
Cisco IOS 12.1EY
Cisco IOS 12.1XP
OpenSSH OpenSSH 1.2.2
-
OpenSSH OpenSSH 2.3.0
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-2.3.0.tgz
SSH Communications Security SSH 1.2.24
-
SSH Communications SSH 2.4.0
ftp://ftp.ssh.com/pub/ssh/ssh-2.4.0.tar.gz
SSH Communications Security SSH 1.2.25
-
SSH Communications SSH 2.4.0
ftp://ftp.ssh.com/pub/ssh/ssh-2.4.0.tar.gz
SSH Communications Security SSH 1.2.26
-
SSH Communications SSH 2.4.0
ftp://ftp.ssh.com/pub/ssh/ssh-2.4.0.tar.gz
SSH Communications Security SSH 1.2.27
-
Debian 2.2 alpha ssh-askpass-nonfree_1.2.27-6.2_alpha.deb
http://security.debian.org/dists/potato/updates/non-free/binary-alpha/ ssh-askpass-nonfree_1.2.27-6.2_alpha.deb -
Debian 2.2 alpha ssh-nonfree_1.2.27-6.2_alpha.deb
http://security.debian.org/dists/potato/updates/non-free/binary-alpha/ ssh-nonfree_1.2.27-6.2_alpha.deb -
Debian 2.2 alpha ssh-socks_1.2.27-6.2_alpha.deb
http://security.debian.org/dists/potato/updates/non-free/binary-alpha/ ssh-socks_1.2.27-6.2_alpha.deb -
Debian 2.2 i386 ssh-askpass-nonfree_1.2.27-6.2_i386.deb
http://security.debian.org/dists/potato/updates/non-free/binary-i386/s sh-askpass-nonfree_1.2.27-6.2_i386.deb -
Debian 2.2 i386 ssh-nonfree_1.2.27-6.2_i386.deb
http://security.debian.org/dists/potato/updates/non-free/binary-i386/s sh-nonfree_1.2.27-6.2_i386.deb -
Debian 2.2 i386 ssh-socks_1.2.27-6.2_i386.deb
http://security.debian.org/dists/potato/updates/non-free/binary-i386/s sh-socks_1.2.27-6.2_i386.deb -
Debian 2.2 m68k ssh-askpass-nonfree_1.2.27-6.2_m68k.deb
http://security.debian.org/dists/potato/updates/non-free/binary-m68k/s sh-askpass-nonfree_1.2.27-6.2_m68k.deb -
Debian 2.2 m68k ssh-nonfree_1.2.27-6.2_m68k.deb
http://security.debian.org/dists/potato/updates/non-free/binary-m68k/s sh-nonfree_1.2.27-6.2_m68k.deb -
Debian 2.2 m68k ssh-socks_1.2.27-6.2_m68k.deb
http://security.debian.org/dists/potato/updates/non-free/binary-m68k/s sh-socks_1.2.27-6.2_m68k.deb -
Debian 2.2 ppc ssh-askpass-nonfree_1.2.27-6.2_powerpc.deb
http://security.debian.org/dists/potato/updates/non-free/binary-powerp c/ssh-askpass-nonfree_1.2.27-6.2_powerpc.deb -
Debian 2.2 ppc ssh-nonfree_1.2.27-6.2_powerpc.deb
http://security.debian.org/dists/potato/updates/non-free/binary-powerp c/ssh-nonfree_1.2.27-6.2_powerpc.deb -
Debian 2.2 ppc ssh-socks_1.2.27-6.2_powerpc.deb
http://security.debian.org/dists/potato/updates/non-free/binary-powerp c/ssh-socks_1.2.27-6.2_powerpc.deb -
Debian 2.2 sparc ssh-askpass-nonfree_1.2.27-6.2_sparc.deb
http://security.debian.org/dists/potato/updates/non-free/binary-sparc/ ssh-askpass-nonfree_1.2.27-6.2_sparc.deb -
Debian 2.2 sparc ssh-nonfree_1.2.27-6.2_sparc.deb
http://security.debian.org/dists/potato/updates/non-free/binary-sparc/ ssh-nonfree_1.2.27-6.2_sparc.deb -
Debian 2.2 sparc ssh-socks_1.2.27-6.2_sparc.deb
http://security.debian.org/dists/potato/updates/non-free/binary-sparc/ ssh-socks_1.2.27-6.2_sparc.deb -
SSH Communications SSH 2.4.0
ftp://ftp.ssh.com/pub/ssh/ssh-2.4.0.tar.gz
SSH Communications Security SSH 1.2.28
-
SSH Communications SSH 2.4.0
ftp://ftp.ssh.com/pub/ssh/ssh-2.4.0.tar.gz
SSH Communications Security SSH 1.2.29
-
SSH Communications SSH 2.4.0
ftp://ftp.ssh.com/pub/ssh/ssh-2.4.0.tar.gz
OpenSSH OpenSSH 1.2.3
-
Debian 2.2 alpha ssh-askpass-gnome_1.2.3-9.2_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/ssh- askpass-gnome_1.2.3-9.2_alpha.deb -
Debian 2.2 alpha ssh_1.2.3-9.2_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/ssh_ 1.2.3-9.2_alpha.deb -
Debian 2.2 arm ssh-askpass-gnome_1.2.3-9.2_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/ssh-as kpass-gnome_1.2.3-9.2_arm.deb -
Debian 2.2 arm ssh_1.2.3-9.2_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/ssh_1. 2.3-9.2_arm.deb -
Debian 2.2 i386 ssh-askpass-gnome_1.2.3-9.2_i386.deb
http://security.debian.org/dists/stable/updates/main/binary-i386/ssh-a skpass-gnome_1.2.3-9.2_i386.deb -
Debian 2.2 i386 ssh_1.2.3-9.2_i386.deb
http://security.debian.org/dists/stable/updates/main/binary-i386/ssh_1 .2.3-9.2_i386.deb -
Debian 2.2 m68k ssh-askpass-gnome_1.2.3-9.2_m68k.deb
http://security.debian.org/dists/stable/updates/main/binary-m68k/ssh-a skpass-gnome_1.2.3-9.2_m68k.deb -
Debian 2.2 m68k ssh_1.2.3-9.2_m68k.deb
http://security.debian.org/dists/stable/updates/main/binary-m68k/ssh_1 .2.3-9.2_m68k.deb -
Debian 2.2 ppc ssh-askpass-gnome_1.2.3-9.2_powerpc.deb
http://security.debian.org/dists/stable/updates/main/binary-powerpc/ss h-askpass-gnome_1.2.3-9.2_powerpc.deb -
Debian 2.2 ppc ssh_1.2.3-9.2_powerpc.deb
http://security.debian.org/dists/stable/updates/main/binary-powerpc/ss h_1.2.3-9.2_powerpc.deb -
Debian 2.2 sparc ssh-askpass-gnome_1.2.3-9.2_sparc.deb
http://security.debian.org/dists/stable/updates/main/binary-sparc/ssh- askpass-gnome_1.2.3-9.2_sparc.deb -
Debian 2.2 sparc ssh_1.2.3-9.2_sparc.deb
http://security.debian.org/dists/stable/updates/main/binary-sparc/ssh_ 1.2.3-9.2_sparc.deb -
OpenSSH OpenSSH 2.3.0
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-2.3.0.tgz
SSH Communications Security SSH 1.2.30
-
SSH Communications SSH 2.4.0
ftp://ftp.ssh.com/pub/ssh/ssh-2.4.0.tar.gz
OpenSSH OpenSSH 2.1
-
OpenSSH OpenSSH 2.3.0
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-2.3.0.tgz
OpenSSH OpenSSH 2.1.1
-
OpenSSH OpenSSH 2.3.0
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-2.3.0.tgz
OpenSSH OpenSSH 2.2
-
FreeBSD 4.2-RELEASE sshd-4.2-release.patch
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-01:24/sshd-4.2-relea se.patch -
FreeBSD 4.2-STABLE sshd-4.2-stable.patch
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-01:24/sshd-4.2-stabl e.patch -
OpenSSH OpenSSH 2.3.0
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-2.3.0.tgz
Cisco PIX Firewall 5.2 (5)
Cisco PIX Firewall 5.3 (1)
References
SSH CRC-32 Compensation Attack Detector Vulnerability
References:
References:
- Cisco Security Advisory: Multiple SSH Vulnerabilities (Cisco Systems)
- NetScreen Homepage (NetScreen)
- NetScreen Security Alert 110602 (Netscreen)
- SSH integer overflow exploit (CORE Security)
- (Correction) Netscreen SSH1 CRC32 Compensation Denial of service (Erik Parker
) - Netscreen SSH1 CRC32 Compensation Denial of service (Erik Parker
) - RE: Netscreen SSH1 CRC32 Compensation Denial of service ("John"
)