Windows 7 / Server 2008R2 Remote Kernel Crash

date 2009年11月12日 | category 学习笔记| 坏人咖啡

作者:Laurent Gaffié

This bug is a real proof that SDL #FAIL
The bug trigger an infinite loop on smb{1,2}, pre-auth, no credential needed…
Can be trigered outside the lan via (IE*, over layer 5..)
The bug is so noob, it should have been spotted 2 years ago by the SDL if the SDL would have ever existed:

netbios_header = struct.pack(“>i”, len(”.join(SMB_packet))+SMB_packet
(The netbios header provide the length of the incoming smb{1,2} packet)

If netbios_header is 4 bytes smaller or more than SMB_packet, it just blow !
WHAT ?? you gotta be kidding me where’s my SDL ?!?

“Most secure Os ever”;
What ever your firewall is set to, you can get remotly smashed via IE or even via some broadcasting nbns tricks (no user interaction)
How funny.

Advisory:

=============================================
– Release date: November 11th, 2009
– Discovered by: Laurent Gaffié
– Severity: Medium/High
=============================================

I. VULNERABILITY
————————-
Windows 7 * , Server 2008R2 Remote Kernel Crash

II. BACKGROUND
————————-
#FAIL,#FAIL,#FAIL
SDL FAIL, ‘Most Secure Os Ever’ –> Remote Kernel in 2 mn.
#FAIL,#FAIL,#FAIL

III. DESCRIPTION
————————-
See : http://g-laurent.blogspot.com/ for much more details

#Comment: This bug is specific Windows 7/2008R2.

IV. PROOF OF CONCEPT
————————-

V. BUSINESS IMPACT
————————-
An attacker can remotly crash any Windows 7/Server 2008R2
on a LAN or via IE

VI. SYSTEMS AFFECTED
————————-
Windows 7, Windowns Server 2008R2

VII. SOLUTION
————————-
No patch available for the moment, your vendor do not care.
Close SMB feature and ports, until a real audit is provided.

VIII. REFERENCES
————————-
http://blogs.msdn.com/sdl/

IX. CREDITS
————————-
This vulnerability has been discovered by Laurent Gaffié
Laurent.gaffie{remove-this}(at)gmail.com

X. REVISION HISTORY
————————-
November 8th, 2009: MSRC contacted
November 8th, 2009: MSRC acknoledge the vuln
November 11th, 2009: MRSC try to convince me that multi-vendor-ipv6 bug shouldn’t appears on a security bulletin.
November 11th, 2009: Win 7 remote kernel smash released

XI. LEGAL NOTICES
————————-
The information contained within this advisory is supplied “as-is”
with no warranties or guarantees of fitness of use or otherwise.
I accept no responsibility for any damage caused by the use or
misuse of this information.

XII.Personal Notes
————————-
More Remote Kernel FD @MS to come.

所属分类: 学习笔记
Tags: , ,


没有评论

暂无评论

RSS feed for comments on this post.

对不起,该文章的评论被关闭了!