[PATCH] ALERT!! - 2.2.x i386 Linux kernel has DoS same as 2.4.x!!!!

2002-11-19 Thread Matthew Grant
ALERT ALERT ALERT!

Sorry about shouting, but no one seems to take any notice that the
kernel 2.4.x local DoS ALSO definitely affects linux kernel 2.2.x, 
and possibly 2.0.x

I have been working on this one, and no one so far has produced any headlines
about it, but 2.2.x is ALSO affected.

I have tested and found 2.2.x is vulnerable with Andrea Archangeli's exploit. 
It also has exactly the same lcall7() function in the system call interface 
as 2.4.x, and is definitely vulnerable. The patch below definitely STOPS the
crashes in 2.2.x.

Result of bug is as in 2.4.x, an absolute lockup of the machine. This
is an easy vulnerability for a script kiddy to turn any network accessible
buffer overflow into a DOS.

Here is the patch to fix 2.2:

--- linux/arch/i386/kernel/entry.S.orig Sat Nov  3 05:39:05 2001
+++ linux/arch/i386/kernel/entry.S  Tue Nov 19 13:46:47 2002
@@ -63,7 +63,9 @@
 OLDSS  = 0x38
 
 CF_MASK= 0x0001
+TF_MASK= 0x0100
 IF_MASK= 0x0200
+DF_MASK= 0x0400
 NT_MASK= 0x4000
 VM_MASK= 0x0002
 
@@ -139,6 +141,9 @@
movl CS(%esp),%edx  # this is eip..
movl EFLAGS(%esp),%ecx  # and this is cs..
movl %eax,EFLAGS(%esp)  #
+   andl $~(NT_MASK|TF_MASK|DF_MASK), %eax
+   pushl %eax
+   popfl
movl %edx,EIP(%esp) # Now we move them to their normal places
movl %ecx,CS(%esp)  #
movl %esp,%ebx





---



Hi THere!

Fun and REAL games!

I checked the code affected in arch/i386/kernel/entry.S for 2.2.x, and
the lcall7 () call looked vulnerable as it was the same as in 2.4.x, so
that I ran the follwing exploit on 2.2.x, and the machine locked
completely

I have not check 2.0.x, but given the staleness of this code segment, it
may also be affected.

The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.

Best Regards,

Matthew Grant

PS: I am a debian developer...


Exploit code from lkml  Andrea Arcangeli [EMAIL PROTECTED]

 we just can't allow userspace to set NT or iret will crash at ret from
 userspace, furthmore there's no useful thing the userspace can do with
 the NT flag.
 
 here the fix, it applies to all 2.4 and 2.5:
 
 --- 2.4.20rc1aa2/arch/i386/kernel/ptrace.c.~1~Fri Aug  9 14:52:06
2002
 +++ 2.4.20rc1aa2/arch/i386/kernel/ptrace.cThu Nov 14 03:56:00 2002
 @@ -28,7 +28,7 @@
  
  /* determines which flags the user has access to. */
  /* 1 = access 0 = no access */
 -#define FLAG_MASK 0x00044dd5
 +#define FLAG_MASK 0x00040dd5
  
  /* set's the trap flag. */
  #define TRAP_FLAG 0x100

sorry, this is the wrong fix, it happened to fix the problem for the
only testcase working out there because such a testcase was written in a
way that used ptrace to set the eflags instead of a more simple
pushf popf lcall like this:

int main( void )
{
char dos[] = \x9C   /* pushfd   */
 \x58   /* pop eax  */
 \x0D\x00\x41\x00\x00   /* or eax,4100h  */
 \x50   /* push eax */
 \x9D   /* popfd*/
 \x9A\x00\x00\x00\x00\x07\x00;  /* call 07h:00h */

void (* f)( void );

f = (void *) dos; (* f)();

return 1;
}

(note the above is differnet to the one posted on bugtraq, the above one
is a simple version of the working exploit posted to l-k)

I clearly misunderstood how the nt works, it is read from the in core
eflags, not from the copy on the stack, so my patch won't make any
difference as far as the kernel is concerned and the only problem was
again with lcall, so the right fix is the last one from Petr.  sorry for
the spam.

Andrea







- Message from [EMAIL PROTECTED] 


List: linux-kernel
Subject:  Re: FW: i386 Linux kernel DoS
From: Krzysiek Taraszka [EMAIL PROTECTED]
Date: 2002-11-16 19:33:08

On 13 Nov 2002, Alan Cox wrote:

 On Tue, 2002-11-12 at 23:31, Christoph Hellwig wrote:
  On Tue, Nov 12, 2002 at 02:28:55PM -0900, Leif Sawyer wrote:
   This was posted on bugtraq today...
  
  A real segfaulting program?  wow :)
 
 Looks like the TF handling bug which was fixed a while ago

It wasn't fixed for 2.2.22. 2.2 has got only syscall7, so fix should be 
trivial, isn't ?
Should be look like:


diff -urN linux.orig/arch/i386/kernel/entry.S 
linux/arch/i386/kernel/entry.S
--- linux.orig/arch/i386/kernel/entry.S Tue May 21 01:32:34 2002
+++ linux/arch/i386/kernel/entry.S  Thu Nov 14 21:39:36 2002
@@ -63,7 +63,9 @@
 OLDSS  = 0x38

 CF_MASK= 0x0001
+TF_MASK= 0x0100
 IF_MASK= 0x0200
+DF_MASK= 0x0400
 NT_MASK= 0x4000
 VM_MASK= 0x0002

@@ -139,6 

Re: [PATCH] ALERT!! - 2.2.x i386 Linux kernel has DoS same as 2.4.x!!!!

2002-11-19 Thread Marc-Christian Petersen
On Tuesday 19 November 2002 23:13, Matthew Grant wrote:

Hi Matt,

 Here is the patch to fix 2.2:
consider using this instead.

-- 
Kind regards
Marc-Christian Petersen

http://sourceforge.net/projects/wolk

PGP/GnuPG Key: 1024D/569DE2E3DB441A16
Fingerprint: 3469 0CF8 CA7E 0042 7824 080A 569D E2E3 DB44 1A16
Key available at www.keyserver.net. Encrypted e-mail preferred.
diff -urN linux.orig/arch/i386/kernel/entry.S linux/arch/i386/kernel/entry.S
--- linux.orig/arch/i386/kernel/entry.S	Tue May 21 01:32:34 2002
+++ linux/arch/i386/kernel/entry.S	Thu Nov 14 21:39:36 2002
@@ -63,7 +63,9 @@
 OLDSS		= 0x38
 
 CF_MASK		= 0x0001
+TF_MASK		= 0x0100
 IF_MASK		= 0x0200
+DF_MASK		= 0x0400
 NT_MASK		= 0x4000
 VM_MASK		= 0x0002
 
@@ -139,6 +141,9 @@
 	movl CS(%esp),%edx	# this is eip..
 	movl EFLAGS(%esp),%ecx	# and this is cs..
 	movl %eax,EFLAGS(%esp)	#
+	andl $~(NT_MASK|TF_MASK|DF_MASK), %eax
+	pushl %eax
+	popfl
 	movl %edx,EIP(%esp)	# Now we move them to their normal places
 	movl %ecx,CS(%esp)	#
 	movl %esp,%ebx
@@ -256,6 +261,9 @@
 	pushl $ SYMBOL_NAME(do_divide_error)
 	ALIGN
 error_code:
+	pushfl
+	andl $~(NT_MASK|TF_MASK|DF_MASK), (%esp)
+	popfl
 	pushl %ds
 	pushl %eax
 	xorl %eax,%eax
@@ -266,7 +274,6 @@
 	decl %eax			# eax = -1
 	pushl %ecx
 	pushl %ebx
-	cld
 	movl %es,%cx
 	movl ORIG_EAX(%esp), %esi	# get the error code
 	movl ES(%esp), %edi		# get the function address
diff -urN linux.orig/arch/i386/kernel/traps.c linux/arch/i386/kernel/traps.c
--- linux.orig/arch/i386/kernel/traps.c	Thu Nov 14 21:19:40 2002
+++ linux/arch/i386/kernel/traps.c	Thu Nov 14 21:40:01 2002
@@ -601,7 +601,7 @@
 	return;
 
 clear_TF:
-	regs-eflags = ~TF_MASK;
+	regs-eflags = ~(TF_MASK|NT_MASK);
 	return;
 }
 



Re: [PATCH] ALERT!! - 2.2.x i386 Linux kernel has DoS same as 2.4.x!!!!

2002-11-19 Thread Marc-Christian Petersen
On Tuesday 19 November 2002 23:13, Matthew Grant wrote:

Hi Matt,

 Here is the patch to fix 2.2:
consider using this instead.

-- 
Kind regards
Marc-Christian Petersen

http://sourceforge.net/projects/wolk

PGP/GnuPG Key: 1024D/569DE2E3DB441A16
Fingerprint: 3469 0CF8 CA7E 0042 7824 080A 569D E2E3 DB44 1A16
Key available at www.keyserver.net. Encrypted e-mail preferred.diff -urN linux.orig/arch/i386/kernel/entry.S linux/arch/i386/kernel/entry.S
--- linux.orig/arch/i386/kernel/entry.S	Tue May 21 01:32:34 2002
+++ linux/arch/i386/kernel/entry.S	Thu Nov 14 21:39:36 2002
@@ -63,7 +63,9 @@
 OLDSS		= 0x38
 
 CF_MASK		= 0x0001
+TF_MASK		= 0x0100
 IF_MASK		= 0x0200
+DF_MASK		= 0x0400
 NT_MASK		= 0x4000
 VM_MASK		= 0x0002
 
@@ -139,6 +141,9 @@
 	movl CS(%esp),%edx	# this is eip..
 	movl EFLAGS(%esp),%ecx	# and this is cs..
 	movl %eax,EFLAGS(%esp)	#
+	andl $~(NT_MASK|TF_MASK|DF_MASK), %eax
+	pushl %eax
+	popfl
 	movl %edx,EIP(%esp)	# Now we move them to their normal places
 	movl %ecx,CS(%esp)	#
 	movl %esp,%ebx
@@ -256,6 +261,9 @@
 	pushl $ SYMBOL_NAME(do_divide_error)
 	ALIGN
 error_code:
+	pushfl
+	andl $~(NT_MASK|TF_MASK|DF_MASK), (%esp)
+	popfl
 	pushl %ds
 	pushl %eax
 	xorl %eax,%eax
@@ -266,7 +274,6 @@
 	decl %eax			# eax = -1
 	pushl %ecx
 	pushl %ebx
-	cld
 	movl %es,%cx
 	movl ORIG_EAX(%esp), %esi	# get the error code
 	movl ES(%esp), %edi		# get the function address
diff -urN linux.orig/arch/i386/kernel/traps.c linux/arch/i386/kernel/traps.c
--- linux.orig/arch/i386/kernel/traps.c	Thu Nov 14 21:19:40 2002
+++ linux/arch/i386/kernel/traps.c	Thu Nov 14 21:40:01 2002
@@ -601,7 +601,7 @@
 	return;
 
 clear_TF:
-	regs-eflags = ~TF_MASK;
+	regs-eflags = ~(TF_MASK|NT_MASK);
 	return;
 }