Re: [TSCM-L] {5018} unbeliveable

From: Its from Onion <areda..._at_msn.com>
Date: Mon, 9 Aug 2010 13:52:28 -0500

>From - Sat Mar 02 00:57:18 2024
Received: by 10.151.45.10 with SMTP id x10mr245733ybj.20.1282142850425;
        Wed, 18 Aug 2010 07:47:30 -0700 (PDT)
X-BeenThere: tscm-l2006_at_googlegroups.com
Received: by 10.150.69.26 with SMTP id r26ls723508yba.5.p; Wed, 18 Aug 2010
 07:46:54 -0700 (PDT)
Received: by 10.151.102.17 with SMTP id e17mr223926ybm.19.1282141358898;
        Wed, 18 Aug 2010 07:22:38 -0700 (PDT)
Received: by 10.14.29.4 with SMTP id h4mr393106eea.0.1281379338653;
        Mon, 09 Aug 2010 11:42:18 -0700 (PDT)
Received: by 10.14.29.4 with SMTP id h4mr393105eea.0.1281379338610;
        Mon, 09 Aug 2010 11:42:18 -0700 (PDT)
Return-Path: <ejmic..._at_gmail.com>
Received: from mail-ey0-f177.google.com (mail-ey0-f177.google.com [209.85.215.177])
        by gmr-mx.google.com with ESMTP id w43si5920998eeh.3.2010.08.09.11.42.17;
        Mon, 09 Aug 2010 11:42:17 -0700 (PDT)
Received-SPF: pass (google.com: domain of ejmic..._at_gmail.com designates 209.85.215.177 as permitted sender) client-ip=209.85.215.177;
Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of ejmic..._at_gmail.com designates 209.85.215.177 as permitted sender) smtp.mail=ejmic..._at_gmail.com; dkim=pass (test mode) head..._at_gmail.com
Received: by mail-ey0-f177.google.com with SMTP id 10so4147650eyd.36
        for <tscm-..._at_googlegroups.com>; Mon, 09 Aug 2010 11:42:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=gamma;
        h=domainkey-signature:received:received:x-rim-org-msg-ref-id
         :return-receipt-to:message-id:content-transfer-encoding:reply-to
         :x-priority:references:in-reply-to:sensitivity:importance:to:subject
         :from:date:content-type:mime-version;
        bh=7a6VFqaIBXBmQm5ny6+IF/iPDkcxbkUaiRZo2lRjD04=;
        b=Uh6vDi485N3YqgpZqaaIK4i20/i1JZgw8fmi7d1csfzeTTSbWbDzwG5v804kmO09Lw
         bOHmTvS2etlEZActZWu5mVzNaHb4jNMvP3CccAzmddBqF923z78L6KBAfwNGdvNidDW7
         dnrCEXxJgPzIzDplHpDnDmHeBoLqg/MnIgZM8=
DomainKey-Signature: a=rsa-sha1; c=nofws;
        d=gmail.com; s=gamma;
        h=x-rim-org-msg-ref-id:return-receipt-to:message-id
         :content-transfer-encoding:reply-to:x-priority:references
         :in-reply-to:sensitivity:importance:to:subject:from:date
         :content-type:mime-version;
        b=LDK/4jO9977ZKCDu+deAE2Ui03Fcl4cNgrg/UhLOV8NQSs/dR6nCP/D5D1hA/xKX6y
         wKbj0zmG7GsZEEaQTfYAAjYh+BUY0FwUUwIj0lLcposqG9kU8RKBJCD0apWGZ7DPOpML
         KP+ctLttt2HSFZ/FvzvQaGTOTpgiEzds1aAv4=
Received: by 10.213.54.140 with SMTP id q12mr3140949ebg.71.1281379337314;
        Mon, 09 Aug 2010 11:42:17 -0700 (PDT)
Return-Path: <ejmic..._at_gmail.com>
Received: from bda753.bisx.prod.on.blackberry (bda-67-223-79-224.bise.na.blackberry.com [67.223.79.224])
        by mx.google.com with ESMTPS id z55sm8283499eeh.21.2010.08.09.11.42.15
        (version=SSLv3 cipher=RC4-MD5);
        Mon, 09 Aug 2010 11:42:16 -0700 (PDT)
X-rim-org-msg-ref-id: 1164339120
Return-Receipt-To: ejmic..._at_gmail.com
Message-ID: <1164339120-1281379333-cardhu_decombobulator_blackberry.rim.net-1011079241-_at_bda766.bisx.prod.on.blackberry>
Content-Transfer-Encoding: base64
Reply-To: ejmic..._at_gmail.com
X-Priority: Normal
References: <20100809134830.26893xbl3aphc328_at_webmail.uslec.net>
In-Reply-To: <20100809134830.26893xbl3aphc328_at_webmail.uslec.net>
Sensitivity: Normal
Importance: Normal
To: tscm-l2006_at_googlegroups.com
Subject: Re: [TSCM-L] {5018} unbeliveable
From: ejmic..._at_gmail.com
Date: Mon, 9 Aug 2010 18:41:56 +0000
Content-Type: text/plain
MIME-Version: 1.0
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>From - Sat Mar 02 00:57:18 2024
Received: by 10.236.140.108 with SMTP id d72mr1907961yhj.35.1355771497954;
        Mon, 17 Dec 2012 11:11:37 -0800 (PST)
X-BeenThere: tscm-l2006_at_googlegroups.com
Received: by 10.49.85.193 with SMTP id j1ls2375526qez.71.gmail; Mon, 17 Dec
 2012 11:11:30 -0800 (PST)
Received: by 10.58.209.130 with SMTP id mm2mr2472673vec.28.1355771490929;
        Mon, 17 Dec 2012 11:11:30 -0800 (PST)
Received: by 10.58.209.130 with SMTP id mm2mr2472671vec.28.1355771490916;
        Mon, 17 Dec 2012 11:11:30 -0800 (PST)
Return-Path: <ber..._at_netaxs.com>
Received: from newmx3.fast.net (newmx3.fast.net. [209.92.1.33])
        by gmr-mx.google.com with SMTP id q13si4332514vdh.0.2012.12.17.11.11.30;
        Mon, 17 Dec 2012 11:11:30 -0800 (PST)
Received-SPF: neutral (google.com: 209.92.1.33 is neither permitted nor denied by best guess record for domain of ber..._at_netaxs.com) client-ip=209.92.1.33;
Authentication-Results: gmr-mx.google.com; spf=neutral (google.com: 209.92.1.33 is neither permitted nor denied by best guess record for domain of ber..._at_netaxs.com) smtp.mail=ber..._at_netaxs.com
Message-Id: <50cf6e62.4d1e340a.702a.5047SMTPIN_ADDED_MISSING_at_gmr-mx.google.com>
Received: (qmail 10636 invoked from network); 17 Dec 2012 19:11:28 -0000
Received: from unknown (HELO NTR71408.netaxs.com) ([108.96.24.71]) (envelope-sender <ber..._at_netaxs.com>)
          by newmx3.fast.net (qmail-ldap-1.03) with SMTP
          for <tscm-..._at_googlegroups.com>; 17 Dec 2012 19:11:28 -0000
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Mon, 17 Dec 2012 05:08:46 -0500
To: tscm-l2006_at_googlegroups.com
From: bernieS <ber..._at_netaxs.com>
Subject: Cisco VoIP Phones Open-Mic Vulnerability
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-Antivirus: avast! (VPS 121217-1, 12/17/2012), Outbound message
X-Antivirus-Status: Clean

http://www.darkreading.com/threat-intelligence/167901121/security/attacks-breaches/240144378/security-researcher-compromises-cisco-voip-phones-with-vulnerability.htm

Security Researcher Compromises Cisco VoIP Phones With Vulnerability

Grad student demonstrates how phones can be turned into listening
devices by attackers

By Brian Prince- Contributing Writer
Dec 13, 2012 | 12:39 PM

A researcher has demonstrated how Cisco Voice-over-IP (VoIP) phones
can be hijacked and turned into listening devices.

At the Amphion Forum this month, Columbia University grad student Ang
Cui demonstrated how networked printers and phones can be abused by
attackers. The forum, held in San Francisco, is produced by Mocana,
which makes security software for non-PC devices that connect to the Internet.

"The attack I demonstrated is caused by the multiple vulnerabilities
within the syscall interface of the CNU [Cisco Native Unix] kernel,"
Cui tells Dark Reading. "It is caused by the lack of input validation
at the syscall interface, which allows arbitrary modification of
kernel memory from userland, as well as arbitrary code execution
within the kernel. This, in turn, allows the attacker to become root,
gain control over the DSP [Digital Signal Processor], buttons, and
LEDs on the phone. The attack I demonstrated patches the existing
kernel and DSP in order to carry out stealthy mic exfiltration."

As part of the demonstration, Cui inserted and removed a small
external circuit board from the phone's Ethernet port -- a move he
asserted could be accomplished by someone left alone inside a
corporate office for a few seconds. He then used his own smartphone
to capture every word spoken near the VoIP phone, even though it was
still "on-hook."

By patching the VoIP phone's software with his own code, he was able
to turn the Off-Hook Switch into what he refers to as a "funtenna."

The issue can be exploited remotely as well, explains Cui, where a
likely method of exploiting the kernel is by using an arbitrary
execution bug on the phone's surface.

"Typically, exploitation of a nonprivileged process will give the
attacker limited access to the phone," he says. "But in this case,
any arbitrary code execution bug can be used to exploit the
vulnerable syscalls, giving the attacker kernel-level access. I've
identified several third-party libraries within the Cisco phone that
have known exploitable vulnerabilities."

"The exploitability of these vulnerable third-party libraries will be
discussed at 29C3 [29th Chaos Communication Congress]," he says.

In response to his findings, Cisco says that workarounds and a
software patch are available to address the issue, and that
successful exploitation requires physical access to the device serial
port or a combination of remote authentication privileges and
nondefault settings.

"The company maintains a very open relationship with the security
community, and we view this as vital to helping protect our
customers' networks," the company said in a statement, adding that "a
formal release note for customers was issued on November 2nd (bug id:
CSCuc83860)."

"As for mitigation, I encourage everyone to patch to the latest [not
publicly] available firmware ASAP," Cui says. "I looked today and
found that the firmware images are not available for download. I
believe it is still only available upon request through TAC.

"At the end of the day, I'd like to see actual mechanical switches
that control the various input/output devices on IP phones," he adds.
"Looking past this specific vulnerability, I believe there is a real
need for actual host-based defense on embedded systems. The Software
Symbiote technology developed at Columbia University is designed to
protect embedded devices against this kind of attack."

The vulnerability Cui demonstrated was based on work he did during
the past year on 'Project Gunman v2', where a laser printer firmware
update could be compromised with additional -- and potentially
malicious -- code. The compromised printer could then be used to
launch other attacks on the internal network.

"The VoIP phone vulnerability demonstrated at the Amphion Forum was a
stark reminder of the need to address the device security mess," says
Kurt Stammberger, vice president of market development at Mocana and
chair of the Amphion Forum, in a statement. "The sad fact is that
most devices connected to corporate networks, like printers and VoIP
phones, are almost totally unsecured."

Received on Sat Mar 02 2024 - 00:57:18 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:44 CST