Multiple Security Vulnerabilities in Sharp Zaurus

From: SURUAZ (suruazat_private)
Date: Wed Jul 10 2002 - 10:49:11 PDT

  • Next message: Zoltan Milosevic: "RE: XSS Hole in Fluid Dynamics Search engine"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    
      Syracuse University Research for Understanding Aspects of the Zaurus
                      Security Advisory SURUAZ-2002-07-07
                          Center for Systems Assurance
                             http://www.csa.syr.edu
    
    Synopsis:
    
    The Sharp(R) Zaurus(tm) SL-5000D and SL-5500 have multiple security
    vulnerabilities in design and implementation that affect system
    security.
    
    The first vulnerability gives a remote attacker full control of the
    Zaurus filesystem, including the ability to overwrite files and/or
    programs with trojans.
    
    The second vulnerability affects the Zaurus passcode function, which
    locks the Zaurus so that no data can be input via the keypad and touch
    screen.
    
    Description:
    
    Vulnerability 1:  Remote filesystem access
    
    The Sharp(R) Zaurus(tm) SL-5000D and SL-5500 handhelds use FTP for
    performing sync operations with a PC.  The FTP daemon on both Zaurus
    models is built into QPE, the default windowing system for the units, on
    port 4242.  The daemon binds to all network interfaces on the Zaurus,
    including any wireless network or PPP interfaces.
    
    This FTP service gives any remote user access to the Zaurus filesystem
    as root, via any network interface.  Setting the root password on the
    Zaurus has no effect, as the FTP daemon does not actually authenticate
    the user.  By default, the Zaurus has no root password.
    
    Vulnerability 2:  Passcode
    
    The Zaurus stores the screen-locking passcode in the file
    /home/root/Settings/Security.conf.  The passcode program uses the same
    salt value every time the passcode is set: A0.  Knowing this, a cracker
    can generate a passcode table approximately 4G in size, which can be
    used to look up the passcode given the file Security.conf.
    
    Fixes:
    
    Vulnerability 1:  Remote filesystem access
    
    Zaurus users who use ethernet or PPP to attach to a network should
    either discontinue use of QPE or place themselves behind a firewal until
    a patch for QPE is released.
    
    Vulnerability 2:  Passcode
    
    This issue is larger than it sounds.  Changing the passcode utility so
    that it does a crypt() call on plaintext passcode, using a new salt
    value each time, is difficult because the Zaurus generates very little
    random number data.
    
    Only interrupts from the keyboard and front buttons call
    add_interrupt_randomness() in the kernel.  Screen taps do not, nor do
    CompactFlash events.  Many users will only input via the screen, using
    handwriting recognition or the built-in software keyboard.  Changing the
    interrupt handler for the screen to call add_interrupt_randomness()
    should add sufficient entropy to the random number pool to generate a
    sufficiently random salt on the fly.
    
    Sharp Support has been notified of both issues and responded 7 June 2002
    with, "We have passed this information on to the engineers who have been
    working on that issue."
    
    Credits:
    
    Dr. Steve Chapin <chapinat_private>
    Douglas F. Calvert <dfcat_private>
    David Walter <dwalterat_private>
    K. Reid Wightman <krwightmat_private>
    Niranjan Sivakumar <nsivakumat_private>
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE9LG/f4WSEcu+qZMIRAsgPAJ9FtRcKdGl4g0VdcerEVlYZytoT8QCfZvZw
    QKTK01FTrMjT4re2+QIlImk=
    =MUsz
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Wed Jul 10 2002 - 15:21:09 PDT