Good morning, There appears to be a fair number of kernel-level range checking flaws in ISO9660 filesystem handler (and Rock Ridge / Juliet extensions) in Linux up to and including 2.6.11. These bugs range from DoS conditions to potentially exploitable memory corruption - all this whenever a specially crafted filesystem is mounted or directories are examined. Most apparent flaws are expected to be fixed in Linux 2.6.12 (rc to show up by tomorrow or so), although, as per Linus words, "that code is horrid", and it may take some time to work out all the issues. The impact is not dramatic, but there are two obvious ways such flaws can be used to benefit remote attackers: 1) Bugs in removable media filesystems may be used to automatically compromise any system whose owner decided to examine a newly acquired CD-ROM, even if extreme caution is observed (that is, autorun is disabled, and no files are executed). 2) For all types of filesystems, such problems can be additionally used to subvert forensic analysis efforts. Disk images from compromised machine may infect forensic examiner's system and alter results, or simply render the machine unusable. Attached is a trivial fuzz script that can be used to test fs drivers against most obvious fault conditions. With little effort, it can be further altered to test filesystems other than ISO9660, and OSes other than Linux. Regards, Michal Zalewski Obligatory plug: http://lcamtuf.coredump.cx/silence/
This archive was generated by hypermail 2.1.3 : Fri Mar 18 2005 - 12:28:47 PST