Almost Secure (2011)
The blog post outlines classic vulnerabilities in devices, including mass storage issues, inadequate cryptographic practices, poor input sanitization, risks from /dev/mem, and boot sequence failures that expose systems.
Read original articleThe blog post discusses several classic vulnerabilities that can affect various devices, particularly those that handle mass storage and cryptographic functions. It highlights the ext2 symlink directory traversal vulnerability, which allows unauthorized access to a device's filesystem through improperly managed mass storage. The post also addresses issues with cryptographic modes, particularly the use of AES in CBC mode, which lacks integrity checks and can lead to data recovery by attackers. Additionally, it emphasizes the dangers of inadequate sanitization of configuration strings, which can lead to arbitrary code execution. The existence of /dev/mem in Linux systems is noted as a potential risk, allowing attackers to access sensitive memory areas. Other vulnerabilities include write-only registers that can be exploited for key recovery and the reliance on success in boot sequences, which can inadvertently expose systems to remote access. The author stresses the importance of understanding these vulnerabilities to enhance device security.
- Classic vulnerabilities can affect many devices, especially those with mass storage.
- Inadequate cryptographic practices can lead to data breaches.
- Poor sanitization of user input can result in security exploits.
- The presence of /dev/mem can facilitate unauthorized access to system memory.
- Boot sequence failures can inadvertently expose systems to remote access.
Related
The Wild West of Proof of Concept Exploit Code (PoC)
CVE-2024-6387 is a serious unauthenticated remote code execution vulnerability in OpenSSH, with complex exploitation requiring knowledge of system architecture. The exploit code contains malicious elements, emphasizing risks of untrusted code.
Authenticated Boot and Disk Encryption on Linux (2021)
Linux distributions often inadequately implement Full Disk Encryption, UEFI SecureBoot, and TPMs, leaving critical components vulnerable to attacks, unlike other operating systems that offer stronger security measures.
4 Exploits, 1 bug: exploiting cve-2024-20017 4 different ways
CVE-2024-20017 is a buffer overflow vulnerability in MediaTek chipsets' wappd service, allowing various exploit strategies. The article details discovery through fuzzing and emphasizes creative exploit development in security research.
9.9 Linux CVE
A critical unauthenticated remote code execution vulnerability affecting GNU/Linux systems, rated 9.9 in severity, is set for disclosure soon, with no effective fix or CVE identifiers available yet.
Attacking the Samsung Galaxy A* Boot Chain
Quarkslab's research revealed vulnerabilities in Samsung Galaxy A devices, enabling code execution, root access, and sensitive data leaks. The findings were presented at BlackHat USA 2024, with exploits available on GitHub.
>He can then inject arbitrary sectors into this file, dump the file, and recover plaintext.
You wouldn't recover any plaintext here unless you could create an actual oracle based on that plaintext. It is unclear to me how you could generically do that with a disk encryption situation. You would have to do something like triggering errors based on the decrypted and modified plaintext. How would the attacker get access to these errors? The real problem is the ability to create valid changes to the disk (malleability).
>There are cryptographic modes (like XTS) which fix these problems.
XTS is malleable at the block level. CBC is malleable at the bit level but that isn't really a lot worse for whole disk encryption. XTS is still better, so yes, you should still prefer XTS over CBC. Integrity checking requires extra data. For full disk encryption there is no obvious place to put such data. So the common practice is to just not worry about integrity.
>In CBC, the chaining aspect will screw up the first block only, and even that can be manually fixed since the ciphertext is known.
The screwed up block shows up as decrypted plaintext. So you can't get around the bad blocks on the edges of splices with knowledge of the ciphertext.
Related
The Wild West of Proof of Concept Exploit Code (PoC)
CVE-2024-6387 is a serious unauthenticated remote code execution vulnerability in OpenSSH, with complex exploitation requiring knowledge of system architecture. The exploit code contains malicious elements, emphasizing risks of untrusted code.
Authenticated Boot and Disk Encryption on Linux (2021)
Linux distributions often inadequately implement Full Disk Encryption, UEFI SecureBoot, and TPMs, leaving critical components vulnerable to attacks, unlike other operating systems that offer stronger security measures.
4 Exploits, 1 bug: exploiting cve-2024-20017 4 different ways
CVE-2024-20017 is a buffer overflow vulnerability in MediaTek chipsets' wappd service, allowing various exploit strategies. The article details discovery through fuzzing and emphasizes creative exploit development in security research.
9.9 Linux CVE
A critical unauthenticated remote code execution vulnerability affecting GNU/Linux systems, rated 9.9 in severity, is set for disclosure soon, with no effective fix or CVE identifiers available yet.
Attacking the Samsung Galaxy A* Boot Chain
Quarkslab's research revealed vulnerabilities in Samsung Galaxy A devices, enabling code execution, root access, and sensitive data leaks. The findings were presented at BlackHat USA 2024, with exploits available on GitHub.