Synopsis
Microsoft Windows 2008 and Vista (and possible Windows 2003) contain a buffer overflow condition in the SMB v1 functionality. The issue is triggered as user-supplied input is not properly handled when processing a long Service Principal Name (SPN) in [MS-NLMP].AUTHENTICATE_MESSAGE.Payload.NtChallengeResponse.NTLMv2_CLIENT_CHALLENGE.AvPairs.MsvAvTargetName such that ((sizeof(SPN) + 2) * 2) % 256) is in range of (0x30, ERROR_LOG_MAXIMUM_SIZE). With a specially crafted NTLMSSP_AUTHENTICATE message embedded in a SMBv1 SessionSetupAndX request, a remote authenticated attacker can cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
When a Server SPN is supplied by the client, the SmbServerNameHardeningLevel registry key is set to 1 or 2, and user credentials are correct, the SrvAdminCheckSpn() function in srvnet.sys is called to check the SPN. When the SPN check fails, a SMB version 1 server calls the SrvLibLogSpnError() logging function (using the Eventlog message template in netevent.dll.mui), which in turn calls the SrvLibLogError(), the vulnerable function.
On newer OSes (i.e., Windows 7), it seems that message template is not available, and an SPN error is handled differently.
Requirements:
- Regular unprivileged Windows user credentials (i.e.,
AcceptSecurityContext()returnsSEC_E_OK) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters\smbservernamehardeninglevel >= 1- Windows Platforms (i.e., Windows 2008 and older OSes) supporting
Eventlogmessage:
"Authentication failed for SMB v %4. The server detected an invalid or NULL SPN (%2) while authenticating SPN at hardening level %3."
Solution
Microsoft has released a patch (MS15-083) to address this vulnerability. There are no known upgrades to correct this issue.Proof of Concept
<pre><code>cifs/fe80::5efe:123.123.123.123%AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA</code></pre>
Additional References
https://technet.microsoft.com/en-us/library/jj852272(v=ws.10).aspxhttps://benchmarks.cisecurity.org/tools2/windows/CIS_Microsoft_Windows_7_Benchmark_v1.2.0.pdf
https://technet.microsoft.com/library/security/ms15-083
Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]