Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 73727 - media-video/darwin-streaming-server: Null byte DoS
Summary: media-video/darwin-streaming-server: Null byte DoS
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.idefense.com/application/p...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2004-12-07 15:29 UTC by Luke Macken (RETIRED)
Modified: 2005-02-10 12:38 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
Darwin Streaming Server v5.0.3.2 ebuild (darwin-streaming-server-5.0.3.2.ebuild,2.65 KB, text/plain)
2005-02-10 11:06 UTC, Jonathan Polansky
no flags Details
Darwin Streaming Server v5.0.3.2 patch (darwin-streaming-server-5.0.3.2-gentoo.patch,11.19 KB, patch)
2005-02-10 11:08 UTC, Jonathan Polansky
no flags Details | Diff
Darwin Streaming Server v5.0.3.2 dss.rc file (dss.rc,453 bytes, text/plain)
2005-02-10 11:09 UTC, Jonathan Polansky
no flags Details
Darwin Streaming Server v5.0.3.2 dss-admin.rc file (dss-admin.rc,481 bytes, text/plain)
2005-02-10 11:09 UTC, Jonathan Polansky
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Luke Macken (RETIRED) gentoo-dev 2004-12-07 15:29:31 UTC
Apple Darwin Streaming Server DESCRIBE Null Byte Denial of Service Vulnerability

iDEFENSE Security Advisory 12.03.04:

I. BACKGROUND

Darwin Streaming Server is an open source version of Apple
Comment 1 Luke Macken (RETIRED) gentoo-dev 2004-12-07 15:29:31 UTC
Apple Darwin Streaming Server DESCRIBE Null Byte Denial of Service Vulnerability

iDEFENSE Security Advisory 12.03.04:

I. BACKGROUND

Darwin Streaming Server is an open source version of Apples QuickTime
Streaming Server technology that allows you to send streaming media to
clients across the Internet using the industry standard RTP and RTSP
protocols.

II. DESCRIPTION

Remote exploitation of an input validation vulnerability in Apple
Computer Inc.'s Darwin Streaming Server allows attackers to cause a
denial of service condition. The vulnerability specifically occurs due
to insufficient sanity checking on arguments to DESCRIBE requests. A
remote attacker can send a request for a location containing a null byte
to cause a denial of service condition resulting in the following
backtrace:

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 1026 (LWP 9648)]
0x4207ac9e in chunk_free () from /lib/i686/libc.so.6
(gdb) bt
#0 0x4207ac9e in chunk_free () from /lib/i686/libc.so.6
#1 0x4207ac24 in free () from /lib/i686/libc.so.6
#2 0x08096406 in FindOrCreateSession (inPath=0x408caf3c,
   inParams=0x81746f0, inData=0x0, isPush=0, foundSessionPtr=0x0) at
   APIModules/QTSSReflectorModule/QTSSReflectorModule.cpp:1262

III. ANALYSIS

Successful exploitation allows any remote unauthenticated attacker to
crash the targeted server, thereby preventing legitimate users from
accessing streamed content.

IV. DETECTION

iDEFENSE has confirmed the existence of this vulnerability in Darwin
Streaming Server 5.0.1. It is suspected that earlier versions are also
vulnerable.

V. WORKAROUND

Employ firewalls, access control lists or other TCP/UDP restriction
mechanisms to limit access to systems and services.

VI. VENDOR RESPONSE

The following updates are available from Apple Downloads
(http://www.apple.com/support/downloads//) to address this
vulnerability:

Mac OS X 10.2.8 Client
http://www.apple.com/support/downloads//securityupdate_2004-12-02_v_1_0_(Mac_OS_X_10_2_8_Client).html

Mac OS X 10.2.8 Server
http://www.apple.com/support/downloads//securityupdate_2004-12-02_v_1_0_(Mac_OS_X_10_2_8_Server).html

Mac OS X 10.3.6 Client
http://www.apple.com/support/downloads//securityupdate_2004-12-02_v_1_0_(Mac_OS_X_10_3_6_Client).html

Mac OS X 10.3.6 Server
http://www.apple.com/support/downloads//securityupdate_2004-12-02_v_1_0_(Mac_OS_X_10_3_6_Server).html

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
names CAN-2004-1123 to these issues. This is a candidate for inclusion
in the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

09/10/2004   Initial vendor notification
09/15/2004   Initial vendor response
12/03/2004   Coordinated public disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp

X. LEGAL NOTICES

Copyright © 2004 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
Comment 2 Luke Macken (RETIRED) gentoo-dev 2004-12-07 15:30:55 UTC
Jeremy, please verify.
Comment 3 Jeremy Huddleston (RETIRED) gentoo-dev 2004-12-07 15:35:36 UTC
Package nuked.  If this package matures a bit and gets better support, perhaps it'll get added back to portage.
Comment 4 Luke Macken (RETIRED) gentoo-dev 2004-12-07 15:38:18 UTC
Thanks Jeremy!

Closing w/o GLSA because the package was masked and smelled funny.
Comment 5 Gregg Casillo 2004-12-08 18:23:45 UTC
Nuked? Are you kidding me? Vulnerability aside, the package installs and works as advertised, a rarity in the media-video/* packages. Exploits aren't uncommon in other programs, but they aren't removed from portage outright. I can't believe this. The night of my planned install of this on another box.

I'm used to getting stiff-armed (e.g. ivtv packages all hard masked?), so if someone could please PM or e-mail me the latest ebuild before it got "nuked," I would greatly appreciate it and move on without complaint.
Comment 6 Gregg Casillo 2004-12-08 18:28:29 UTC
Let me just elaborate on my situation. I use DSS behind a firewall. It is only used to serve MPEG4 content to two editors at my TV station so that they can determine in and out points for cutting & archiving MPEG2 files. No one outside our station has access to the DSS box.

I doubt most folks in the Gentoo community are using DSS on more than a personal, experimental basis and aren't at great risk from this exploit. I understand hard masking the ebuild with a warning, but removing it outright just seems like overkill.
Comment 7 Gregg Casillo 2004-12-08 18:47:14 UTC
Nevermind. I salvaged the ebuild from a boxed that hadn't been synced in some time.
Comment 8 Jeremy Huddleston (RETIRED) gentoo-dev 2004-12-08 19:58:38 UTC
Given the information in bug #46782, this ebuild never worked to begin with, and nobody ever bothered to fix it or give info on how to fix it.  Upstream support is non-existant, and there was no fix for this security hole released for the opensource version.  I do not want to clean up after Apple's (or any other upstream) lack of support.
Comment 9 Jonathan Polansky 2005-02-10 11:06:08 UTC
Created attachment 50932 [details]
Darwin Streaming Server v5.0.3.2 ebuild

I have created an ebuild for Darwin Streaming Server v5.0.3.2.	According to
Secunia <http://secunia.com/advisories/13367/> versions beyond 5.0.3 have fixed
the DESCRIBE null byte vulnerability, but we haven't been able to find any
other resources confirming this.  Also, we have been unable to demonstrate the
DESCRIBE null byte vulnerability in previous versions, so we haven't been able
to confirm that it has been fixed in newer ones.  We would appreciate code
which can demonstrate the vulnerability.

I am attaching the ebuild, a gentoo patch, and two rc files. I appreciate any
feedback.
Comment 10 Jonathan Polansky 2005-02-10 11:08:13 UTC
Created attachment 50934 [details, diff]
Darwin Streaming Server v5.0.3.2 patch

Darwin Streaming Server v5.0.3.2 patch used by ebuild
Comment 11 Jonathan Polansky 2005-02-10 11:09:08 UTC
Created attachment 50935 [details]
Darwin Streaming Server v5.0.3.2 dss.rc file

Darwin Streaming Server v5.0.3.2 dss.rc file
Comment 12 Jonathan Polansky 2005-02-10 11:09:47 UTC
Created attachment 50936 [details]
Darwin Streaming Server v5.0.3.2 dss-admin.rc file

Darwin Streaming Server v5.0.3.2 dss-admin.rc file
Comment 13 Thierry Carrez (RETIRED) gentoo-dev 2005-02-10 12:38:44 UTC
Jonathan: you should really open a new "Ebuild" bug asking a Gentoo dev to consider putting it in the tree. This bug was solved by removing the package from the tree. Finding someone that will accept to put it back is another subject...