Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Technology IT

Buffer Overflow Found in RFID Passport Readers 96

epee1221 writes "Wired ran a story describing Lukas Grunwald's Defcon talk on an attack on airport passport readers. After extracting data from the (read-only) chip in a legitimate passport, he placed a version of the data with an altered passport photo (JPEG2000 is used in these chips) into a writable chip. The altered photo created a buffer overflow in two RFID readers he tested, causing both to crash. Grunwald suggests that vendors are typically using off-the-shelf JPEG2000 libraries, which would make the vulnerability common."
This discussion has been archived. No new comments can be posted.

Buffer Overflow Found in RFID Passport Readers

Comments Filter:
  • by Anonymous Coward on Saturday August 11, 2007 @10:42AM (#20195235)
    These passports are full featured CPU's with up to 72KB of data. The "RFID reader" is actually a very bad name for a software system that is going to read out these passports. In most documents it will be referred to as an inspection system. It will not only read out the passport, but it will also test the biometrics, communicate with other systems etc.. This is a complicated process that will most likely take place on a full featured CPU, containing a modern OS, and a modern software stack. This allows for maximum flexibility, but it will also make the systems vulnerable for attack.

    The only thing the manufacturers of these systems can do is thoroughly test their software, and make the attack possibilities as small as possible. For instance, they should check the signature under the data before passing the data on to the next layers. Of course, for this you need the certificate of the issuing state. You should also test if the underlying libraries that do this initial check are not vulnerable.
  • Honestly... (Score:2, Insightful)

    by The tECHIDNA ( 677584 ) * on Saturday August 11, 2007 @10:51AM (#20195281) Homepage
    ...if you pass a cracked RFID chip through a passport reader and then it crashes,

    #1: the guard will humanly read your inside cover photo with extra vigilance...the chip is not the only method of ID
    #2: you'll probably be detained for a bit while they re-test your passport; if it fails again, they'll tell you to get a new passport
    (#2a: or be placed on a no-fly list, because you're a terrorist)

    Plus, how exactly would a code-injection exploit work unless it's something like the GDI+ vulnerability that occurred with WMF files? (If a rogue guard is injecting evil code into the machine, the government had waaay more scary problems ahead than with some 'sploiting a passport reader).

    All that being said, there are some things (i.e. voting machines) that just should not be electronic-ized, and I feel this is one of them.
    Other than "it'll get you through faster!!", what is the point of using chips when, more than likely, the passport clerk has to humanly-read it to verify the info anyway? Especially considering that the particular RFID chip technology used in the passport is going to be obsolete or cracked in 3 years, and most passports don't expire for five or ten years?
  • by Zerth ( 26112 ) on Saturday August 11, 2007 @10:54AM (#20195309)
    Because the way it will actually go is like this:

    Passport is scanned
    Reader goes casters up
    Reader is power cycled
    Passport is scanned again
    Reader goes casters up

    Security Goon say "Shit, that's wierd. But the paper passport looks fine. Go on through."

    Owner of said passport traipses past security, making the E-passport no better than a regular one.
  • by Nazlfrag ( 1035012 ) on Saturday August 11, 2007 @10:57AM (#20195329) Journal
    At the moment it crashes. With the right sequence of bytes it looks like:

    Hacker crafts jpeg with exploit code
    Passport is scanned
    Exploit code is injected
    Reader silently executes exploit code
    Reader continues operation with nobody any the wiser

    A compromised reader lets you bypass the biometrics.
  • by SagSaw ( 219314 ) <slashdot@mmoss.STRAWorg minus berry> on Saturday August 11, 2007 @10:58AM (#20195331)
    Explain to me how this is an "attack" on passport readers?

    It might be possible for an attacker to exploit the buffer overflow in order to cause the reader to execute software chosen by the attacker. For example, the attacker might insert code that recognizes his forged passport as valid, or that recognizes somebody else's passport (who may have flew in on the same flight) as invalid.
  • Remember this /. story about RFID Passports Cloned Without Opening the Package [slashdot.org]? I'm not sure if RFID and security will ever get along at a satisfying level or if will be similar to the systematic breaking of DRM locks. Amongst other RFID stories [slashgeo.org], this "Security analysis report" paper [91 pages pdf, 967k] [bridge-project.eu] is most informative (via this blog [vector1.eu]).
  • by Anonymous Coward on Saturday August 11, 2007 @11:25AM (#20195489)
    "That does it. From now on I'm only travelling to countries which use OpenBSD to operate their border gateway protocols." - by adnonsense (826530) on Saturday August 11, @10:55AM (#20195319)

    Cambridge Researcher Breaks OpenBSD Systrace:

    http://it.slashdot.org/it/07/08/09/138224.shtml [slashdot.org]

    Nothing's "completely invulnerable"...
  • by MrCoke ( 445461 ) on Saturday August 11, 2007 @11:26AM (#20195499)
    There is no architecture that is secure from a passionate developer armed with time, IDA Pro and an oscilloscope (if needed).
  • the usual (Score:2, Insightful)

    by m2943 ( 1140797 ) on Saturday August 11, 2007 @12:42PM (#20196037)
    The problem is, as usual, the use of inherently unsafe and dangerous programming languages like C and C++.

    There is no reason why any modern programming language should permit accidental buffer overflows; they are easily preventable without pushing the burden onto the programmer even in programming languages with the same power as C and C++.
  • Re:the usual (Score:4, Insightful)

    by 808140 ( 808140 ) on Saturday August 11, 2007 @02:14PM (#20196755)
    Don't do much embedded programming, do you? Garbage collection, automatic bounds checking, and the vast majority of features that you think of as "modern" were available in quite a number of programming languages from the 1960s -- lisp, for example. While they were extremely popular in academic circles, and were without a doubt extremely powerful and capable, most development continued to be done in assembly, and then later C. Why was this, do you think? Because in those days, computer resources were so expensive that it was foolish to waste them. Here's a hint: garbage collection is a bad idea if you have so little memory that you're actually likely to run out of it. Automatic bounds checking on arrays is expensive if your processor is slow enough.

    Now if you're saying that there's no need to develop the vast majority of today's computer software in assembly, C, or C++, then I agree with you wholeheartedly -- but we're not talking about a computer, we're talking about an RFID reader. You know, a small device that doesn't have the latest gaming processor from AMD and Intel and 2 gigs of RAM. It has enough memory for what it needs to do and that's it; and, to be low power, it has a small, simple embedded processor.

    You can't run a JVM on this thing, and even if you wanted to, it would be a bad idea.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...