Buffer Overflow Found in RFID Passport Readers 96
epee1221 writes "Wired ran a story describing Lukas Grunwald's Defcon talk on an attack on airport passport readers. After extracting data from the (read-only) chip in a legitimate passport, he placed a version of the data with an altered passport photo (JPEG2000 is used in these chips) into a writable chip. The altered photo created a buffer overflow in two RFID readers he tested, causing both to crash. Grunwald suggests that vendors are typically using off-the-shelf JPEG2000 libraries, which would make the vulnerability common."
Re: (Score:2, Insightful)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
NDS CAMs can be emulated but they still need a real Videoguard card. This means you can use cards in unapproved units (Dreamboxes, or anything with a CI slot using a Dragon or TRex) but it doesn't mean you can get anything you've not paid for. Nobody has come close to extracting the keys from the card yet.
Box patching is CAM emula
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Its entirely irrelevant what receiver I use, for instance, my Conax CAM - what is a PCMCIA card sized card reader - in. I can take it + the MTV Unlimited card in it out of my Technomate and put it in to my Humax and it'll work fine - as the CAM handles the entirity of the decoding. Now, a Dreambox or a Dragon/T-Rex CAM "mimics" (hey, guess
JPEG2000 (Score:1)
Of course they are vulnerable (Score:3, Insightful)
The only thing the manufacturers of these systems can do is thoroughly test their software, and make the attack possibilities as small as possible. For instance, they should check the signature under the data before passing the data on to the next layers. Of course, for this you need the certificate of the issuing state. You should also test if the underlying libraries that do this initial check are not vulnerable.
Re: (Score:2, Funny)
Re: (Score:2, Funny)
Yes.
Re: (Score:2)
You never know, under those burkas...
Re: (Score:1)
Re: (Score:2)
You forgot Mandarin/Szechuan/Cantonese.
Re: (Score:2)
Re: (Score:2)
RFID passports were a stupid idea in the first place. I do not want the id in my pocket broadcasting to the world "I'm an American Passport! Kidnap the holder!" (and kidnapping is an issue in places of the world I need to go, like where my in-laws and children are).
Explain to me how... (Score:3, Funny)
Passport is scanned
Reader goes casters up
Reader is power cycled
Passport is scanned again
Reader goes casters up
Owner of said passport is hauled off to some secret room where all of their orifices are checked by an ex-prison guard with large hands.
This does show the lack of testing and hardening, but it seems a buffer overflow situation like this would be relatively easy to patch.
Re: (Score:2, Funny)
Re:Explain to me how... (Score:5, Insightful)
Passport is scanned
Reader goes casters up
Reader is power cycled
Passport is scanned again
Reader goes casters up
Security Goon say "Shit, that's wierd. But the paper passport looks fine. Go on through."
Owner of said passport traipses past security, making the E-passport no better than a regular one.
Re: (Score:2)
Security Goon say "Shit, that's wierd. But the paper passport looks fine. Go on through."
"Insightful," eh?
A show of hands, please, from anyone willing to test this theory out.
"Weird" is not a word I want to hear from the airport security guard when I am trying to board a plane for New York.
Re: (Score:2)
Hand card to cashier.
Scan card. Won't scan.
Scan card again. Won't scan.
"That's wierd. It won't scan. Sign here instead."
I then walk out with the goods. No valid security check was made. This has happened multiple times at multiple shops.
Re:Explain to me how... (Score:5, Informative)
Re: (Score:2, Interesting)
*passport is scanned*
*reader does something weird [because it's being hijacked by buffer overflow exploit code], gives error message*
*passport is re-scanned*
*reader says, "Joe C. Terrorist is OK. His name does not appear in no-fly list. SSN# 666-69-6969 is valid."*
-os
Re: (Score:2)
Owner of said passport traipses past security, making the E-passport no better than a regular one.
Nonsense. What would actually happen is exactly what would happen if you just broke the contactless smart card chip in your passport -- since your passport isn't fully functional, you get routed out of the expedited "normal" flow, and into the "exceptional case" flow, which results in greater scrutiny of you and your passport. Assuming the alterations you made to the paper passport are undetectable, and assuming you manage to keep your cool and not give yourself away, and assuming the immigration agents
Re:Explain to me how... (Score:5, Insightful)
Hacker crafts jpeg with exploit code
Passport is scanned
Exploit code is injected
Reader silently executes exploit code
Reader continues operation with nobody any the wiser
A compromised reader lets you bypass the biometrics.
Re: (Score:2)
Re: (Score:1, Informative)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Funny)
Blackhat? No sir! I've just got an unfortunate face!"
Re: (Score:1)
Hooded: "I am not the terrorist you're looking for."
(Guard 1 glances at hacked scanner and turns to Guard 2.)
Guard 1: "Ahh... yeah, this isn't the terrorist we're looking for. Move along, move along..."
Re: (Score:3, Insightful)
It might be possible for an attacker to exploit the buffer overflow in order to cause the reader to execute software chosen by the attacker. For example, the attacker might insert code that recognizes his forged passport as valid, or that recognizes somebody else's passport (who may have flew in on the same flight) as invalid.
Re: (Score:2)
Or other forged passports as valid.
or that recognizes somebody else's passport (who may have flew in on the same flight) as invalid.
They need not be on the same flight. Possibly not even on the same day, depending how the system might be hackable.
If their intention were disru
Re: (Score:2, Funny)
Amsterdam, here we go!
hardly a profitable business ... (Score:2)
Re:Explain to me how... (Score:5, Informative)
A buffer overflow is a serious vulnerability, in that finding one is the biggest step towards cracking a system open.
Re: (Score:1)
Re: (Score:2)
Better yet, modify the passports of people you don't like to delay their passages through security and get them arrested. There are
Re: (Score:2)
Re: (Score:1, Troll)
"Owner of said passport is hauled off to some secret room where all of their orifices are checked by an ex-prison guard with large hands."
And if this [trolltalk.com] (Warning: NSA - Not Safe Anywhere) or any of these [trolltalk] (also NSA - Not Safe Anywhere) was the passport photo, pity the poor guard ...
The revised scenario:
Passport is scanned
Reader goes casters up
Reader is power cycled
Passport is scanned again
Reader goes casters up
Guard looks at passport photo
Guard throws up, as do the next dozen who try to inter
Honestly... (Score:2, Insightful)
#1: the guard will humanly read your inside cover photo with extra vigilance...the chip is not the only method of ID
#2: you'll probably be detained for a bit while they re-test your passport; if it fails again, they'll tell you to get a new passport
(#2a: or be placed on a no-fly list, because you're a terrorist)
Plus, how exactly would a code-injection exploit work unless it's something like the GDI+ vulnerability that
Re: (Score:1)
Plus, how exactly would a code-injection exploit work unless it's something like the GDI+ vulnerability that occurred with WMF files? (If a rogue guard is injecting evil code into the machine, the government had waaay more scary problems ahead than with some 'sploiting a passport reader).
As TFA mentions, this is a buffer overflow problem. Most buffer overflows can be exploited easily unless additional OS safeguards are in place -- StackGuard, Address Space Randomization, etc., and even then, a determined hacker may still find his way in.
There are a few existing [secunia.com] examples [securitytracker.com] of buffer overflows against JPEG2000, and they can be exploited much in the same way the WMF exploit is -- malformed file is read into reader, causes buffer overflow in JPEG2000 library, causing the execution of arbitrary
30 more years of buffer overflows? (Score:2)
Re: (Score:1)
Doesn't everyone check all inputs before using? (Score:2)
Re: (Score:2)
Re: (Score:2)
The company that I work for has mainframes that disallow the execution of data, and this is, or has been, prevented by hardware. It just isn't possible to execute data. Oh... it has been this way ever since I've worked at this company, over 25 years.
Even Microsoft now has, in XP and I'm guessing later OSes, Data Execution Prevention (DEP). Most people don't turn it on because it does have a slight effect on performance. You can find the option by going to My Computer, Properties, Advanced Tab; Click "Se
Computers help voters not vote counters. (Score:2)
When it comes to counting voter-verified paper ballots, I would agree with you that this task should not be done electronically. Humans can (and do in many elections around the world) manually count voter-verified paper ballots.
But when it comes to preparing the voter-verified paper ballot, I don't see the harm with electronic assistance: electronic preparation
Re: (Score:1)
I think voting machines can be computerized, but it would have to work like this:
1. the machines are sealed with something other than a furniture key
2. they're prefereably open source
3. After you're done voting, it prints a copy of the ballot for you to verify. It doesn't count the ballot until you press the verify button. If it's wrong, you throw the ballot into a convenient paper shredder, and make your corrections.
That's interesting... (Score:1)
"..the Windows-based border-screening computer.." (Score:3, Funny)
FTFA: "If a reader could be compromised using Grunwald's technique, it might be reprogrammed to misreport an expired passport as a valid one, or even -- theoretically -- to attempt a compromise of the Windows-based border-screening computer to which it is connected."
That does it. From now on I'm only travelling to countries which use OpenBSD to operate their border gateway protocols.
And: "Additionally, the International Civil Aviation Organization recommends that issuing countries protect biometric data on the e-passport with an optional feature known as Extended Access Control, which protects the biometric data on the chip by making readers obtain a digital certificate from the country that issued the passport before the equipment can access the information."
Sounds like in the future, the only people who'll be able to traveler with any degree of success will be those who can forge their passports...
Re: (Score:1, Insightful)
Cambridge Researcher Breaks OpenBSD Systrace:
http://it.slashdot.org/it/07/08/09/138224.shtml [slashdot.org]
Nothing's "completely invulnerable"...
Re: (Score:3, Funny)
Lost faith on RFID security long ago? (Score:3, Insightful)
Great! (Score:1)
the usual (Score:2, Insightful)
There is no reason why any modern programming language should permit accidental buffer overflows; they are easily preventable without pushing the burden onto the programmer even in programming languages with the same power as C and C++.
Re:the usual (Score:4, Insightful)
Now if you're saying that there's no need to develop the vast majority of today's computer software in assembly, C, or C++, then I agree with you wholeheartedly -- but we're not talking about a computer, we're talking about an RFID reader. You know, a small device that doesn't have the latest gaming processor from AMD and Intel and 2 gigs of RAM. It has enough memory for what it needs to do and that's it; and, to be low power, it has a small, simple embedded processor.
You can't run a JVM on this thing, and even if you wanted to, it would be a bad idea.
Re: (Score:1, Informative)
This is not 1990 anymore. Embedded systems are not underpowered. Embedded systems today are quite literally THOUSANDS of times more powerful than the supercomputers that you and I grew up with. Here's one example of an RFID reader [adazonusa.com]. 64MB of RAM. Windows Mobile 2003. Here's another one [arm.com] with an XScale processor. XSCALE. DO YOU HAVE ANY IDEA HOW POWERFUL AN XSCALE PROCESSOR IS? When I first was working with garbage collection and automatic bounds checking, I dreamed for something even a fraction as powerful as
Re: (Score:2)
I will admit that I assumed that an RFID reader would not be as powerful as they appear to be. I guess we have hardware bloat these days, huh? Well, in light of the evidence, I withdraw my critique. I don't see why we'
Re: (Score:2)
Programs in Java are more secure than programs in native code, but only as long as they don't rely on native libraries
Re: (Score:2)
Hint: most cell phones run their software almost exclusively on a JVM.
Hum, no. Many cell phones can run Midlets, but the main firmware (user interface, call handling, SMS, picture processor...) is programmed in native code. On Symbian and Windows Mobile cell phones, you can actually install additional native appliations. Midlets are only used for user-downloaded applications programmed in Java, which is a really small market. Blackberries are the only cell phones that run every program in Java, including the user interface, but even them rely on significant portions of nativ
Re: (Score:1)
Re: (Score:2)
It most certainly is not the fault of C tha
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
It's not a "juvenile ad hominem".
We get a story about security-relevant buffer overflows in important C programs almost daily. These are serious problems. To address those, either we need better programmers or we need better tools. Since we can't educate the programmers any more than we already do, obviously it's the tools that aren't working, and that means that the people who are choosing the tools are making the wrong choice, and the GGP pos
Re: (Score:3, Informative)
Your argumentation suggests that a type-safe language will necessarily lead to more cpu-intensive code. This is simply not the case. For the most part, type-safety can be enforced at compile time. The result is a program that is type-safe by construction, without requiring any run-time checks
Re: (Score:2)
As for type-safety, I actually know what you mean -- I do most of my programming is in Haskell these days, which has a very powerful type system. Runtime errors are relatively infrequent as a result, but when they do occur, it's often because I'm trying to take the head of an empty list, or something similar, a proble
Re: (Score:2)
The reader simply passes the data to the PC, which is powerful enough to use a 'safe' language (with bounds checking, garbage collection, VM-sandboxing etc. etc.). Data obtained from the card is untrusted and should be treated as such until proven otherwise.
The problem here is not the reader, but the JPEG library running on the host.
Re: (Score:2)
I'm also learning SVG
Re: (Score:2)
Security Through Obscurity (Score:2)
Because everybody knows that, had they written their own code, it would have been much more secure. Just like magic.
Re: (Score:1)
Why use silly RFID toys? (Score:1)
Undressing in front of the uniformed agent, undergoing endoscopy with low-bid lubricant, then going through the rotating-brushes Lockheed Martin AlloScrub body wash to remove all possible caches and residues of others' DNA before having the blood draw, is the highlight of any ordinary business trip. The $635 airport security fee is a bit of a burden, though, as are the 12 hour fast and prep. enema.
Waiting