Integer Underflow in 6LoWPAN IPHC Header Uncompression

Description

  1. 5. Integer Underflow in 6LoWPAN IPHC Header Uncompression

  • Bug Description: Missing checks on network packet size in uncompress_IPHC_header leads to an integer underflow, resulting in corrupted net_buf bounds

  • Bug Result: The size field of a net_buf_simple struct gets underflown, significantly enlarging the assumed size of a network buffer, leading to out-of-bounds accesses in IPv6 functionality.

  • Bug Impact: Out-of-bounds accesses inside IPv6 parsing logic. I highly suspect this to be exploitable to Arbitrary Code Execution by an attacker sending IPv6 packets (such as maliciously fragmented ICMPv6 Ping requests).

  1.  

    1. Bug Details

  • Affected code: Header Uncompression logic in subsys/net/ip/6lo.c#net_6lo_uncompress->uncompress_IPHC_header.

High-Level reasoning for bug occurrence:
1. A recent fix of a bug which I reported earlier added a check to make sure enough buffer tail space was available and that the right amount of bytes were moved during in-place 6LoWPAN IPHC header compression(https://github.com/zephyrproject-rtos/zephyr/blob/d969aced6dd9ef7834d21ff8131aa561e71cc42d/subsys/net/ip/6lo.c#L1356)
2. Fuzzing has shown another bug in the handling of the opposite case where the header cannot be uncompressed into the existing buffer.
3. If not enough space is available in the current buffer, an additional buffer is allocated to hold the uncompressed contents
4. In this external-buffer uncompressed handling, the size of the compressed header is calculated based on the metadata of the initial parts of the payload
5. The expected header of the pre-computed size is then stripped from the original fragment using net_buf_pull.
6. It is not checked, however, if the buffer held enough bytes to contain this uncompressed header in the first place
7. As a result, net_buf_pull will try to remove more bytes from the buffer than are actually present, which makes the buffer's size go negative, which is a large number as it is later interpreted as an unsigned number.
8. This sets the buffer pointer of the net_buf_simple buffer out of bounds, such that out-of-bounds memory is treated as a way too large network buffer

https://github.com/zephyrproject-rtos/zephyr/blob/d969aced6dd9ef7834d21ff8131aa561e71cc42d/subsys/net/ip/6lo.c#L1366
Vulnerable code path:

0. Multiple code paths lead to this IP-layer uncompression logic, including Bluetooth, CAN bus, and IEEE 802.15.4 radio packets. I list a sample code path from ieee802154 packets, which were fuzzed using our research prototype.
1. ieee802154_recv->ieee802154_manage_recv_packet->ieee802154_reassemble->fragment_add_to_cache

  1.  

    1. Proposed Fix

  • After calculating the size of the expected uncompressed header based on the iphc metadata field, check that enough space is actually present within the buffer.

  • Note that the single pkt->buffer fragment may not represent all data within the packet, which may consist of multiple fragments
    - Legitimate parties will probably not send a too small fragment as part of the fragments, so the first fragment not holding the full compressed header could be used as an indication to just drop the packet
    - Otherwise, the logic would have to support stripping the uncompressed header from across multiple network packet fragments/buffers

  • If the uncompressed header is expected to be present in the first fragment, the following check could be implemented:
    ```
    diff --git a/subsys/net/ip/6lo.c b/subsys/net/ip/6lo.c
    index 736cf05839..f870abf4fc 100644

    •  

      • a/subsys/net/ip/6lo.c
        +++ b/subsys/net/ip/6lo.c
        @@ -1348,6 +1348,12 @@ static bool uncompress_IPHC_header(struct net_pkt *pkt)
        nhc_inline_size;
        }


+ /* Proposed fix: Make sure the buffer holds the full compressed header */
+ if (compressed_hdr_size > pkt->buffer->len) {
+ NET_ERR("Too small packet to hold compressed IPHC header");
+ return false;
+ }
+
if (net_buf_tailroom(pkt->buffer) >= diff) {
NET_DBG("Enough tailroom. Uncompress inplace");
frag = pkt->buffer;

```

Environment

None

Attachments

1
33% Done
Loading...

Activity

Show:

Tomasz Bursztyka February 4, 2021 at 7:21 AM

Nevermind, I see how this can happen.

 

A proper fix - make 6lo scattered-buffer ready - would mean quite a lot of change. Let’s just drop the packet entirely for now.

Tobias Scharnowski February 3, 2021 at 3:00 PM

I am fuzzing directly from the radio layer, so it is incoming raw radio packets which in turn carry the 6lo fragments. The target which I built the firmware image against was

 

The code path those packets took started in

I imagine that for sending the payload you will have to use a low-level radio API of your chip to send those malformed packets, as they do not adhere to the standard course.

I can see if I can extract the different low-level radio packets that the fuzzer generated which lead to this crash if that helps you.

Tomasz Bursztyka February 3, 2021 at 8:34 AM

Are you fuzzing directly from the radio layer or against the 6Lo API?

Hard to see how this case would happen in real life. The 6lo header is meant to land on first frag, or is there a bug out of 6lo that enables getting a fragmented compressed header?

 

Such check can be added, sure, but is the use case a real one? (I mean: can you actually trigger it with a full setup with radios etc… )

Details

Assignee

Reporter

Authorized viewers

Tomasz Bursztyka

CVE

Embargo Lift

Components

Fix versions

Affects versions

Priority

Created January 14, 2021 at 10:40 PM
Updated October 12, 2021 at 9:19 PM