Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Exploit the smart speaker at Pwn2Own

Exploit the smart speaker at Pwn2Own

In this talk I'm going to talk about how I and my teammate got an unauthenticated RCE on the Sonos Era 100 smart speaker. In this talk, I will cover the following topics:

- Why we chose this target?
- The SMB protocol
- How libsmb2 library works
- The use-after-free bug
- The information leak
- Demo video

LY Corporation Tech

May 28, 2024
Tweet

More Decks by LY Corporation Tech

Other Decks in Technology

Transcript

  1. $ whoami § I am Trung from VN AST §

    Interested in RE, pwn things for fun § Member of Qrious Secure
  2. Qrious Secure § A small CTF group with 6 members

    § Exploited Linux kernel, v8, Virtualbox, routers, Android phones and many more … § https://x.com/qriousec
  3. Content § Why we chose this target? § How SMB

    protocols works? § How the bugs were found? § The demo
  4. Why we chose this target? Later, Orange Tsai also published

    his research on the Sonos One Speaker
  5. Why we chose this target? § Content of the ZDI

    blog post § 1 info leak and 1 use after free (UAF) inside the libsmb2 library § 1 info leak inside the HTTP server code § 1 stack buffer overflow inside the MPEG-TS parser § Content of Orange’s talk § He talked about the file format parsers § He also mentioned the libsmb2 library
  6. Why we chose this target? § We choose to look

    at libsmb2 library § It is an open source project § It bases on https://github.com/sahlberg/libsmb2 with some modification
  7. How the Sonos speaker utilizes the libsmb2 library? Unauthenticated user

    The Sonos speaker The remote SMB server Send remote play request Fetch music from a remote SMB server using libsmb2 library
  8. How the Sonos speaker utilizes the libsmb2 library? Unauthenticated user

    The Sonos speaker The remote SMB server Send remote play request Fetch music from a remote SMB server using libsmb2 library Attacker can control this
  9. What is libsmb2 library? § libsmb2 is written in pure

    C § libsmb2 supports asynchronous operations § When a task is done, libsmb2 will call the provided callback function
  10. The SMB protocol § SMB protocol is a client-server communication

    protocol § Sharing files, printers, and other resources over network § Port 445
  11. How libsmb2 works? Client Server Wait queue Request 1 |

    Function_1 | Data_1 Request 2 | Function_2 | Data_2
  12. How libsmb2 works? Client Server Wait queue Request 1 |

    Function_1 | Data_1 Request 2 | Function_2 | Data_2 Reply 1
  13. How libsmb2 works? Client Server Wait queue Request 1 |

    Function_1 | Data_1 Request 2 | Function_2 | Data_2 Call Function_1(Data_1)
  14. The UAF bug § When a SMB client wants to

    get information of a file § libsmb2 sends 3 requests at once § OPEN request § QUERY request § CLOSE request
  15. The UAF bug Wait queue OPEN | Function_1 | Data

    QUERY | Function_2 | Data CLOSE | Function_3 | Data
  16. The UAF bug Wait queue OPEN | Function_1 | Data

    QUERY | Function_2 | Data CLOSE | Function_3 | Data Different callback functions but SAME callback data
  17. The UAF bug § Normally the replies arrive in the

    order OPEN -> QUERY -> CLOSE § But a malicious SMB server can change the order of the replies § CLOSE -> QUERY -> OPEN § Then the callback order is Function_3 -> Function_2 -> Function_1 § Let’s look at these functions
  18. static void getinfo_cb_3(struct smb2_context *smb2, int status, void *command_data _U_,

    void *private_data) { struct stat_cb_data *cb_data = private_data; // stripped free(cb_data); // ß free } static void getinfo_cb_2(struct smb2_context *smb2, int status, void *command_data, void *private_data) { struct stat_cb_data *cb_data = private_data; struct smb2_stat_64 *st = cb_data->st; // ß use st->smb2_nlink = fs->standard.number_of_links; // ß use /* stripped ... */ } Function_3 Function_2
  19. The UAF bug § UAF confirmed § By reclaiming the

    cb_data, we can get arbitrary write static void getinfo_cb_2(struct smb2_context *smb2, int status, void *command_data, void *private_data) { struct stat_cb_data *cb_data = private_data; struct smb2_stat_64 *st = cb_data->st; st->smb2_nlink = fs->standard.number_of_links; /* stripped ... */ }
  20. The UAF bug § But what/where to write? § Can’t

    write into GOT table (Full RELRO) § My idea is to overwrite __free_hook with system (glibc 2.29) § But don’t know their locations yet (ASLR, PIE) à Need a leak
  21. static int encode_ntlm_auth(struct smb2_context *smb2, time_t ti, struct auth_data *auth_data,

    char *server_challenge) { /* ... */ memcpy(&u32, &auth_data->ntlm_buf[40], 4); u32 = le32toh(u32); // ß------------------------- We control this server_name_len = u32 >> 16; memcpy(auth_data->buf, server_name_buf, server_name_len); // Bug here } We can control server_name_len and no length check was made on them
  22. The OOB read § Basically, we can do § memcpy(reply_buffer,

    buffer, Y) § We control Y § OOB read confirmed à Leak libc address à Defeat ASLR