LLegoLLaS Posted April 19, 2012 Report Share Posted April 19, 2012 Luigi AuriemmaApplication: Samsung devices with support for remote controllersSAMSUNG RomaniaVersions: currentPlatforms: the vulnerable protocol is used on both TV and blue-raydevices so both of them should be vulnerable (my testswere performed only on a D6000 TV with the latestfirmware); the following are the products listed on theiTunes section of the app but note that I have NOTtested them:- TV released in 2010 with Internet@TV featureModels greater than or equal to LCD 650, LED 6500 and PDP 6500- TV released in 2011 with AllShare featureModels greater than or equal to LCD 550, LED 5500 and PDP 5500- BD released in 2011 with Smart Hub featureModels greater than or equal to BD-Player D5300Models greater than or equal to BD-HTS D5000BD-AVR D7000BD-HDD Combo D6900/8200/8500/8900Bugs: A] Endless restartsB] Possible buffer-overflowExploitation: remoteDate: 19 Apr 2012Author: Luigi Auriemmae-mail: aluigi@autistici.orgweb: aluigi.org#######################################################################1) Introduction2) Bugs3) The Code4) Fix#######################################################################===============1) Introduction===============All the current Samsung TV and BD systems can be controlled remotelyvia iPad, Android and other software/devices supporting the protocolused on TCP port 55000:App Store - Samsung Remotehttps://play.google.com/store/apps/details?id=com.samsung.remoteTVThe vulnerabilities require only the Ethernet/wi-fi network connectedto be exploited so anyone with access to that network can do it.I have not tested if there are limitations on Internet or in big WANs.The remote controller feature is enabled by default like all the otherservices (over 40 TCP ports opened on the TV).#######################################################################=======2) Bugs=======When the controller packet is received on the device it displays amessage on the screen for telling the user that a new "remote" devicehas been found and he must select "allow" or "deny" to continue.The message includes also the name and MAC address specified in thereceived packet, they are just normal strings (there is even a fieldcontaining the IP address for unknown reasons).-------------------A] Endless restarts-------------------The controller packet contains a string field used for the name of thecontroller.When the user selects one of the two choices (allow/deny) availableafter having received an invalid name string (for example containingline feed and other invalid chars) the device enters in the followingendless loop:- for about 5 seconds everything seems to work correctly- then the TV can be no longer controlled manually (both the TV remotecontroller and the TV panel become slow and then completelyinactive), it just doesn't accept inputs- after other 5 seconds the TV restarts automatically- this situation will continue foreverDuring these continuous reboots it's not even possible to reset thedevice (for example the "EXIT" button for 15 seconds can't work inthis state) or doing other operations allowed by the normal userswithout affecting the warranty.This is not a simple temporary Denial of Service, the TV is justimpossible to be used and reset so it's necessary the manualintervention of the technical assistance that will reset it via theservice mode (luckily the 5 seconds of activity are enough to reach thereset option).The user can avoid the exploiting of the vulnerability by pushing theEXIT button on the controller when the message with allow/deny isdisplayed on the screen.---------------------------B] Possible buffer-overflow---------------------------By setting some fields like the MAC address to a long string it'spossible to crash the device, probably due to a buffer-overflowvulnerability (just my guess).No additional analysis is possible because I can't debug the device andsincerely I'm not interested in killing my poor TV just for findingother bugs and understanding them #######################################################################===========3) The Code===========http://aluigi.org/poc/samsux_1.ziphttp://www.exploit-db.com/sploits/18751.zip#######################################################################======4) Fix======No fix because I wanted to report the problems to Samsung but an e-mailaddress doesn't exist for these types of bugs (support@samsung.com isnot available).It would have been useful also for having more details about theproblems and knowing if all or only some devices are affected but noway.#######################################################################sursa : bugsearch Quote Link to comment Share on other sites More sharing options...