what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Trustix Secure Linux Security Advisory 2005.12

Trustix Secure Linux Security Advisory 2005.12
Posted Dec 31, 2005
Authored by Nils Ohlmeier

Sony's Instant Video Everywhere Service is susceptible to a replay attack due to passing credentials over an insecure connection.

tags | advisory
SHA-256 | e411ec2ce0ca7bfaff8b07af72e19f12795d3e954c3ab8a63ed6f90810b8e1d0

Trustix Secure Linux Security Advisory 2005.12

Change Mirror Download
Replay Attack Vulnerability on Sonys Instant Video Everywhere Service

http://www.iptel.org/security/2005-12-31.html
December 31, 2005

I. Background

Sony offers a SIP based voice and video service called IVE.
By downloading a client application for the Windows operating system
everybody can make free voice and video calls between the members
of the IVE service. For additional monthly charges the users can
also make calls into the PSTN (normal telephones and cell phones).

More information is available from the website:

http://www.myive.com

II. Description

After starting the IVE client application and entering the username
and password into the initial dialog the application sends a HTTP
request to one of the servers of the service provider GlowPoint to
fetch initial provisioning data. This request is sent over a non-secured
TCP connection. The request URI of this initial HTTP request contains
two parameters named "userLogin" and "userPassword". The userLogin
parameter contains the username (his email address) of the customers
in clear text. The userPassword contains a hexadecimal string, but
this string is constant for every provisioning request as long as the
user does not change his password.

The response to this HTTP request contains a list of attribute value
pairs. One of the attributes is named "token". The value of this "token"
changes for every new HTTP request which is send to the server. Furthermore
the value of the "token" appears in the request URI of several additional
HTTP requests and in the SIP signaling. In the SIP REGISTER requests
from the IVE client the "token" value is present in the "X-DyLogic-MCS-Token"
header.

III. Analysis

Only if the REGISTER request contains the "X-DyLogic-MCS-Token" header
with the exact value from the provisioning data set (from the HTTP
request before) the server responds to the request.

If someone else then the real user (the attacker) knows the "userLogin" and
"userPassword" values he can send the same HTTP request (with any HTTP
client) to the provisioning server to get an up-to-date provisioning data
set. If the attacker copies the "token" value from this provisioning data
set into a SIP REGISTER request he can login to the IVE service with any
SIP client and receive calls for the real user (as long as the real user
is not currently online with his IVE client at the same time).
The most recent "token" value is accepted by the server for several hours
as long as no additional HTTP provisioning request was sent to the server.

As the hexadecimal string value of the "userPassword" is not equal to the
real password of the user, the potential attacker would not able to login to
the IVE web frontend by just knowing the "userPassword" value.

IV. Affected Versions

The IVE client version "v4.4.0 MCS" is affected by this vulnerability.

V. Workarounds


* Change your IVE user password very often.
* Use the IVE client only from trustworthy networks.
* Wait for a new IVE client version which fixes the described problems.


VI. Disclosure Timeline

12/07/2005 Initial vendor notification - GlowPoint
12/07/2005 Initial vendor response
12/31/2005 Public disclosure

VII. Credit

Nils Ohlmeier discovered this vulnerability.

VIII. Legal Notice

Copyright © 2005 iptelorg GmbH

Permission is granted for the redistribution of this alert electronically.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close