Sunteți pe pagina 1din 2

(In) Security in Secure Software

Encrypting your
hard disk is no longer safe…
We use disk encryption software to secure our data.
But is it really secure? iViZ Vulnerability Research
team discovered a new class of vulnerability which
bypassed the security of Microsoft Bitlocker,
McAfee Safeboot and several others.

R e c e n t l y i Vi Z d i s c o v e r e d a n d
demonstrated how hard disk encryption
can be rendered practically useless. Hard
Bitlocker fails to sanitize the BIOS keyboard
buffer after reading passwords, resulting in
plain text password leakage to unprivileged
Disk encryption tools including the BIOS local users.
password authentication routines use
Bitlocker's pre-boot authentication routines
interruptions for reading user entered
use the BIOS API to read user input via the
password during boot time before the
keyboard. The BIOS internally copies the
operating system is initialized.
keystrokes in a RAM structure called the
The vulnerability lies due to the fact that the BIOS Keyboard buffer inside the BIOS Data
data read from users is copied at a static Area. This buffer is not flushed after use,
location in memory and is never removed resulting in potential plain text password
even after use by the authentication program. leakage once the OS is fully booted, assuming
the attacker can read the password at physical
iViZ discovered that it is
memory location 0x40:0x1e.
possible to steal the password
of the disk encryption tools by Breaking True Crypt
running an exploit locally. The password checking routine of TrueCrypt
Once an attacker gets the fails to sanitize the BIOS keyboard buffer
before AND after reading passwords.
password, the encryption is Truecrypt's pre-boot authentication routines
rendered useless. use the BIOS API to read user input via the
keyboard. The BIOS internally copies the
Breaking Microsoft Bitlocker keystrokes in a RAM structure called the
Bitlocker is the disk encryption feature BIOS Keyboard buffer inside the BIOS Data
introduced in Microsoft Vista. It has the Area.
capability to authenticate users in several This buffer is not flushed after use, resulting
ways, including using a password (PIN), in potential plain text password leakage once
when configured to work with the TPM chip. the OS is fully booted, assuming the attacker
The password checking routine of Microsoft can read the password at physical memory

01
location 0x40:0x1e. It is also possible for a This buffer is not flushed after use, resulting
root user to reboot the computer by in potential plain text password leakage once
instrumenting the BIOS keyboard buffer in the OS is fully booted, assuming the attacker
spite of the full disk encryption. can read the password at physical memory
location 0x40:0x1e.
Breaking McAfee Safeboot
The password checking routine of SafeBoot
Some disk encryption / BIOS
Device Encryption fails to sanitize the BIOS security that were broken:
keyboard buffer after reading passwords, Microsoft Bitlocker Diskcryptor
resulting in plain text password leakage to
unprivileged local users. Mcafee safeboot Lenovo

SafeBoot's pre-boot authentication routines Truecrypt Intel


use the BIOS API to read user input via the Hewlett Packard GRUB / LILO
keyboard. The BIOS internally copy the
keystrokes in a RAM structure called the
BIOS Keyboard buffer inside the BIOS Data
Area.

02

S-ar putea să vă placă și