BadCert: Symcrypt vulnerability puts Windows Server at risk

[German]Google security expert Tavis Ormandy of Google's Project Zero security initiative disclosed an unpatched vulnerability in Microsoft's Symcrypt operating system's main cryptographic library. The vulnerability can cause a Denial of Service (DoS) condition in Windows 8 servers and higher.


Advertising

The vulnerability was discovered by Tavis Ormandy of Google's Project Zero security initiative and reported to Microsoft. After the 90-day deadline for reporting the vulnerability expired, Ormandy now publishes the information and points to Twitter:

Ormandy documented the whole thing here and also provided test certificates to trigger the vulnerability. 

Error in SymCrypt

There is a bug in the SymCrypt encryption library that has been used since Windows 8 for symmetric encryption functions. Windows 10 has been using the library for all cryptographic functions since October 2017.

Ormandy has noticed that one can send the multi-precision arithmetic routines with certain data in an infinite loop when calculating the send. This acts as a denial of service attack (DoS). Ormandy was able to create an X.509 certificate that triggers the error.


Advertising

Tests have shown that embedding the prepared certificate in an S/MIME message, an authentication signature, a channel connection, etc. effectively forces any Windows server (e.g. ipsec, iis, exchange, etc.) to hang. Depending on the context, only a restart of the machine will help to get back to work. Ormandy writes that apparently many programs that process untrusted content (such as antivirus programs), write these routines with untrusted data. This then leads to a machine shutdown. Users can check this and will notice that the following command will never complete:

C:\> certutil.exe testcase.crt

Ormandy classifies the vulnerability as a low threat level. Microsoft has not yet released a patch, so Ormandy has disclosed the information after the 90-day period. On Github you can find the source code of a module to exploit the vulnerability. Bleeping Computer has this article about that topic.


Cookies helps to fund this blog: Cookie settings
Advertising


This entry was posted in Security, Windows and tagged , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *