[SE-2019-01] Gemalto SIM card applet loading vulnerability

2019-04-15 Thread Security Explorations

Hello All,

On Mar 20, 2019 Security Explorations reported a security vulnerability
(Issue 19) to Gemalto [1], that made it possible to achieve read, write
and native code execution access on company's card (GemXplore 3G v3.0).

On Mar 30, 2019, Gemalto provided is with the results of its analysis
of the submitted report.

Gemalto started its message by stating that "the company is committed
to provide state of the art security products and solutions to its
Customers and is always very attentive to security information that
may affect them".

Yet, Gemalto did not ask Security Explorations for:
1) a Proof of Concept code illustrating the reported issue,
2) details regarding a novel method to read complete memory of GemXplore3G
   card with the use of 16-bit JCRE references,
3) details regarding a method to completely read memory of USimera
   Prime card,
4) the way native code execution was achieved on the card regardless
   of the Harvard RISC architecture of the underlying Samsung CalmRISC16
   processor.

The company indicated that its "R Card teams and Java Card experts
have thoroughly studied the report submitted as well as other technical
information made public by Security Explorations".

Yet, the company referred to reported issue as potentially impacting
Gemalto products and finally concluded it is "not applicable to products
used in compliance with their user guidelines" [2]. Gemalto indicated
that "today and to the best of its knowledge, there is no vulnerability
in the applet loading process".

Security Explorations does not think Gemalto R Card teams and Java
Card experts have thoroughly studied the received vulnerability report.

The report contained an unintentional mistake in the way that it
incorrectly associated GemXplore issue to USimera Prime SIM card. The
USimera card could be successfully exploited, however the exploit was
due to another vulnerability and Gemalto should have spotted that.
Today, Security Explorations provided Gemalto with an updated version
of the report, which now treats USimera issue as a separate weakness
(Issue 33).

Security Explorations is perfectly aware that Gemalto makes use of its
own custom implementation of Java Card VM. This implementation hasn't
been investigated in a thorough fashion as there was no need for it.
Discovered issues were completely sufficient to achieve unauthorized
access to target cards (such as to code and data memory or STK keys)
as proven by our accompanying publication [3].

In that context, Gemalto referral to Security Explorations' report in
terms of potentially affecting company's products does not reflect the
reality. The reported issue has been clearly proven to affect given
Gemalto products. The security of Gemalto's Java Card VM implementation
has been successfully compromised regardless of some custom security
checks implemented by the runtime.

It's worth to note that achieved compromise clearly shows that target
Gemalto SIM cards failed to provide secure environment for multiple
applications as imposed by Java Card specification [4]. Vulnerable
Gemalto SIM cards cannot securely co-host applications from various
providers such as telecom and banking due to no security isolation
between them.

It's surprising to learn that one of the world's top SIM card vendors
dismisses a threat reported with respect to company's products. which
are potentially used to safeguard security and privacy of hundreds of
millions of people around the globe.

Security Explorations has reasons to believe that Gemalto SIM cards
require an in-depth security investigation.

Initial security analysis conducted with respect to GemXplore3G SIM
card revealed several instances of preinstalled, proprietary SIM Toolkit
applications from Gemalto with a dangerous functionality. At least one
of them can be used for unauthenticated, over-the-air loading of arbitrary
Java applet code into the SIM. Proper vulnerability report describing this
(Issue 34) was also submitted to Gemalto today.

Additionally, SIM Toolkit security settings seem to be relying on the
presence of some files (directly affecting STK MSL and signature checking).

Finally, we experienced problems obtaining keys for development purposes
with respect to many Gemalto cards (such as NFC UPteq). According to our
supplier, the keys were not provided to it by Gemalto partly for security
reasons.

In that context and with respect to Gemalto response received, we have
reasons to suspect that security of Gemalto cards may rely on secrecy
of the implementation (and secrecy of the keys) rather than quality and
security of code ("security through obscurity"). Our experience with
SAT TV ecosystem and "secure" STMicroelectronics chipsets (broken to
pieces in 2012 [5] and 2018 [6], all relying on secrecy for security)
make us believe same situation may apply in Gemalto case.

The above makes independent security evaluation of Gemalto products
even more important taking into account their wide market share.

At 

[SECURITY] [DSA 4431-1] libssh2 security update

2019-04-15 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4431-1   secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 13, 2019https://www.debian.org/security/faq
- -

Package: libssh2
CVE ID : CVE-2019-3855 CVE-2019-3856 CVE-2019-3857 CVE-2019-3858
 CVE-2019-3859 CVE-2019-3860 CVE-2019-3861 CVE-2019-3862
 CVE-2019-3863
Debian Bug : 924965

Chris Coulson discovered several vulnerabilities in libssh2, a SSH2
client-side library, which could result in denial of service,
information leaks or the execution of arbitrary code.

For the stable distribution (stretch), these problems have been fixed in
version 1.7.0-1+deb9u1.

We recommend that you upgrade your libssh2 packages.

For the detailed security status of libssh2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/libssh2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
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=scVb
-END PGP SIGNATURE-