Pentest Security Advisory : PTL-2004-03
WIDCOMM Bluetooth Connectivity Software Buffer Overflows

Advisory Details

Title: WIDCOMM Bluetooth Connectivity Software Buffer Overflows
Announcement date: 11 August 2004
Advisory Reference: ptl-2004-03
CVE Name: CAN-2004-0775
Products: WIDCOMM Bluetooth Connectivity Software
Vulnerability Type: Buffer Overflow
Vendor-URL: http://www.widcomm.com
Vendor-Status: Fixed in Release 3.0
Remotely Exploitable: Yes
Locally Exploitable: N/A
Advisory URL: http://www.pentest.co.uk

Vulnerability Description

WIDCOMM's products provides a full range of Bluetooth connectivity solutions for PCs, PDAs, mobile phones, headsets, digital cameras, access points, and various output devices.

An unauthenticated remote attacker can submit various malformed service requests via Bluetooth, triggering a buffer overflow and executing arbitrary code on the vulnerable device.

On Windows platforms this allows arbitrary code execution under the context of the currently logged on user account.

Vulnerable Versions

WIDCOMM supply their Bluetooth Communications software to other companies to allow them to integrate Bluetooth technology into their devices. They also supply Bluetooth SDK's to enable developers to create applications that use Bluetooth. Therefore it may not be immediately apparent that you are using the WIDCOMM Bluetooth software and version numbers may vary.

WIDCOMM's website (http://www.widcomm.com/Partners/index.asp) reports the following companies as customers or partners with WIDCOMM:

Logitech Samsung Electro-Mechanics Sony Texas Instruments Compaq Computer Corporation Dell National Semiconductor Matsushita Electric Industrial Co., Ltd. Wistron NeWeb Corporation TDK Systems Europe Zeevo Cambridge Silicon Radio Billionton Broadcom Corporation LG Innotek MSI Fujitsu Siemens Computers Philips Silicon Wave Seiko Instruments Inc. TECOM Plantronics Mobilian Fujitsu Media Devices Limited OKI Electric Industry Co. Ltd. FIC Costar Brother Alcatel Atmel Conexant Systems, Inc. Microtune OSK

Pentest Limited have tested for the reported vulnerabilities against BTStackServer version 1.3.2.7 and 1.4.2.10 on both Windows XP and Windows 98 which ships with MSI Bluetooth Dongles. We have also tested this against an HP IPAQ 5450 running WinCE 3.0 with Bluetooth software version 1.4.1.03.

Pentest Limited have also written a proof of concept exploit for Windows XP.

Whilst the above platforms are the only platforms tested and confirmed to be exploitable by Pentest Limited, discussions with the vendor lead us to believe that are all versions prior to version BTW & BT-CE/PPC 3.0 are affected by this vulnerability.

WIDCOMM has not confirmed whether BT-PPC/Phone Edition, BT-Smartphone, BTE-Mobile or BTE are vulnerable.

Vendor Status

14-11-2003 - Initial Pentest Limited Notification
14-11-2003 - Notification acknowledged by WIDCOMM, request more detail
20-11-2003 - Pentest notify WIDCOMM of another vulnerability
06-01-2004 - Pentest send chase up Email without reply
13-01-2004 - Another email
13-01-2004 - WIDCOMM reply saying they are still working on it
21-01-2004 - Pentest email WIDCOMM that they have written a POC exploit
23-01-2004 - WIDCOMM reply saying they have resolved issue and fix will be available in next release
10-02-2004 - Pentest ask for an update on expected release date
11-02-2004 - WIDCOMM plan February/early March realease date
29-03-2004 - Pentest ask for update
12-05-2004 - Pentest ask for update
12-07-2004 - Pentest send chase up Email without reply
26-07-2004 - Pentest ask whether a patch will be released for older versions
03-08-2004 - WIDCOMM respond. No date set for new release and no patch will be made available for older versions.

Fix

Until version 3 of the WIDCOMM software becomes available from WIDCOMM or their customers/partners Pentest Limited recommend that end users stop using the vulnerable WIDCOMM Bluetooth software or set their Bluetooth device configuration to be non-discoverable or hidden. This will not stop the device from being vulnerable but it may limit the exposure.

Credit

This vulnerability was discovered by Mark Rowe and Matt Moore from Pentest Limited.

arrow morePTL-2004-04

PTL-2004-02arrow more

Security Services

Pentest offers a thorough, yet adaptive range of security services to help customers address vulnerabilities in their network or applications. Services include: Secure Coding Workshops, SAST tools, Manual Penetration Testing and Security Audits.

read more arrow more

Database Services

Pentest offers a complete Database Security Assessment Service (DSAS) to businesses that rely on the security of the information held within their databases or have concerns relating to the security compliance of these systems.

read more arrow more

© Copyright Pentest Limited 2001 - 2014 All Rights Reserved. Privacy statement Design: Jalee Design