Executive Summary

Summary
Title Dell BIOS in some Latitude laptops and Precision Mobile Workstations vulnerable to buffer overflow
Informations
Name VU#912156 First vendor Publication 2013-08-15
Vendor VU-CERT Last vendor Modification 2013-08-22
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.6 Attack Range Network
Cvss Impact Score 10 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#912156

Dell BIOS in some Latitude laptops and Precision Mobile Workstations vulnerable to buffer overflow

Original Release date: 15 Aug 2013 | Last revised: 22 Aug 2013

Overview

Dell BIOS in some older Latitude laptops and Precision Mobile Workstations are vulnerable to buffer overflows (CWE-119), which can bypass the signed BIOS enforcement standard.

Description

CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer

Dell BIOS in some older Latitude laptops and Precision Mobile Workstations is vulnerable to buffer overflows in the rbu_packet.pktNum and rbu_packet.pktSize values. These values can be set by an attacker while performing an illegitimate BIOS update. The BIOS reads these values when reconstructing the BIOS image, before any signature check occurs.

More information is available from the BIOS Security presentation at Black Hat USA 2013.

Impact

By convincing a user with root or administrative privileges to execute a malicious BIOS update, an attacker can bypass the signed BIOS enforcement to install an arbitrary BIOS image that could contain a rootkit or malicious code that persists across operating system re-installations and official BIOS updates.

Solution

Apply an Update

Dell has released updated BIOS versions for the affected Latitude and Precision systems that can be downloaded from their support site. Dell has provided the following list of fixed BIOS versions:

Dell System                     Released        Rev
===================================================
Latitude D530                   8/22/2013       A12
Latitude D531                   7/16/2013       A12
Latitude D630                   7/16/2013       A19
Latitude D631                   7/26/2013       A12
Latitude D830                   7/16/2013       A17
Precision M2300                 7/16/2013       A11
Precision M4300                 7/16/2013       A17
Precision M6300                 7/16/2013       A15
Latitude E5400                  7/16/2013       A19
Latitude E5500                  7/16/2013       A19
Latitude E4200                  7/16/2013       A24
Latitude E4300                  7/16/2013       A26
Latitude E6400                  7/16/2013       A34
Latitude E6400 ATG              7/16/2013       A34
Latitude E6400 / ATG / XFR      7/16/2013       A34
Latitude XT2                    7/18/2013       A15
Latitude E6500                  7/16/2013       A29
Latitude Z600                   7/16/2013       A11
Precision M2400                 7/16/2013       A28
Precision M4400                 7/16/2013       A29
Precision M6400                 7/16/2013       A13
Precision M6500                 7/18/2013       A10

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Dell Computer Corporation, Inc.Affected11 Jul 201322 Aug 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base6.2AV:L/AC:H/Au:N/C:C/I:C/A:C
Temporal4.9E:POC/RL:OF/RC:C
Environmental3.7CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

  • https://www.blackhat.com/us-13/archives.html#Butterworth
  • http://www.mitre.org/work/cybersecurity/blog/cyber_tools_butterworth.html
  • http://support.dell.com/

Credit

Thanks to Corey Kallenberg, John Butterworth, and Xeno Kovah of the MITRE Corporation for reporting this vulnerability. Thanks also to Rick Martinez from Dell.

This document was written by Adam Rauf.

Other Information

  • CVE IDs:CVE-2013-3582
  • Date Public:15 Aug 2013
  • Date First Published:15 Aug 2013
  • Date Last Updated:22 Aug 2013
  • Document Revision:54

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/912156

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2013-08-29 13:27:22
  • Multiple Updates
2013-08-22 21:18:20
  • Multiple Updates
2013-08-16 00:19:30
  • Multiple Updates
2013-08-15 17:19:51
  • First insertion