Re: ALERT: ISS BlackICE Kernel Overflow Exploitable

From: Robert Reid (rreid@1800FLOWERS.COM)
Date: 02/12/02

Date:         Tue, 12 Feb 2002 11:53:45 -0500
From: Robert Reid <rreid@1800FLOWERS.COM>

To cause the kernel to fault using an interrupt 3 (0xCC, or hard break on
Intel hardware), issue the following command against a BlackICE protected
server from a Linux machine. ping -s 60000 -c 16 -p CC"

I just tried this against a Blackice defender protected Windows 2000 server.
BI version 2.9.cap, Windows 2000 Server SP2, w2kSP2SRP1. I executed the
command from a red hat 7.2 box which lives on the same subnet as the 2000
server. I could not reproduce the kernel fault and blackice continued to


-----Original Message-----
From: Marc Maiffret [mailto:marc@EEYE.COM]
Sent: Friday, February 08, 2002 7:30 PM
Subject: ALERT: ISS BlackICE Kernel Overflow Exploitable

ALERT: ISS BlackICE Kernel Overflow Exploitable

Release Date:
February 8, 2002


Systems Affected:
BlackICE Defender 2.9
BlackICE Defender for Server 2.9
BlackICE Agent for Workstation 3.0 and 3.1
BlackICE Agent for Server 3.0 and 3.1
RealSecure Server Sensor 6.0.1 and 6.5

This is an eEye Digital Security Alert. This is not an eEye Digital Security
Advisory as we did not initially discover this vulnerability. We did however
provide further research and the following is our findings.

A few days ago Matt Taylor <>
( posted to several security
mailing lists stating that BlackICE was vulnerable to a Denial of Service
attack that could result in the BlackICE service crashing and or blue
screens of the remote system. There was various talk on mailing lists about
the "Denial of Service" attack and what other versions it affected.

The day after Matt posted his DoS attack against BlackICE to various mailing
lists, ISS (Makers of BlackICE) then posted their security advisory to
notify clients of the new vulnerability and a work around until a patch is
released. ISS's advisory also described the vulnerability as a denial of
service attack.

As of yet we've not seen anyone produce accurate technical information about
the "Denial of Service" vulnerability. Ryan Permeh and Riley Hassell however
conducted research recently that shows the BlackICE "Denial of Service"
vulnerability is in fact an exploitable buffer overflow. Therefore allowing
anyone to remotely compromise users of BlackICE and potentially RealSecure
Server Sensor.

The research was done against BlackICE Defender 2.9 with a blackice.exe of
3.1.10. We are not sure if the other variants of BlackICE or RealSecure are
also exploitable. However, since they are all vulnerable to the same "denial
of service" attack we would assume that they are also exploitable.

The BlackICE buffer overflow exposes a significant flaw that will allow an
attacker to execute code within the kernel context. Our testing has shown
that by sending only a handful of large ICMP echo request packets (16 60k
packets, although it looks like packet size is not important as long as it
fragments), we get the kernel to return directly into our ICMP payload. Our
testing has shown that we have a significant amount of space to work with in
our payload, allowing a large number of exploit scenarios. This can include
but not limited to, trojaning the NT kernel.

The code gets executed within 0xF5XXXXXX, meaning we are clearly within
kernel memory space at this point. We have a pointer to more of our code
within EBX (roughly 60,000 bytes of potential shellcode), and several bytes
of potential jumpable code after our code shifts.

To cause the kernel to fault using an interrupt 3 (0xCC, or hard break on
Intel hardware), issue the following command against a BlackICE protected
server from a Linux machine. ping -s 60000 -c 16 -p CC

We have verified operations on win2k server and professional, and are
currently finishing a pure kmode exploit to allow an attacker to manipulate
the kernel and execute arbitrary code within the kernel context. We will not
be publishing this exploit. This alert contains enough technical details
within it to show that indeed we are overflowing and hitting our interrupt
0xCC, which shows were able to jump and execute our code of choice.

So once again it is not simply a denial of service attack. If your running a
vulnerable version of BlackICE then your vulnerable to a remote kernel level
compromise in which remote attacks can execute arbitrary code.

Also has created a threat analysis of the BlackICE
vulnerabilities. For more information visit the ARIS Threat Management
System at

Vendor Status:
ISS has released a patch for this buffer overflow vulnerability. You can
find out more information about the patch from here:

Credit: Matt Taylor <>, Ryan Permeh, Riley Hassell

Greetings: The guys and gal in Washington.

Copyright (c) 1998-2002 eEye Digital Security
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express consent of
eEye. If you wish to reprint the whole or any part of this alert in any
other medium excluding electronic medium, please e-mail for

The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties with regard to this information. In no event shall the author
be liable for any damages whatsoever arising out of or in connection with
the use or spread of this information. Any use of this information is at the
user's own risk.

Please send suggestions, updates, and comments to:

eEye Digital Security

Delivery co-sponsored by VeriSign - The Internet Trust Company
Do you have 128-bit SSL encryption server security?
Get VeriSign's FREE Guide, "Securing Your Web Site for Business," and learn
everything you need to know about using 128-bit SSL to encrypt your
e-commerce transactions, secure your intranets and authenticate your Web
site. 128-bit SSL is serious security for your online business. Get it now!