Blu-Ray Players Hackable Via Malicious Discs 107
An anonymous reader writes: Some Blu-Ray disc interactive features use a Java variant for UIs and applications. Stephen Tomkinson just posted a blog discussing how specially created Blu-Ray discs can be used to hack various players using exploits related to their Java usage. He hacked one Linux-based, network-connected player to get root access through vulnerabilities introduced by the vendor. He did the same thing against Windows Blu-Ray player software. Tomkinson was then able to combine both, along with detection techniques, into a single disc.
I should think so! (Score:4, Insightful)
My Blu-Ray player runs Linux and hasn't had a firmware update since 2011. I'd be shocked if it didn't have remote root holes accessible via network, let alone local privilege escalation exploits in Java.
Re:I should think so! (Score:5, Insightful)
With both the BD+ vm and the BD-J stuff, there is a lot of attention paid to 'ooh, the an unauthorized player attempting to do unauthorized things with the content on the disk?!'; but the contents of the disk are largely treated as trusted and the playback device is treated almost entirely as a potential adversary, not as a potential target, either from the disk side or the network side.
Re: (Score:1)
Then there is the other end.
https://vimeo.com/110257380#at... [vimeo.com]
https://vimeo.com/111417458 [vimeo.com]
This dude basically owned the whole device. He just skipped messing with the DRM as that was not his end goal. He was basically able to inject code in. He had total control of both the cpus in the device. The cpu is trusted...
Then I see things like this
https://www.youtube.com/watch?... [youtube.com]
These devices can be 100% hacked. It only takes time and some semblance of ability.
Re: (Score:2)
Do you have any better links with the freak dude at vimeo?
All the videos skip and stall or play sound without advancing the video for some reason.
Oh and props for the youtube link. Even though it was likely above my skill level, it was captivating and interesting. From the start of the vimeo links, it sounds like it might be good too.
Re: (Score:2)
This is an unfortunate part of the Blu-Ray standard - the only people who are supposed to be able to author a Blu-Ray disc
Re:I should think so! (Score:5, Insightful)
That was my first thought as well. "It uses Java (probably an older, unpatched version), so of course it's got massive security holes." But seriously, does anyone think there's even a remote chance that in 2015, malware is going to be transported by Blu-ray disc? This is an interesting tech demo, and it's always good to be aware of the potential of these things, but it doesn't seem to be a likely threat vector.
Re: (Score:2, Insightful)
I think that is also what they said about the sony rootkit embedded on CDs...
Re: I should think so! (Score:5, Interesting)
but it doesn't seem to be a likely threat vector.
Do some traffic analysis on your target's porn habits at the ISP, leave a compromised disc about his favorite kink in a bag on the ground near where he parks his car, and use his "connected" player to zero-day the other equipment on his LAN, installing the APT without even needing to pretend about premesis warrants or anything.
Re: I should think so! (Score:5, Funny)
Wow, there's an unexpected back-door entry at every step of that plan.
Re: (Score:2)
Re:I should think so! (Score:4, Interesting)
With 'BD Live', disks can be authored to include access to network resources, as well as locally stored assets, in their Java-driven interactive content stuff. Now, there is no way for an attacker to change the URLs a disk requests; but nor is there a way for anyone else to do so. Whatever was stamped into the disk at production will remain until the disk leaves use.
Given that companies come and go, and company interest in specific products tends to wane even faster, I would be very, very, very, surprised if the various companies releasing 'BD Live' disks have managed to always retain control of the domain names that their disks will attempt to access. It wouldn't be a terribly high value exploit; but since a disk will attempt to access exactly the same URLs until it dies, you might be able to score a steady trickle of reliable re-infections by snapping up any lapsed domains associated with BD Live disks and adding a little 'bonus content'.
Re: I should think so! (Score:2)
Any BD-J apps will need to be signed with a private key that matches the public key in the cert pressed to the disc, won't they?
Re: I should think so! (Score:4, Insightful)
Call me a pessimist; but I'd bet nontrivial money that a lot of the 'interactive' cruft that is pumped out to bulk up 'special edition' releases is barely up to the challenge of presenting a helpful error message if it gets a 404 from the remote host, much less not falling over and wagging its tail against moderately clever malice. In that case, it'd be a fully signed and approved app doing the work, but taking action based on (ill-founded) trust in content it downloaded.
Re:I should think so! (Score:4, Interesting)
With 'BD Live', disks can be authored to include access to network resources
I'm in a many-years-long battle with my PS3, which may be the best example of my irrational stubbornness that I can think of. Every time I play a Blu-ray disk, it asks me if I want to give it internet access. Every. Damn. Time. Why even make a setting called "BD Internet Connection: Allow/Confirm"? Seriously, I can't just set it to "no"?
For years now, each time that question comes up, I select "no" and think to myself "Screw you, Sony!" There's no way to rationally explain it, but hell will freeze over before I select "yes".
Now I just have another reason to keep selecting "no". Faith in my cause renewed, the battle continues...
Re: (Score:2)
Re: (Score:3)
You wouldn't need to get it pressed on a lot of disks but imagine if an ISO file of some movie was altered and when little johny downloads it and burns it in order to play on the large screen TV in the living room or perhaps a friends house, it's there.
Now what can this malware do. That depends, can it open a proxy and ping me so I can bounce my IP off yours? Can it sit idle until someone commands it to participate in a massive DDOS attack? Or can I use it to gain access to the blue ray player and have it s
Re: (Score:2)
However, that doesn't change the fact that, while basically every step of the process is potentially up for grabs, the URLs stamped into the disk are static. Short of replacing the disk nobody gets to change them.
If you control the JVM, you can rewrite them there, if you control the player's OS, you can rewrite them there, if you arrange for your host to be the one replyi
Re: I should think so! (Score:1)
I tend to agree, the people I know that use blue ray don't have Internet. There's plenty of cheap boot legs next to the red box in the shadier parts, but the people buying them don t have Internet. For the rest of the people I know, a few dollar rental online here and there covers the gap of Netflix.
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Why not? Honestly, why would a motivated enough studio not do such a thing? Remember the BMG rootkit fiasco. The only problem for them was that they were caught.
Re: (Score:2)
"Remember the BMG rootkit fiasco."
Exactly. I'm not trusting in their ethics... just that they're not so incredibly stupid as to try the same disastrous plan a second time.
Re: (Score:2)
This is an interesting tech demo, and it's always good to be aware of the potential of these things, but it doesn't seem to be a likely threat vector.
- The head of security for Iran's nuclear program on hacks via compromised thumb drives.
Re: (Score:1)
Re: (Score:3)
I'd be shocked if it didn't have remote root holes accessible via network,
Contrary to popular belief, being 'old' does not instantly make you exploitable.
Its not like it runs Oracle Java (maybe it does, maybe it doesn't)
Its probably not LISTENing on the network, in which case its probably fairly safe, how many years has it been since theres been a remote kernel exploit of ANY kind, let alone one that'll get you some sort of access to run code?
Re: (Score:2)
Most bluray players run linux and never get updates. the OPPO Bluray player has an rs232 port on back that if you power cycle it and are fast enough, you can get a shell login as root.
NEC TV sets are the same way.
Re: (Score:2)
I have the same comment about nearly every networked camera system ever.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
When they were hacking through the Blu-Ray protection trying to get the key, plenty of software based players had their keys exposed and revoked. Being softwa
If broadband is capped at 10 GB/mp (Score:2)
People still use physical media? What is this 2005?
The Internet connections available in some geographic areas are effectively stuck in 2005.
Best defense is not to care (Score:1)
If you can, have the "computer" that you use for such things not matter if it gets hacked. If your blue ray player has no writable storage or network access and you power it off after every use, there is no danger: all a disc could do when played is show stuff and play sounds, which can happen regardless of the hack. Lack of risk exposure, so you can literally not care about the threat, is always better than trying to actually secure something.
Re:Best defense is not to care (Score:5, Interesting)
I suppose not caring works, but it seems like this is a great vector to turn hardware players into Zombies. If I were a criminal, I could think of a lot of things that could be done with even 1% of the world's internet connected players. Do you really want your Blu-Ray player to be part of a botnet sending spam or participating in denial of service attacks?
If for no other reason, think of the impact on your bandwidth and electric bill. I certainly don't want a house full of hackable hardware. When (if) the internet of things arrives without security and 10% of the fridges, air conditioners, electricity meters, washing machines, pet doors, TVs and driers are all hacked because manufacturers couldn't be bothered to secure them, I think you'll probably care. It will bring the interwebs to its knees.
Re: (Score:3)
If the player has control over the power LED, it can pretend to be off when it really isn't. Few players have physical power switches which really switch power.
Re: Best defense is not to care (Score:5, Informative)
Most BD players do have storage. BD-Live depends upon it for instance.
Re: (Score:2)
Even enterprises have a nasty habit of pretending that they can get away with a little sloppiness 'inside the firewall', and consumer gear often can't be persuaded not be absurdly trusting of a
Re:Best defense is not to care (Score:4, Interesting)
If you can, have the "computer" that you use for such things not matter if it gets hacked. If your blue ray player has no writable storage or network access and you power it off after every use, there is no danger
I don't think there's a single BD player out there that doesn't allow for either software updates or updates to the BD codes that allow/disallow you to decode disks.
One I have requires a USB key to be present to cache validity information for disks you have already watched - without it, it still works, but requires contacting the mothership through Internet whenever re-inserting any disks newer than the latest firmware update.
BD disks these days even come with extras like links to youtube videos, that play on the BD player. That's an attack vector right there. Do they all use https and check the validity of the cert to avoid MITM attacks, using only name servers with signed entries? I highly doubt it.
If I wanted to hack it, I feel fairly confident that I could do so. I'd start by hooking up to the (convenient) JTAG interface, and learn as much as i could that way, before starting to probe from the outside, i.e. through discs, USB or TCP/IP. But it would be low on my list if things I own that I want to hack. My car is more interesting.
Re: (Score:2)
I've had a blu-ray player for a few years. I've never once every considered plugging it into my router (it doesn't have wifi). I've never, and still don't see, any reason to connect it to the net.
Re: (Score:2)
In other words, you have a BD player too old to matter in this context. Current players do more than just decode spinning plastic. They also have all of those apps that connect to all of those interesting video services that you just conveniently ignored.
Re: (Score:2)
I have a 6 month old Bluray player and it's not connected to ethernet in any way. not even wireless.
the "smart" functions of a bluray player are a sad, sad joke compared to a Roku 3. Why would someone intentionally use the horrible half assed crap internet capabilities on a bluray player?
I have it to play the random Disc I may or may not get, a huge amount of video is not available online so I have to get it on a spinning piece of plastic.
Re: (Score:2)
I was using my samsung Smart tv for youtube, as Roku didn't have a youtube. That changed ~6 months ago so I started to use both. Then Samsung tried to insert ads into my playback , so I disconnected the TV from the network.
What will it take for companies to learn if you don't want to provide support for 10 years don't design a device that requires your constant support for 10 years?
Re: (Score:2)
Looks like samsung solved the problem by convincing you to use a different device...
Re: (Score:2)
Re: (Score:2)
All those useless apps have vastly superior equivalents on other platforms.
Which is fine so long as you already own a device of one of these "other platforms" in your living room. "Smart" TVs and "smart" BD players are convenient for people who happen not to, such as households with one PC that is in another room.
Re: (Score:2)
It's a smart player. I just can't stand the smart functions and use a Roku instead.
Of Course They Are (Score:2)
Re: (Score:3)
> If you watch your movies via streaming, this is not an issue. 2015 people, 2015.
Yes. In 2015 there's still plenty of stuff that's not available via streaming or is only available at a price that most people aren't interested in paying.
Some us actually use this stuff and don't merely talk about it.
Re: (Score:3)
> If you watch your movies via streaming, this is not an issue. 2015 people, 2015.
Yes. In 2015 there's still plenty of stuff that's not available via streaming or is only available at a price that most people aren't interested in paying.
Some us actually use this stuff and don't merely talk about it.
The movie I was streaming just flaked out, that's why I came over here to make sure the Internet connection was still up and say hi.
Re: (Score:2)
Caps, especially in the country (Score:2)
If you live too far from the nearest CMTS or DSLAM to get a cable or DSL connection, how much streaming are you going to do with the 10 GB per month that a wireless ISP allows you?
Blu-Ray Players Hackable Via Malicious Discs (Score:3)
...that are inserted by their owners.
Always good to remember a venerability is a venerability, but a trojan is a trojan.
- People buying legitimate blu-ray titles are not going to have this issue.
- Even people downloading pirated content are not going to have this issue... as long as they are downloading just video files and not trying to pirate the entire disc with menus.
Re: (Score:2, Interesting)
People buying legitimate blu-ray titles are not going to have this issue.
Unless the bluray came from Sony. Zing.
Oh, and buck feta.
Re: (Score:1)
- People buying legitimate blu-ray titles are not going to have this issue.
Because official media never contains malware. [rationallyparanoid.com]
Re: (Score:1)
Always good to remember a venerability is a venerability
Are you saying those Blu-Ray players deserve great respect because they're so old? :-)
The mole is in your household (Score:2)
that are inserted by their owners
Not necessarily, because not everybody lives alone. Anybody in your household with the opportunity to insert a disc can attempt to exploit a vulnerability like this. I imagine that most people do not regularly disconnect their BD players and keep them under lock and key.
Re: (Score:2)
Not necessarily, because not everybody lives alone. Anybody in your household with the opportunity to insert a disc can attempt to exploit a vulnerability like this.
If you're worried about your security from other people in your home, you have bigger problems than your BD player.
Ha ha they used JAVA; morons! (Score:1)
B
Re: (Score:3)
BD-J is North America's main point of contact with this delightful substanc
Re: (Score:2)
Re: (Score:3)
That was exactly my thought. This is exactly how cell phones are jailbroken; I was actually quite disappointed that the article was purely from a security vulnerability standpoint as opposed to how I can root my player and make it allow skipping of the thrice-damned FBI warnings.
Wanna know a secret? (Score:5, Interesting)
Re: (Score:2)
Re: (Score:3)
Re: (Score:3)
a good firewalled computer will block 99.999% of the outbound requests and only transmit via backdoors in the system. they then are breaking the law to claim you are breaking the law, and thus you have a right to sue them for using a backdoor on your systems.
citation http://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal#Legal_and_financial_problems [wikipedia.org]
"In addition to violations of the Consumer Protection Against Computer Spyware Act of 2005, which allowed for civil penalties of $100,000 for each
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
NO. Sony v. Universal (and subsequent rulings) have made it clear, it does not matter where a backup comes from...
Well, one Bing search and the first hit I get is from Legalzoom [legalzoom.com] which has a pretty straightforward writeup. You may be interested in the section labeled "DMCA Basics", but more relevant to the subject at hand they say "What the DMCA does, through DRM, is make the circumvention illegal, not the actual copying. So, now, even if you own your DVD and are trying to make a personal copy ... it is illegal to bypass DRM protection measures to make your backup". Note I didn't say anything about copyright or fair u
Re: (Score:2)
Re: (Score:2)
Immigration (Score:2)
But unfortunately, "most sane countries" place onerous requirements on people born in not-sane countries who wish to live and work there.
Re: (Score:2)
UMG v. MP3.com (Score:2)
NO. Sony v. Universal (and subsequent rulings) have made it clear, it does not matter where a backup comes from, as long as you dont share it.
Where do you get that? I see UMG v. MP3.com which decided exactly the opposite. The backup has to be made by you from a genuine copy, not transmitted by someone else through the Internet.
"Hack?" (Score:2)
Isn't the very point of this player's system, that the player serves the interests of the disc's publisher over the interests of the users, where the users' needs should always yield whenever there is a conflict? That's not a mere technicality; it's the very essence. From the spec's pov, this is desirable operation. Nothing has been subverted.
AACS license (Score:2)
But, what if everybody can qualify as a disc publisher just by handing over a disc?
That's what AACS is supposed to prevent. BD players are supposed to require BDMV discs to use AACS, and the AACS license imposes a fee per title plus other requirements that likely include not doing this very thing.
can you use this on trun off HDCP / region lock? (Score:2)
can you use this on trun off HDCP / region lock?
Re: (Score:2)
Wouldn't it be easier to buy a blu-ray player that has that ability? There are certain makes available in the U.S (I'm going to assume you're in the U.S.) that have hidden player settings menus to control BD region specification. It's not possible to get a true "region free" (it plays everything) player, you'll have to change the player whenever you go from discs from one region to another. But at a cost of $50-$100 it's affordable to buy it as a second BD player to set to your favorite secondary region tha
Ooookay... (Score:2)
Geriatric DVDs and Blurays (Score:2)
Arguably off topic, but anyone that thinks on-disc custom menus with interactive content are a good idea should have watched my grandmother try to just play a DVD. Pop the disc in, hit pay. Then after wading through unbypassable FBI warnings (how can they even get away with some of the things they claim in those messages?) and previews, you finally get to the movie. Erm no. It's video loop with an integrated menu. She could hardly remember which remote was which, let alone what button did what. Trying t
Linux is secure right? (Score:2)
Re: (Score:2)
Claiming, or falling for, any argument that "open-source is secure" is a complete failure to understand. Security is relative, not absolute. To get this ass-backwards just makes you look like an idiot. Believing anyone who says ANYTHING "is secure" is utter stupidity (rather than "is more secure", for instance)
It's like saying "metal's secure". No it's not. I can walk around a sheet of metal just as easily as a pane of glass. However, a metal lock built to the same design as, say, a glass one is likel
Brilliant idea, Blu-Ray (Score:2)
Does anyone else just want to sit down with the genius who decided to put a Java runtime into a standard for home video and have a long, fireside chat?
Possibly involving the poker and some of the larger blocks of firewood?