Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Flaw in Linux kernel allows attack
CNETAsia ^ | December 2 2003 | Robert Lemos

Posted on 12/01/2003 8:10:29 PM PST by yonif

The Debian Project warned on Monday that a flaw in the Linux kernel helped attackers compromise four of the open-software project's development servers.

During several intrusions on Nov. 19, the flaw allowed an attacker who already had access to a server to remove the limitations that protected the system from everyday users. The technique is known as a privilege escalation.

The flaw had been found in September by members of the development team and had been fixed in the latest version of the core Linux software, or kernel. The fix came a bit late, however. The latest version of the kernel, 2.4.23, was released Friday, eight days after the Debian breach.

The Debian Project, which uses only truly open-source software in its make-up, stressed that the breaches hadn't affected the project's code base.

"Fortunately, we require developers to sign the upload (software) digitally," said Martin Schulze, a developer and member of the project. "These files are stored off site as well, which were used as a basis for a recheck."

The development team promised to lock all developer accounts until the flaw had been found and fixed. The team published patches for the flaw on Monday as well, but didn't specify when the accounts would be unlocked.

At least four servers had been compromised by the unknown attacker. The systems--known as master, murphy, gluck and klecker--had maintained the open-source project's bug tracking system, source code database, mailing lists, Web site and security patches.

The attacker gained access to one of the systems by compromising a developer's computer and installing a program to sniff out the characters typed on the developer's keyboard, according to a postmortem analysis published by the team Friday. When the programmer logged into the klecker system, the attacker recorded his password.

Using the September flaw, the attacker gained the same privileges on klecker as the owner. This is frequently referred to as "owning" the system. The flaw--in a part of the kernel that manages memory--allows only users that already have access to the system to raise their privileges. Such flaws are less critical than vulnerabilities that give an outside attacker access to a server and so are fixed less quickly.

The attacks have been the latest leveled at open-source software. In early November, an attacker attempted to corrupt the Linux kernel with a coding error that would have created a flaw that a similar effect to the one used against the Debian Project. A year ago, malicious attackers placed spyware into a popular open-source tool, tcpdump. A handful of other known attacks have been executed against other open-source projects as well.

The latest bug has been fixed in the most recent version of the Linux kernel, 2.4.23, and has also been patched in the next-generation of Linux since 2.6.0-test6, which was released in late September.

Despite a two-month delay in releasing a patch, Ian Murdock, the founder of Debian and the chairman of Linux distribution maintenance provider Progeny, praised the project team.

"All in all, the way the Debian guys handled the situation has been admirable: They have been open with what they found out, and the speed at which they have found things out has been quite quick," he said. Murdock is a developer on the team, but no longer has day-to-day administration duties.


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Extended News; News/Current Events; Technical
KEYWORDS: computertsecurity; kernel; linux; lowqualitycrap
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 141-147 next last
To: Golden Eagle
Windows and Linux are victims of their own success, in the sense that they are popular targets for computer crackers.
I wouldn't call Linux 'behind the times' since it has had the ability to act as a personal firewall for a long time. In my opinion the developer's workstation was improperly configured, such as having services visible to the outside world and firewalling turned off. But yes, it could have been avoided.
41 posted on 12/02/2003 11:40:19 AM PST by Liberal Classic (No better friend, no worse enemy.)
[ Post Reply | Private Reply | To 38 | View Replies]

To: Dominic Harr
Then why do MS-only sorts feel the need to 'ankle-bite' like this?

Look in the mirror, pal. You've made it very clear that you hold a grudge against M$ -- and your posts only confirm that.
42 posted on 12/02/2003 11:42:26 AM PST by Bush2000
[ Post Reply | Private Reply | To 37 | View Replies]

To: Bush2000
So what? Can't have an opinion? You don't have a *cough* grudge *cough* against Linux? ;)
43 posted on 12/02/2003 11:46:31 AM PST by Liberal Classic (No better friend, no worse enemy.)
[ Post Reply | Private Reply | To 42 | View Replies]

To: Liberal Classic
So what? Can't have an opinion? You don't have a *cough* grudge *cough* against Linux? ;)

Actually, no, I don't have a grudge against Linux. I have a Redhat box at home that I use on occasion, and I boot Knoppix (nice) whenever I need a quick-and-dirty Linux installation.

James Turner of Linux World magazine summed up my feelings perfectly about the OSS community:They can't merely coexist with the Windows community. They have a rabid need to constantly tear it down. And I'm merely providing much-needed balance.
44 posted on 12/02/2003 11:57:20 AM PST by Bush2000
[ Post Reply | Private Reply | To 43 | View Replies]

To: Liberal Classic
Still not a lot of technical information, but this is a general audience article.

That seems to be all that is available about the hack, even the official debian responses have been limited.

First, a developer's workstation was compromised...

Even how this happened hasn't been disclosed yet, has it?

the article states a memory management bug was used...

Which is probably why system was limping bad enough the admins noticed.

if you can find a package that the kernel depends on it may be possible to get super-user privilage

Which is of course exactly why kernel hacks are the worst, you have full access to all i/o ports and internal calls.

It's a shame that someone with skills enough to root several systems of seemingly high importance doesn't have a good job to keep them busy instead. But if all programmers become open source out-of-jobbies, this problem may grow.

45 posted on 12/02/2003 12:02:53 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 39 | View Replies]

To: Liberal Classic
In my opinion the developer's workstation was improperly configured, such as having services visible to the outside world and firewalling turned off.

Absolutely right, especially on a project of such high visibility. The bottom line with hackers is simple - you can never underestimate them or the angle they might take. So you have do whatever you can to stop them. Nontheless, ultimately the hackers are always the ones responsible for these incidents, and are IMO the equivalency of rodents.

46 posted on 12/02/2003 12:11:18 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 41 | View Replies]

To: rdb3; TechJunkYard; chance33_98; Calvinist_Dark_Lord; Dominic Harr; Bush2000; Nick Danger; ...
Tech Ping

Apologies to those already on this thread.

47 posted on 12/02/2003 12:26:39 PM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
Okay, okay. You have a grudge against Harr, then. :P
48 posted on 12/02/2003 12:27:50 PM PST by Liberal Classic (No better friend, no worse enemy.)
[ Post Reply | Private Reply | To 44 | View Replies]

To: Golden Eagle
You're right that the article doesn't go into detail because Debian hasn't released too many yet. I don't have any inside information and I'm just speculating but I bet money, marbles, and chalk the developer's workstation was the weak link.

Here's some more links:

Infoworld: Bug affects versions of Linux kernel prior to 2.4.23

They say this bug was fixed in September.

SearchEnterpriseLinux.com

The flaw, an integer overflow in the "brk" system call, enabled an attacker to compromise four Debian servers, sniff several passwords and install a root kit used to hit other servers.

Sniffed password used for Debian server compromise

"Somehow they got root on klecker and installed suckit. The same account was then used to log into master and gain root and install suckit there too. They then tried to get to murphy (which runs the mailing lists) with the same account. This failed because murphy is a restricted box that only a small subset of developers can log into," Troup said. "They then used their root access on master to access an administrative account used for backup purposes and used that to gain access to murphy. They got root on murphy and installed suckit there too. The next day they used a password sniffed on master to login into gluck, got root there and installed suckit."

theregister.co.uk

An encrypted program (encrypted using the TESO BurnEye obfuscator) used an overflow in brk() which allowed the user process to get executable access to kernel space. It's a local exploit, which was only possible because a hacker used a stolen password, then escalated the privileges. All passwords on one of the development machines were invalidated.

49 posted on 12/02/2003 12:32:44 PM PST by Liberal Classic (No better friend, no worse enemy.)
[ Post Reply | Private Reply | To 45 | View Replies]

To: Bush2000
Indeed, FR is one of the few places online Linux can even be rationally discussed. Here's an interesting article about how "emotional charged" the recent SCO/IBM courtcase has become, and needless to say who is more fanatical about their choice of operating system.

http://www.internetnews.com/bus-news/article.php/3114961

50 posted on 12/02/2003 12:34:08 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 44 | View Replies]

To: Golden Eagle
mi2g, the source of this "study" has no credibility, more here, and here.
51 posted on 12/02/2003 12:40:32 PM PST by dwollmann
[ Post Reply | Private Reply | To 24 | View Replies]

To: ThinkPlease
Or you can download the Red Hat patches, which came out about 12 hours after release of the issue.

So was this the last and only remaining security hole in Linux?

Yes or No?

52 posted on 12/02/2003 12:46:19 PM PST by js1138
[ Post Reply | Private Reply | To 32 | View Replies]

To: Liberal Classic
Good investigative work. Looks like their intrusion detection software may have helped alert them of the problem, unfortunately not many have that level of protection so you have to wonder who or what else might have already been hacked, or if other co-ordinated attacks took place elsewhere simultaneously.

You never can overestimate hackers, who they are and what their intentions are.
53 posted on 12/02/2003 12:50:21 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 49 | View Replies]

To: dwollmann
mi2g, the source of this "study" has no credibility, more here, and here.

Yet more evidence that the OSS community has a lot of growing up to do. Don't bother to adddress the complaints: Shoot the messenger.
54 posted on 12/02/2003 12:51:44 PM PST by Bush2000
[ Post Reply | Private Reply | To 51 | View Replies]

To: Bush2000
They [The Open Source community -LC] can't merely coexist with the Windows community. They have a rabid need to constantly tear it down.

There are some extremists, sure. I make no apologies for Stallman and personally think he's an ass, but it is wrong to paint everybody as a Stallman.

And I'm merely providing much-needed balance.

You forgot the smiley on that. :)

55 posted on 12/02/2003 1:01:09 PM PST by Liberal Classic (No better friend, no worse enemy.)
[ Post Reply | Private Reply | To 44 | View Replies]

To: Golden Eagle
Also they're servers started going "oops" or having kernel panics, which was unusual. They shouldn't be waiting for system problems, but then again we don't live in a perfect world. Something tells me they will be examining their tripwide emails more regularly from now on.
56 posted on 12/02/2003 1:05:40 PM PST by Liberal Classic (No better friend, no worse enemy.)
[ Post Reply | Private Reply | To 53 | View Replies]

To: dwollmann
Maybe, but that first link of yours is to attrition.org, one of the most well known hacker hangouts in existence, I would STRONGLY recommend freepers not surf there.

But for those that are willing, here is a sample of what they will find, such as this commentary peice entitled "The Bush News Network" posted as 'news':

http://www.attrition.org/news/
57 posted on 12/02/2003 1:09:45 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 51 | View Replies]

To: Bush2000
If you can't compile, you should learn how before you use Linux. It's not really that hard, certainly not any more difficult than making MS OE secure from worms.
58 posted on 12/02/2003 1:49:07 PM PST by krinklyfig
[ Post Reply | Private Reply | To 15 | View Replies]

To: Golden Eagle
For the record, there is no fear of linux by the well established.

Forgive me if I take that with a grain of salt, considering pretty much your entire career here at FR has been as an anti-Linux advocate.

I'm not even a 'Linux' type. I'm a Java developer, I'm OS agnostic. I like linux for dev use and servers only.

But your high-publicity campaign against Linux here just *screams* fear. As do the 'ankle-biting' responses of those taking glee at a minor slip by a relatively highly secure OS.

59 posted on 12/02/2003 1:52:11 PM PST by Dominic Harr
[ Post Reply | Private Reply | To 40 | View Replies]

To: krinklyfig
If you can't compile, you should learn how before you use Linux. It's not really that hard, certainly not any more difficult than making MS OE secure from worms.

Ah. The OS for the rest of us.

60 posted on 12/02/2003 1:53:24 PM PST by js1138
[ Post Reply | Private Reply | To 58 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 141-147 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson