Skip to comments.
Security flaw hits Windows, Mac, Linux
ZDNet ^
| August 7, 2002, 6:03 AM PT
| Matthew Broersma
Posted on 08/07/2002 10:51:51 AM PDT by HAL9000
Security researchers have warned of a flaw in communications software that could allow attackers to take over computers running Windows, Unix-based operating systems and Mac OS X, as well as Kerberos authentication systems. The problem is widespread because it affects some implementations of XDR (external data representation) libraries, used by many applications as a way of sending data from one system process to another, regardless of the system's architecture. The affected libraries are derived from Sun Microsystems' SunRPC remote procedure call technology, which has been taken up by many vendors.
The Computer Emergency Response Team (CERT), a security network based at Carnegie Mellon University, warned on Tuesday that systems using the affected code should immediately apply patches or disable the affected services.
A function in Sun's XDR library contains an integer overflow that can lead to buffer overflows, according to CERT security researchers Jeffrey Havrilla and Cory Cohen. These buffer overflows can allow an attacker to crash the system, execute malicious code or steal sensitive information, Havrilla and Cohen said.
The problem also affects the administration system of Kerberos 5, a widely-used authentication tool, which could allow attackers to gain control of Kerberos Key Distribution Center authentication functions. This could allow an attacker to gain false authentication with other services. Kerberos is included in Windows 2000.
The MIT Kerberos development team issued a warning and patch on its Web site.
Apple Computer confirmed that its Mac OS X operating system contains the vulnerability, which has been fixed through a recent security update, available through the software's automatic update mechanism.
Several vendors of Unix and Unix-like operating systems, including Red Hat, Debian, FreeBSD, Sun and NetBSD said that their software was affected by the issue, and issued fixes. HP said it was investigating the bug's impact.
Microsoft said it is still investigating how Windows is affected by the problem.
The relevant patches are available from the companies' Web sites, or through the CERT advisory on its Web site.
TOPICS: Technical
KEYWORDS: kerberos; linux; macosx; macuserlist; microsoft; rpc; security; techindex; unix; windows
Navigation: use the links below to view more comments.
first 1-20, 21-24 next last
Since the vulnerability affects several systems, it is a good test case to determine which companies have the best response time to security issues.
1
posted on
08/07/2002 10:51:51 AM PDT
by
HAL9000
To: HAL9000
Surprise surprise. Everyone except for Microsoft and HP have a patch ready to go, while MS and HP are stalling for time, as per their MO.
Sheesh...
2
posted on
08/07/2002 10:54:23 AM PDT
by
WyldKard
To: WyldKard
And for those of us that have OS X, the security update is a done deal and automatic.
3
posted on
08/07/2002 10:58:34 AM PDT
by
SeaDragon
To: *tech_index; *Macuser_list; *Microsoft
To: HAL9000
Have Sun's RPC's ever been considered safe?
To: SeaDragon
And for those of us that have OS X, the security update is a done deal and automatic. Yea, we go that patch last friday. Windows' users can just eat cake while hackers have a field day on their CPUs.
So happy I am not trusting my systems to Bill Gates.
6
posted on
08/07/2002 12:13:21 PM PDT
by
toupsie
To: rdb3
one for the penguin ping...
7
posted on
08/07/2002 12:21:21 PM PDT
by
jae471
To: SeaDragon
Yep. Just got it night before last.
Wondered what that was all about...
To: toupsie
So happy I am not trusting my systems to Bill Gates.Isn't that the truth? I did, for many years, but no more.
9
posted on
08/07/2002 1:00:06 PM PDT
by
SeaDragon
To: general_re
Heck no. Or was that a rhetorical question?
To: HAL9000
Bump.
To: B Knotts; stainlessbanner; TechJunkYard; ShadowAce; Knitebane; AppyPappy; jae471; A. Morgan; ...
The Penguin Ping. Want on or off? Just holla!
Got root?
12
posted on
08/07/2002 2:18:23 PM PDT
by
rdb3
To: general_re
Have Sun's RPC's ever been considered safe? Not by me. :-P
13
posted on
08/07/2002 2:27:28 PM PDT
by
B Knotts
To: toupsie
Yea, we go that patch last friday. Windows' users can just eat cake while hackers have a field day on their CPUs.
Tell us, Brainiac, how Windows is affected.
14
posted on
08/07/2002 2:42:35 PM PDT
by
Bush2000
To: Bush2000
The problem also affects the administration system of Kerberos 5, a widely-used authentication tool, which could allow attackers to gain control of Kerberos Key Distribution Center authentication functions. This could allow an attacker to gain false authentication with other services. Kerberos is included in Windows 2000.
15
posted on
08/07/2002 2:47:21 PM PDT
by
Campion
To: general_re; B Knotts
RPC - I see 73 vulnerability notes on it mentioned on
CERT.
Hasn't anyone read the disclaimer? </sarcasm>
People have too high expectations about this overused old code.
Here is an interestingly suggestive note from XML.com for example:
XML-RPC provides no security provisions. This may sound like a shortcoming, but in many respects it is an advantage. Since XML-RPC does not mandate any security protocol, Zope's normal security policies work just fine with XML-RPC.
I.e., you are on your own.
To: SeaDragon
And for those of us who stuck with 9.x just won't worry about anything.
17
posted on
08/07/2002 5:25:28 PM PDT
by
Tribune7
To: Campion
The problem also affects the administration system of Kerberos 5, a widely-used authentication tool, which could allow attackers to gain control of Kerberos Key Distribution Center authentication functions. This could allow an attacker to gain false authentication with other services. Kerberos is included in Windows 2000.
Sorry, dude: Windows 2000 Kerberos code isn't derived from Sun's libraries. Try again.
18
posted on
08/07/2002 6:45:10 PM PDT
by
Bush2000
To: Tribune7
And for those of us who stuck with 9.x just won't worry about anything. This is true also. I am a recent convert so I never worked in 9.x. I started out in OS X so that is where I am. I left Windows and never looked backed.
To: Bush2000
From the article:
Microsoft said it is still investigating how Windows is affected by the problem. What do they know that you don't know? Their track record is the same as yours: defend their crappy product at all costs and with any methods, including telling bald-faced lies.
But in this case, even the Gates propaganda machine won't claim victory without a thorough investigation. Yet here you are, as usual defending their crappy product right from the get go.
Now I've seen everything.. your mindless zealotry exceeds even theirs!
Navigation: use the links below to view more comments.
first 1-20, 21-24 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson