Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Security flaw hits Windows, Mac, Linux
ZDNet ^ | August 7, 2002, 6:03 AM PT | Matthew Broersma

Posted on 08/07/2002 10:51:51 AM PDT by HAL9000

Security researchers have warned of a flaw in communications software that could allow attackers to take over computers running Windows, Unix-based operating systems and Mac OS X, as well as Kerberos authentication systems.

The problem is widespread because it affects some implementations of XDR (external data representation) libraries, used by many applications as a way of sending data from one system process to another, regardless of the system's architecture. The affected libraries are derived from Sun Microsystems' SunRPC remote procedure call technology, which has been taken up by many vendors.

The Computer Emergency Response Team (CERT), a security network based at Carnegie Mellon University, warned on Tuesday that systems using the affected code should immediately apply patches or disable the affected services.

A function in Sun's XDR library contains an integer overflow that can lead to buffer overflows, according to CERT security researchers Jeffrey Havrilla and Cory Cohen. These buffer overflows can allow an attacker to crash the system, execute malicious code or steal sensitive information, Havrilla and Cohen said.

The problem also affects the administration system of Kerberos 5, a widely-used authentication tool, which could allow attackers to gain control of Kerberos Key Distribution Center authentication functions. This could allow an attacker to gain false authentication with other services. Kerberos is included in Windows 2000.

The MIT Kerberos development team issued a warning and patch on its Web site.

Apple Computer confirmed that its Mac OS X operating system contains the vulnerability, which has been fixed through a recent security update, available through the software's automatic update mechanism.

Several vendors of Unix and Unix-like operating systems, including Red Hat, Debian, FreeBSD, Sun and NetBSD said that their software was affected by the issue, and issued fixes. HP said it was investigating the bug's impact.

Microsoft said it is still investigating how Windows is affected by the problem.

The relevant patches are available from the companies' Web sites, or through the CERT advisory on its Web site.



TOPICS: Technical
KEYWORDS: kerberos; linux; macosx; macuserlist; microsoft; rpc; security; techindex; unix; windows
Navigation: use the links below to view more comments.
first 1-2021-24 next last
Since the vulnerability affects several systems, it is a good test case to determine which companies have the best response time to security issues.
1 posted on 08/07/2002 10:51:51 AM PDT by HAL9000
[ Post Reply | Private Reply | View Replies]

To: HAL9000
Surprise surprise. Everyone except for Microsoft and HP have a patch ready to go, while MS and HP are stalling for time, as per their MO.

Sheesh...
2 posted on 08/07/2002 10:54:23 AM PDT by WyldKard
[ Post Reply | Private Reply | To 1 | View Replies]

To: WyldKard
And for those of us that have OS X, the security update is a done deal and automatic.
3 posted on 08/07/2002 10:58:34 AM PDT by SeaDragon
[ Post Reply | Private Reply | To 2 | View Replies]

To: *tech_index; *Macuser_list; *Microsoft
Index Bump
4 posted on 08/07/2002 11:39:44 AM PDT by Free the USA
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
Have Sun's RPC's ever been considered safe?
5 posted on 08/07/2002 11:49:42 AM PDT by general_re
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeaDragon
And for those of us that have OS X, the security update is a done deal and automatic.

Yea, we go that patch last friday. Windows' users can just eat cake while hackers have a field day on their CPUs.

So happy I am not trusting my systems to Bill Gates.

6 posted on 08/07/2002 12:13:21 PM PDT by toupsie
[ Post Reply | Private Reply | To 3 | View Replies]

To: rdb3
one for the penguin ping...
7 posted on 08/07/2002 12:21:21 PM PDT by jae471
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeaDragon
Yep. Just got it night before last.

Wondered what that was all about...
8 posted on 08/07/2002 12:25:59 PM PDT by Mr. Thorne
[ Post Reply | Private Reply | To 3 | View Replies]

To: toupsie
So happy I am not trusting my systems to Bill Gates.

Isn't that the truth? I did, for many years, but no more.

9 posted on 08/07/2002 1:00:06 PM PDT by SeaDragon
[ Post Reply | Private Reply | To 6 | View Replies]

To: general_re
Heck no. Or was that a rhetorical question?
10 posted on 08/07/2002 1:46:41 PM PDT by TechJunkYard
[ Post Reply | Private Reply | To 5 | View Replies]

To: HAL9000
Bump.
11 posted on 08/07/2002 1:50:32 PM PDT by First_Salute
[ Post Reply | Private Reply | To 1 | View Replies]

To: B Knotts; stainlessbanner; TechJunkYard; ShadowAce; Knitebane; AppyPappy; jae471; A. Morgan; ...
The Penguin Ping. Want on or off? Just holla!

Got root?


12 posted on 08/07/2002 2:18:23 PM PDT by rdb3
[ Post Reply | Private Reply | To 7 | View Replies]

To: general_re
Have Sun's RPC's ever been considered safe?

Not by me. :-P

13 posted on 08/07/2002 2:27:28 PM PDT by B Knotts
[ Post Reply | Private Reply | To 5 | View Replies]

To: toupsie
Yea, we go that patch last friday. Windows' users can just eat cake while hackers have a field day on their CPUs.

Tell us, Brainiac, how Windows is affected.
14 posted on 08/07/2002 2:42:35 PM PDT by Bush2000
[ Post Reply | Private Reply | To 6 | View Replies]

To: Bush2000
The problem also affects the administration system of Kerberos 5, a widely-used authentication tool, which could allow attackers to gain control of Kerberos Key Distribution Center authentication functions. This could allow an attacker to gain false authentication with other services. Kerberos is included in Windows 2000.
15 posted on 08/07/2002 2:47:21 PM PDT by Campion
[ Post Reply | Private Reply | To 14 | View Replies]

To: general_re; B Knotts
RPC - I see 73 vulnerability notes on it mentioned on CERT.

Hasn't anyone read the disclaimer? </sarcasm>

People have too high expectations about this overused old code.

Here is an interestingly suggestive note from XML.com for example:

I.e., you are on your own.
16 posted on 08/07/2002 3:36:51 PM PDT by flamefront
[ Post Reply | Private Reply | To 5 | View Replies]

To: SeaDragon
And for those of us who stuck with 9.x just won't worry about anything.
17 posted on 08/07/2002 5:25:28 PM PDT by Tribune7
[ Post Reply | Private Reply | To 3 | View Replies]

To: Campion
The problem also affects the administration system of Kerberos 5, a widely-used authentication tool, which could allow attackers to gain control of Kerberos Key Distribution Center authentication functions. This could allow an attacker to gain false authentication with other services. Kerberos is included in Windows 2000.

Sorry, dude: Windows 2000 Kerberos code isn't derived from Sun's libraries. Try again.
18 posted on 08/07/2002 6:45:10 PM PDT by Bush2000
[ Post Reply | Private Reply | To 15 | View Replies]

To: Tribune7
And for those of us who stuck with 9.x just won't worry about anything.

This is true also. I am a recent convert so I never worked in 9.x. I started out in OS X so that is where I am. I left Windows and never looked backed.

19 posted on 08/07/2002 9:11:47 PM PDT by SeaDragon
[ Post Reply | Private Reply | To 17 | View Replies]

To: Bush2000
From the article: Microsoft said it is still investigating how Windows is affected by the problem.

What do they know that you don't know? Their track record is the same as yours: defend their crappy product at all costs and with any methods, including telling bald-faced lies.

But in this case, even the Gates propaganda machine won't claim victory without a thorough investigation. Yet here you are, as usual defending their crappy product right from the get go.

Now I've seen everything.. your mindless zealotry exceeds even theirs!

20 posted on 08/08/2002 1:30:08 AM PDT by HalfIrish
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson