Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

CERT: Security flaw in Sun library could affect Kerberos
ComputerWorld.com ^ | Sam Costello

Posted on 08/07/2002 3:16:45 PM PDT by oc-flyfish

A security hole in the XDR Library provided to a number of vendors by Sun Microsystems Inc. could allow an attacker to execute arbitrary code on an affected system or cause a denial of service, according to an advisory from the CERT Coordination Center (CERT/CC).
The flaw also affects the widely used Kerberos authentication software that allows users to securely log on to remote systems.

The vulnerability exists in XDR (External Data Representation) libraries derived from SunRPC (remote procedure call) used in products from Sun, as well as from Apple Computer Inc., IBM and a number of Linux and Unix distributions, CERT/CC said yesterday. These products include those that use the Sun network service library (libnsl), the BSD-derived XDR/RPC routines (libc) and the GNU C library with sunrpc (glibc), CERT/CC said.

The XDR Library is a method of sending processes from one system to another, usually over a network connection, without regard to platform, CERT/CC said.

The security hole comes in the xdr_array component of the XDR Library, where an integer overflow problem could lead to a buffer overflow. Were an attacker to exploit these vulnerabilities, he would be able to run code of his choice on the target system, CERT/CC said.

Due to the number of systems that the XDR Library is included in, attacks can cause other problems, including denials of service and information disclosure, CERT/CC said. Also potentially troublesome is the effect of the flaw on Kerberos, which could allow an attacker to gain access to a trusted Kerberos realm.

Affected software includes Apple's Mac OS X and Mac OS X Server, Debian Linux 3, IBM's AIX 4.3.3 and 5.1.0, the Kerberos software developed by MIT and Sun's Solaris 2.5.1 through 9.

Users should contact their vendors to inquire about patch status. CERT/CC has posted a more complete list of affected vendors and products, as well as their patch status, in its advisory.

 


TOPICS: News/Current Events; Technical
KEYWORDS: apple; cert; exploit; flaw; linux; security; sun; unix
Ouch this appears to be a nasty one for those using Linux, Unix, and Macs.
1 posted on 08/07/2002 3:16:45 PM PDT by oc-flyfish
[ Post Reply | Private Reply | View Replies]

To: Bush2000; Ernest_at_the_Beach; B Knotts; Dominic Harr
Watch out ping.
2 posted on 08/07/2002 3:18:50 PM PDT by oc-flyfish
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re; Stentor; milestogo; jimkress; zeromus; HalfIrish; discostu; Looking for Diogenes; ...
FYI ping.
3 posted on 08/07/2002 3:23:14 PM PDT by oc-flyfish
[ Post Reply | Private Reply | To 2 | View Replies]

To: oc-flyfish
I am just waiting for the Mac lovers to say:

"Glad I have a Mac... oh, er... this one effects Macs? How is that possible?"

4 posted on 08/07/2002 3:24:39 PM PDT by oc-flyfish
[ Post Reply | Private Reply | To 3 | View Replies]

To: oc-flyfish
Ouch this appears to be a nasty one for those using Linux, Unix, and Macs.

Click here, please.

5 posted on 08/07/2002 3:31:37 PM PDT by rdb3
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3
Whoops, didn't see it was already posted...

BTW, your profile page gives me a chuckle every time I see it.

6 posted on 08/07/2002 3:43:52 PM PDT by oc-flyfish
[ Post Reply | Private Reply | To 5 | View Replies]

To: oc-flyfish
I'm shocked, shocked, shocked!!!
7 posted on 08/07/2002 6:43:40 PM PDT by Bush2000
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
As am I... I was all ready to buy a Mac since they *never* have issues. Damn... guess I will have to stay with my PC instead.
8 posted on 08/07/2002 7:42:38 PM PDT by oc-flyfish
[ Post Reply | Private Reply | To 7 | View Replies]

To: oc-flyfish
Kerberos is used by Windows 2000/XP servers and workstation for log-in. If Kerberos is attacked then you are not safe with windows machines either.
9 posted on 08/07/2002 7:51:03 PM PDT by BushCountry
[ Post Reply | Private Reply | To 8 | View Replies]

To: BushCountry
Kerberos is used by Windows 2000/XP servers and workstation for log-in. If Kerberos is attacked then you are not safe with windows machines either.

You do understand that Kerberos is a specification for a security protocol, right? There are different implementations. There is no evidence yet Microsoft used Sun's libraries; therefore, your assertion is bogus.
10 posted on 08/07/2002 8:04:42 PM PDT by Bush2000
[ Post Reply | Private Reply | To 9 | View Replies]

To: Bush2000
The Windows platform security weaknesses are world reknowned (a child can hacked most Windows 2000 servers with a few tricks). I was just pointing out that if Kerberos is unsecure for Linux than it is most likely the same story for the Windows Platform.

Want to beat all NTFS permissions on a machine, just boot the system with NTFSDOS (child play). Want to log on to a remote server as administrator without a password use a win98 machine, the server will send you the password automatically assuming you are the administrator. 300 passwords will get you in 35% of the servers. The list of things to do goes on, and on...

Sure it is the Administrator's fault that the security is so weak, but by default Windows 2000 Servers have no security, and actually take a hell of a lot of work to make them secure.

11 posted on 08/19/2002 7:40:24 PM PDT by BushCountry
[ Post Reply | Private Reply | To 10 | View Replies]

To: BushCountry
I was just pointing out that if Kerberos is unsecure for Linux than it is most likely the same story for the Windows Platform.

Non-sequitor: Does not follow.

Want to beat all NTFS permissions on a machine, just boot the system with NTFSDOS (child play). Want to log on to a remote server as administrator without a password use a win98 machine, the server will send you the password automatically assuming you are the administrator. 300 passwords will get you in 35% of the servers. The list of things to do goes on, and on...

Try doing any of that on my network. Oh, right ... you'd need physical access to my network. Sorry, you lose.

Sure it is the Administrator's fault that the security is so weak, but by default Windows 2000 Servers have no security, and actually take a hell of a lot of work to make them secure.

Here, I agree. It does take extra work. MS made the wrong choice in choosing ease-of-use and interoperability over security. That's changed with .NET Server. Nearly everything is turned OFF by default and you have to specifically enable anything to get it turned on.
12 posted on 08/20/2002 1:50:02 PM PDT by Bush2000
[ Post Reply | Private Reply | To 11 | View Replies]

To: oc-flyfish
Your ridiculous strawman aside, Apple had a fix for this very soon after it was revealed. Has Microsoft even issued a statement yet?
13 posted on 08/20/2002 1:53:55 PM PDT by ThinkDifferent
[ Post Reply | Private Reply | To 4 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson