Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Software flaw threatens Linux servers
C|Net ^ | November 28, 2001, 1:50 p.m. PT | Robert Lemos

Posted on 11/28/2001 1:28:10 PM PST by Don Joe

Software flaw threatens Linux servers
By Robert Lemos
Staff Writer, CNET News.com
November 28, 2001, 1:50 p.m. PT

A vulnerability in the most widely used FTP server program for Linux has left numerous sites open to online attackers, a situation worsened when Red Hat mistakenly released information on the flaw early, leaving other Linux companies scrambling to get a fix out.

"Other vendors didn't have a patch," said Alfred Huger, vice president of engineering for network security information provider SecurityFocus. The company has been working with vendors to fix the vulnerability after computer security company Core Security Technologies alerted them to the problem Nov. 14.

"The fix is not rocket science," Huger said. "But we weren't working at a breakneck pace to get a patch out, because everyone was working together."

The software flaw affects all versions of wu-FTP, a program originally created at Washington University at St. Louis for servers running FTP (file transfer protocol) functions for transferring files over the Internet.

While the exact number of active FTP servers on the Internet is not known, the software is the most commonly installed file server and accompanies most major Linux distributions, including those from Red Hat, SuSE, Caldera International, Turbolinux, Connectiva, Cobalt Networks, MandrakeSoft and Wirex.

The problem, known in security circles as the wu-FTP Globbing Heap Corruption Vulnerability, allows attackers to get remote access to all files on a server, provided they can access the FTP service. Since most such servers provide anonymous access to anyone on the Internet, a great number will be vulnerable.

Huger called the flaw "serious."

The impact of the software vulnerability was exacerbated because many Linux software companies were caught flat-footed by a surprise early release of information regarding the vulnerability.

While the group that discovered the flaw, Core ST, informed Linux software companies and the open-source group that manages development for wu-FTP of the flaw, Red Hat mistakenly released a security advisory to its customers on Tuesday.

Normally, an advisory is a good thing, but other Linux software sellers had expected any advisories to be published Dec. 3, giving them time to work on fixes. Instead, the surprise announcement left the customers of other companies' products vulnerable.

"We were releasing some advisories on the same day, and an overzealous administrator pushed this out as well," said Mark Cox, senior engineering director for Red Hat. The company is adding new safeguards to its publishing system to avoid similar problems in the future, he said.

"We put a stop to this," Cox said. "This will not happen again. It was a bad mistake."


TOPICS: Culture/Society; Front Page News; News/Current Events
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-20 ... 281-300301-320321-340341-354 next last
To: Blade
Ho hum. You quote your experts, I’ll quote mine.

Oh, I see your point... let's trivialize one of the largest IT research firm in the world.

301 posted on 11/30/2001 8:01:02 AM PST by oc-flyfish
[ Post Reply | Private Reply | To 274 | View Replies]

To: supercat
In a very real sense, the real security "problem" with Windows is simply that it's become so popular

I agree with you.

302 posted on 11/30/2001 8:06:24 AM PST by oc-flyfish
[ Post Reply | Private Reply | To 279 | View Replies]

To: ShadowAce
The OS is a tool--not a religious/fanatical experience.

I agree 100%. Unfortunately not everyone understands that... hence the OS Holy Wars that erupt every now and then.

303 posted on 11/30/2001 8:19:41 AM PST by oc-flyfish
[ Post Reply | Private Reply | To 298 | View Replies]

To: oc-flyfish
Unfortunately I won't be able to respond to this thread as I am leaving in a little while for a weekend camping trip with the Boy Scouts. Hope everyone has a great weekend.
304 posted on 11/30/2001 9:55:10 AM PST by oc-flyfish
[ Post Reply | Private Reply | To 303 | View Replies]

To: Justa
"I can't fathom how a trojan could copy an operating system driver file into a BIOS, and still have a bootable computer, let alone one that boots, and runs the driver too!"

"Why, flashing bios is nothing difficult for a virus. I don't see the difficulty in flashing an additional controller driver into bios."

Neither do I. I do see a problem with the BIOS booting after you put the bullet in its head. (See my DTK adventure for reference.)

I've heard of badware trashing CMOS. I've never heard of badware installing drivers into it, let alone doing so and retaining the ability to boot (let alone adding badware code to the BIOS too, so that it could install the driver onto a hard drive!).

On a suspect 440BX-2 motherboard I put in a blank HD that had been stored for 11 months then loaded DOS 6.22, then Windows 3.1. In both installs I found two comm.drv files of differing sizes and dates. 3.1's install was buggy so I went to '98. When I upgraded to '98 I had dual instances from kernal32 and the OS installed the hardware twice. Once on one boot, then again on a second boot. Both the comm.drv's were in '98 as well. At the second boot the CPU usage would spike to almost 100%. It was rather straight-forward. In '98 I checked the properties of the newer driver and it identified itself as the "NT5" version. This occured via a blank HD and write-protected archive media that hadn't been used in years. In any event to be sure about what I'd found I isolated the worm to a CDR and after cleaning the network chose a machine to recreate the problem. I infected and cleaned it 3 times to be sure of the infection course and how to clean it. Trend, Symmantic, AVG, and McAffee all reported the sytstem was 'clean' when it was infected with the driver and/or the virtual root trojan. The fix was a bit drastic but it worked: 1) write 0s to the drive, power off, remove the HD. 2) Flash the bios, power off and remove the CMOS battery for a min. 3) Reconnect, reinstall. That's the only thing I found which worked. If I just zeroed the HD it would load up with the NT5 comm.drv sending calls to the OS, ergo it was in bios. You do know the NT5 comm.drv is a network comm.drv? I had no intention of that owning my NT4 machines.

Now that you've described it, it seems fairly obvious that the badware took over some area of the hard drive that was normally invisble (i.e., blocks of "bad" sectors, a micro-partition, etc.), and stored it's crapload there. When you flashed your BIOS, you probably cleared out the drive table which was probably modified by the badware to hide an area on the hard drive.

BTW, why was your BIOS left in writeable condition? Don't most motherboards come with the jumper defaulted to the R/O position?

305 posted on 11/30/2001 10:40:56 AM PST by Don Joe
[ Post Reply | Private Reply | To 296 | View Replies]

To: Blade
"You are very eloquent. So was Bill Clinton."

You are very arrogant. So was Bill Clinton.

Why do you insist on playing the pointless-points game?

306 posted on 11/30/2001 10:45:09 AM PST by Don Joe
[ Post Reply | Private Reply | To 297 | View Replies]

To: ShadowAce
"The OS is a tool--not a religious/fanatical experience."

Wow, that's quite the epiphany!

Does this mean that Hizbollinux will be calling off the Jihad any time soon?

307 posted on 11/30/2001 10:46:30 AM PST by Don Joe
[ Post Reply | Private Reply | To 298 | View Replies]

To: oc-flyfish
"In a very real sense, the real security 'problem' with Windows is simply that it's become so popular"

"I agree with you."

It's an immutable law of nature. When the rabbit population skyrockets, so does the coyote population. When cities outlaw the right to carry a pistol, armed robberies skyrocket. The prey-predator relationship is carved into the fabric of creation. The idea that the proliferation of a standard OS would not result in it being targetted by predators is absurd.

308 posted on 11/30/2001 10:56:29 AM PST by Don Joe
[ Post Reply | Private Reply | To 302 | View Replies]

To: Bush2000
As long as wu-FTP is distributed with some of the major Linux distros (Redhat, etc), from a customer perspective, it is a Linux problem, regardless of anyone's attempts to "qualify the problem space." By the same token, customers consider IIS bugs to be Windows problems, not IIS problems. That's because the primary installation vehicle is Windows.

Let's say some program Microsoft wrote had a security problem, and the software ran on Windows and Macintosh. Would you blame the Macintosh or Windows operating system? No, it's a software bug.

What you are saying is because it comes with Linux, then it appears to a novice that it's a Linux problem? Sure, the same goes for Windows when someone gets a Word virus, it seems like a Windows problem.

You, however, claim to be knowledgable about computers. You know that a security problem with ICQ or IIS is not, stricly speaking a problem with the operating system. Surely you see that a buffer overflow vunderability in WU-FTP is not a Linux problem.

309 posted on 11/30/2001 11:01:11 AM PST by Liberal Classic
[ Post Reply | Private Reply | To 283 | View Replies]

To: Don Joe
Does this mean that Hizbollinux will be calling off the Jihad any time soon?

It would be nice if you were to tone down your posts, too.

310 posted on 11/30/2001 11:02:31 AM PST by Liberal Classic
[ Post Reply | Private Reply | To 307 | View Replies]

To: Don Joe
I agree with this. It has worked to Linux's disadvantage also.
311 posted on 11/30/2001 11:05:26 AM PST by Liberal Classic
[ Post Reply | Private Reply | To 308 | View Replies]

To: Liberal Classic
"It would be nice if you were to tone down your posts, too."

I'm not the type to quietly take a beating without making it at least equally costly to the initiator.

312 posted on 11/30/2001 11:20:30 AM PST by Don Joe
[ Post Reply | Private Reply | To 310 | View Replies]

To: Don Joe
Wow. You are one brazen SOB.

You mean pointless point scoring like this?

Don Joe to Blade:

Don't forget to take your Dramamine!

Are you related to Casey Stengle?

Yup, it's Binary Blade, the Sailor! (Sung to the tune of Barnacle Bill...)

BTW, you forgot the part about shooting the kid.

Barnacle, I'm afraid you Just Don't Get It. But don't feel bad.

The syndrome is common to the Eunichs community. Perhaps hormone injections might help? :)

Don Joe, you're a joke. Style over substance, just like Bill.

313 posted on 11/30/2001 11:20:41 AM PST by Blade
[ Post Reply | Private Reply | To 306 | View Replies]

To: Blade
"Wow. You are one brazen SOB."

Coming from you, that's quite the compliment.

IOW, dig yerself, man.

314 posted on 11/30/2001 11:22:24 AM PST by Don Joe
[ Post Reply | Private Reply | To 313 | View Replies]

To: innocentbystander; Bush2000; oc-flyfish
Hey, get a load of this "Blade" character. He rides in here, acting out his alias, and then whines foul when he meets a ration of his own medicine.

Are all the u-weenies such pathetic can-dish-it-out/can't-take-it lusers?

315 posted on 11/30/2001 11:26:45 AM PST by Don Joe
[ Post Reply | Private Reply | To 313 | View Replies]

To: Don Joe
I'm not the type to quietly take a beating without making it at least equally costly to the initiator.

My granddaddy used to say if you wrestle a pig, all you do is get dirty and make the pig happy. Want to participate in Unix vs. Windows flame wars? Go read comp.os.linux.advocacy. You don't win arguments by stooping to your adversary's level.

316 posted on 11/30/2001 11:30:25 AM PST by Liberal Classic
[ Post Reply | Private Reply | To 312 | View Replies]

To: Bush2000
Look, either open source works -- or it doesn't. If you guys can't fix these problems, maybe you should pay somebody to do it for

Well, we pay MS through the nose, and Outlook is still dripping with security bugs.

I will admit it is a gotcha, but whereas this is a leak, MS is a sieve.
317 posted on 11/30/2001 11:30:48 AM PST by Frumious Bandersnatch
[ Post Reply | Private Reply | To 29 | View Replies]

To: Don Joe
World Governments Choosing Linux for National Security
318 posted on 11/30/2001 11:30:58 AM PST by callisto
[ Post Reply | Private Reply | To 1 | View Replies]

To: B Knotts
wu-ftpd is part of the RedHat Linux operating system...

It would be more accurate to say that it is part of the RedHat distribution.  It is definately not part of the operating system.
319 posted on 11/30/2001 11:33:03 AM PST by Frumious Bandersnatch
[ Post Reply | Private Reply | To 34 | View Replies]

To: Liberal Classic
Why don't you lead by example? Or are you just baiting me?
320 posted on 11/30/2001 11:38:21 AM PST by Don Joe
[ Post Reply | Private Reply | To 316 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 281-300301-320321-340341-354 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson