Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Software flaw threatens Linux servers
C|Net ^ | November 28, 2001, 1:50 p.m. PT | Robert Lemos

Posted on 11/28/2001 1:28:10 PM PST by Don Joe

Software flaw threatens Linux servers
By Robert Lemos
Staff Writer, CNET News.com
November 28, 2001, 1:50 p.m. PT

A vulnerability in the most widely used FTP server program for Linux has left numerous sites open to online attackers, a situation worsened when Red Hat mistakenly released information on the flaw early, leaving other Linux companies scrambling to get a fix out.

"Other vendors didn't have a patch," said Alfred Huger, vice president of engineering for network security information provider SecurityFocus. The company has been working with vendors to fix the vulnerability after computer security company Core Security Technologies alerted them to the problem Nov. 14.

"The fix is not rocket science," Huger said. "But we weren't working at a breakneck pace to get a patch out, because everyone was working together."

The software flaw affects all versions of wu-FTP, a program originally created at Washington University at St. Louis for servers running FTP (file transfer protocol) functions for transferring files over the Internet.

While the exact number of active FTP servers on the Internet is not known, the software is the most commonly installed file server and accompanies most major Linux distributions, including those from Red Hat, SuSE, Caldera International, Turbolinux, Connectiva, Cobalt Networks, MandrakeSoft and Wirex.

The problem, known in security circles as the wu-FTP Globbing Heap Corruption Vulnerability, allows attackers to get remote access to all files on a server, provided they can access the FTP service. Since most such servers provide anonymous access to anyone on the Internet, a great number will be vulnerable.

Huger called the flaw "serious."

The impact of the software vulnerability was exacerbated because many Linux software companies were caught flat-footed by a surprise early release of information regarding the vulnerability.

While the group that discovered the flaw, Core ST, informed Linux software companies and the open-source group that manages development for wu-FTP of the flaw, Red Hat mistakenly released a security advisory to its customers on Tuesday.

Normally, an advisory is a good thing, but other Linux software sellers had expected any advisories to be published Dec. 3, giving them time to work on fixes. Instead, the surprise announcement left the customers of other companies' products vulnerable.

"We were releasing some advisories on the same day, and an overzealous administrator pushed this out as well," said Mark Cox, senior engineering director for Red Hat. The company is adding new safeguards to its publishing system to avoid similar problems in the future, he said.

"We put a stop to this," Cox said. "This will not happen again. It was a bad mistake."


TOPICS: Culture/Society; Front Page News; News/Current Events
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 341-354 next last
To: Don Joe
Actually, we still have "winner" with post number 34.
41 posted on 11/28/2001 2:10:00 PM PST by danneskjold
[ Post Reply | Private Reply | To 38 | View Replies]

To: danneskjold
What OS does this article report on?

I haven't seen the CERT advisory. It's likely the problem exists with more than just Linux. The last time WU-FTP had a buffer overflow problem, every OS the program ran on was vunderable to it. Solaris, IRIX, Linux, etc. It's possible that the problem could be limited to Intel-based unix systems FreeBSD and Linux or just Linux.

42 posted on 11/28/2001 2:10:04 PM PST by Liberal Classic
[ Post Reply | Private Reply | To 31 | View Replies]

To: Don Joe
Hey, I can still bash MS all I want.
After all there are more OS's the various Linuxs and Windows.
43 posted on 11/28/2001 2:12:24 PM PST by Mid-MI Student
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
I'll agree with that as soon as you agree that IIS bugs aren't a Windows problem.

Oh, now I remember you. Bush2000.

IIS is actually written by Microsoft. However, buffer overflow problems with IIS are not problems with the NT executive. They are a server process problem, that allows a maliscious person to hijack the software. This is not a fault of the OS.

If blame is to be laid, the fault lies 1. with the people who maintain WU-FTP and 2. RedHat for including a notoriously buggy FTP server.

44 posted on 11/28/2001 2:14:18 PM PST by Liberal Classic
[ Post Reply | Private Reply | To 30 | View Replies]

To: danneskjold
Oh, excuse me for interjecting facts into this red-herring-fest.

No one claims that Free Software is bug-free, only that it tends to have less bugs, and that they are generally fixed faster than proprietary software.

45 posted on 11/28/2001 2:15:14 PM PST by B Knotts
[ Post Reply | Private Reply | To 41 | View Replies]

To: danneskjold
"Actually, we still have 'winner' with post number 34."

The night is young. I expect this thread's floor will be littered with "winners" before sunrise, perhaps to knee or even waist depth. There's an awful lot of glory to go around, and combined with that moths+candles principle, well, heheheheheheh... :)

46 posted on 11/28/2001 2:15:36 PM PST by Don Joe
[ Post Reply | Private Reply | To 41 | View Replies]

To: Archmagus
It's second nature for Linux nuts to blame MS for all their problems.

That is the most ignorant statement I have read as of recent.

47 posted on 11/28/2001 2:15:55 PM PST by Michael Barnes
[ Post Reply | Private Reply | To 17 | View Replies]

To: Don Joe
The problem, known in security circles as the wu-FTP Globbing Heap Corruption Vulnerability, allows attackers to get remote access to all files on a server, provided they can access the FTP service. Since most such servers provide anonymous access to anyone on the Internet, a great number will be vulnerable.

What! I thought Linux was perfect and never had vulnerabilities. You mean Microsoft isn't the only that has bugs in the code. I am shocked!

48 posted on 11/28/2001 2:16:54 PM PST by oc-flyfish
[ Post Reply | Private Reply | To 1 | View Replies]

To: lelio
Well I thought wuFTP came from University of Washington here in Seattle but it is really wustl in St Louis (it also goes by "Univ of Washington"). I'm a dork.
49 posted on 11/28/2001 2:17:06 PM PST by lelio
[ Post Reply | Private Reply | To 5 | View Replies]

To: Smogger
Whenever someone tells me how "vulnerable" IIS is, I tell them to visit a couple of hacker websites and see how many Apache, Sun Solaris, and Linux webservers have been exploited. Heck, I have been hit by machines actings as robots, trying to hack me...and when I have hit them with telnet, I have been able to get information as to type of webserver...more than a few times it has been Apache web servers trying to connect to me.
50 posted on 11/28/2001 2:18:00 PM PST by stylin_geek
[ Post Reply | Private Reply | To 6 | View Replies]

To: B Knotts
No one claims that Free Software is bug-free, only that it tends to have less bugs, and that they are generally fixed faster than proprietary software.

Actually, I've seen quite a few people post here extolling the infallibility of Linux.

51 posted on 11/28/2001 2:19:07 PM PST by danneskjold
[ Post Reply | Private Reply | To 45 | View Replies]

To: stylin_geek
Whenever someone tells me how "vulnerable" IIS is, I tell them to visit a couple of hacker websites and see how many Apache, Sun Solaris, and Linux webservers have been exploited.

Oh, you mean like these, right?


66.87.26.181 - - [28/Nov/2001:15:09:37 -0800] "GET /scripts/root.exe?/c+dir HTTP/1.0" 404 290 "-" "-"
66.87.26.181 - - [28/Nov/2001:15:09:40 -0800] "GET /MSADC/root.exe?/c+dir HTTP/1.0" 404 288 "-" "-"
66.87.26.181 - - [28/Nov/2001:15:09:43 -0800] "GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 298 "-" "-"
66.87.26.181 - - [28/Nov/2001:15:09:43 -0800] "GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 298 "-" "-"
66.87.26.181 - - [28/Nov/2001:15:09:44 -0800] "GET /scripts/..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 312 "-" "-"
66.87.26.181 - - [28/Nov/2001:15:09:47 -0800] "GET /_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 329 "-" "-"
66.87.26.181 - - [28/Nov/2001:15:09:50 -0800] "GET /_mem_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 329 "-" "-"

52 posted on 11/28/2001 2:21:09 PM PST by B Knotts
[ Post Reply | Private Reply | To 50 | View Replies]

To: Liberal Classic
Hairsplitting? No. This is not a Linux problem. A previous verson of WU-FTP had the same problem on Sun and SGIs.

Ok, would you feel better if we said Unix problem? Of course Linux is a derivative of Unix...

53 posted on 11/28/2001 2:21:40 PM PST by oc-flyfish
[ Post Reply | Private Reply | To 28 | View Replies]

To: stylin_geek
Apache web servers trying to connect to me
Well considering Apache is a web SERVER and doesn't go out and get anything (beyond cookies) I can't see this happening. Can you point out a recent Apache exploit that's dangerous?
54 posted on 11/28/2001 2:22:11 PM PST by lelio
[ Post Reply | Private Reply | To 50 | View Replies]

To: oc-flyfish
No, would feel better if you said it was a wuFTP problem.
55 posted on 11/28/2001 2:23:09 PM PST by lelio
[ Post Reply | Private Reply | To 53 | View Replies]

To: Liberal Classic
the famous stack overflow problem

Yes, and these buffer overflows are the same reason why IIS gets hammered. Of course, then we hear "Microsoft makes crappy code".

56 posted on 11/28/2001 2:24:25 PM PST by oc-flyfish
[ Post Reply | Private Reply | To 37 | View Replies]

To: B Knotts
RE: Post #52

LOL, wonder if they even know what it is

God Bless America

57 posted on 11/28/2001 2:26:28 PM PST by JustAnAmerican
[ Post Reply | Private Reply | To 52 | View Replies]

To: B Knotts
66.87.26.181 - - [28/Nov/2001:15:09:37 -0800] "GET /scripts/root.exe?/c+dir HTTP/1.0" 404 290 "-" "-" 66.87.26.181 - - [28/Nov/2001:15:09:40 -0800] "GET /MSADC/root.exe?/c+dir HTTP/1.0" 404 288 "-" "-" 66.87.26.181 - - [28/Nov/2001:15:09:43 -0800] "GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 298 "-" "-" 66.87.26.181 - - [28/Nov/2001:15:09:43 -0800] "GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 298 "-" "-" 66.87.26.181 - - [28/Nov/2001:15:09:44 -0800] "GET /scripts/..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 312 "-" "-" 66.87.26.181 - - [28/Nov/2001:15:09:47 -0800] "GET /_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 329 "-" "-" 66.87.26.181 - - [28/Nov/2001:15:09:50 -0800] "GET /_mem_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 329 "-" "-"

You really should look at your logs before you post something like this. This is ONE, not multiple IIS servers mounting an attack. Check out the TCP/IP address. They are all the same.

58 posted on 11/28/2001 2:28:40 PM PST by oc-flyfish
[ Post Reply | Private Reply | To 52 | View Replies]

To: B Knotts
Hey, Knotts: "IIS isn't part of Windows. It's an add-on component." Sound familiar?
59 posted on 11/28/2001 2:29:24 PM PST by Bush2000
[ Post Reply | Private Reply | To 52 | View Replies]

To: JustAnAmerican
LOL, wonder if they even know what it is

Yup, the IIS log from an NT server 4.0 server. Multiple entries from ONE infected server that was exploited by Nimda.

60 posted on 11/28/2001 2:30:58 PM PST by oc-flyfish
[ Post Reply | Private Reply | To 57 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 341-354 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson