Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Bug

Serious IIS Hole; Minor X Bug 477

EyesWideOpen writes "Microsoft announced Wednesday that there is a serious software flaw with its IIS web server. The 'vulnerability affects a function in the server software that allows Web administrators to change passwords for an Internet site.' A researcher with eEye Digital Security discovered the flaw in mid-April but it wasn't announced publicly because of an agreement with Microsoft. The Wired article is here and this appears to be the MS bulletin describing the vulnerability in detail." And several people reported this Register story on a way to DOS Mozilla users by trying to display ludicrously large fonts. Microsoft's time to patch a remote hole where the attacker can gain complete access to your computer: two months. Open Source's time to patch a much less serious bug where the attacker can merely crash your computer: three days.
This discussion has been archived. No new comments can be posted.

Serious IIS Hole; Minor X Bug

Comments Filter:
  • by byolinux ( 535260 ) on Thursday June 13, 2002 @05:16AM (#3692304) Journal
    This is hardly a major bug IMHO... "an older, largely obsolete scripting technology - where the previous one lay in the ISAPI extension that implements ASP." "The IIS Lockdown Tool disables this functionality by default. Customers who have retained the functionality but deployed the URLScan tool as discussed in Microsoft Security Bulletin MS02-018 would likewise be protected against the vulnerability." So, it only really affects those sysadmins who don't bother to lock their server down. It's not going to be a major issue for the majority.
  • Incorrect ! (Score:5, Informative)

    by dnaumov ( 453672 ) on Thursday June 13, 2002 @05:17AM (#3692307)
    This article is incorrect. That bug is an XFRee bug and not a Mozilla bug. It's not fixed, although it's possible that it's been worked around in Mozilla. Read the text itself, I think it says:
    X-windows, with or without the font server (XFS) running can be crashed remotely via Mozilla when fonts are set to an unnaturally large size with CSS (Cascading Style Sheets), Tom Vogt of Lemuira.org has reported.

    and
    "An
    X bug allows all available memory to be consumed, which causes the system to freeze. The behavior can be duplicated with applications like the Gimp, we're told, but these aren't remotely exploitable. But with Mozilla, a pest can easily set up a malicious Web site which will crash unsuspecting Tuxers' boxen and cause any unsaved data in open apps to go away.
  • by unixmaster ( 573907 ) on Thursday June 13, 2002 @05:22AM (#3692324) Journal
    Slackware doesnt use xfs font server so that mozilla doesnt crash when viewing big ( really big ) fonts .
  • by Tim C ( 15259 ) on Thursday June 13, 2002 @05:38AM (#3692358)
    You can use the ulimit command to set an upper limit on the memory available to any process started by the shell under which it is issued.

    Just putting something like ulimit -m 200000 in your startx script should limit X's memory usage to 200meg.

    ulmit can also set upper limits on available CPU time, core file size, etc. Bash has a builtin version, so do man bash and look for ulimit for more details.
  • by RandomPeon ( 230002 ) on Thursday June 13, 2002 @05:48AM (#3692378) Journal
    The exploit asks for a font that's utterly ridiculous - a 166666667 size font, give or take a few 6's. Mozilla tries to get X to display such a font. X dutifilly attempts to draw at that size, which requires a tremendous amount of memory, eventually bringing the whole machine down. You could get the same result by putting a malloc or fork call in a while(1) loop.

    I personally think Mozilla should implement some short-term patch to prevent exploitation of this bug until it's patched in XFree, but as the register article says, the fault doesn't lie with them.

    They already did. It's obviously a trivial fix - no fonts larger than 1,000 (or whatever). I'm suprised it took that long.
  • by uglyduckling ( 103926 ) on Thursday June 13, 2002 @06:01AM (#3692413) Homepage
    If you look in the 'fonts' preferences, there's now an option for minimum font size. It's a great way to deal with ridiculously small fonts without making everything else look chubby.

    I've also found that the screen calibration thingy on the fonts preferences (select 'Other..' under 'Display Resolution') makes a big difference too.

  • by theridersofrohan ( 241712 ) on Thursday June 13, 2002 @06:10AM (#3692444) Homepage
    This is a bug in XFree86 and/or (depending on what you are using) XFS. The error doesn't happen under windows... And apparently, it can be triggered under linux by other programs as well (gimp) if you set the font size absurdly high.


    Checkout the bugzila item here [mozilla.org]


    Also, this is _not_ a DOS attack. What it does is make X consume all available memory and swap. And it can be triggered remotely by running mozilla, and browsing a webpage with absurdly large fonts. But it is by no means a DOS attack, because no-one is actively attacking you, making you "Deny Service" to other users.

  • by bshuttleworth ( 178787 ) <bradNO@SPAMdeimos.co.za> on Thursday June 13, 2002 @06:33AM (#3692494) Homepage
    The bug is a general one, related to how X deals with fonts. This can be verified by reading the Bugzilla discussion - which I won't link to from here - last thing Bugzilla needs is 100k people going "ooooooooh... a bug" and inducing a slashdot-style-DOS;) - where they verify a similar problem with Sun's X server.

    That Mozilla can made to induce this does make Mozilla a critical problem - a malicious page can cause any desktop to crash using it. That it is not the "cause" of the problem is only a matter of semantics.

    And of course, the fix is already in, specifying that fonts are no larger than twice the display height.

    Find your way to bugzilla via the Register [theregister.co.uk]
    for enlightenment ;)

  • Re:What rubbish (Score:2, Informative)

    by m0i ( 192134 ) on Thursday June 13, 2002 @06:40AM (#3692514) Homepage
    Debian doesn't even have the newest XFree86 revision in it, so where am I going to get the patch for this

    Debian backports security patches to whatever version they provide; look at their apache 1.3.9, it obviously doesn't have all the security bugs fixed up to the latest build..
  • by int0x80 ( 234172 ) <luismbo+slashdot@gmail.com> on Thursday June 13, 2002 @06:44AM (#3692517) Homepage

    For someone who was brave enough to try the crashing link supplied by the Register, does this kill the whole machine, or just X? And can you salvage things without rebooting by using either a virtual term or logging in via ssh?

    Yes, linux doesn't crash :-) You can still access through telnet/ssh. You can't switch to a virtual terminal, though.

  • Re:Status Quo (Score:4, Informative)

    by peddrenth ( 575761 ) on Thursday June 13, 2002 @06:52AM (#3692538) Homepage
    Apparently it's an X bug which can crash the GIMP and others as well -- only reason mozilla's special is that you can exploit it remotely.

    Ctl-Alt-Backspace if you get hit with it, and reboot your X-server. If you want a bit more protection, run XFS font server separately (rather than letting X handle fonts) then only the font server will crash.

    As for "time to fix", well XFree86 has been out for a while now, so presumably it was vulnerable all along.
  • Re:Flawed logic (Score:2, Informative)

    by Henry Stern ( 30869 ) <henry@stern.ca> on Thursday June 13, 2002 @07:08AM (#3692569) Homepage
    FYI: MS uses smaller teams (15-20 IIRC) of programmers.
  • read the report (Score:1, Informative)

    by Anonymous Coward on Thursday June 13, 2002 @07:18AM (#3692589)
    on trustworthy computing [trustworthycomputing.com], submitdead buy the Penguin de Linusville Institute.

    can a scruffly beard be far behind? will it help with the BiG ?pr? poosh?

  • by orkysoft ( 93727 ) <orkysoft@m y r e a l b ox.com> on Thursday June 13, 2002 @07:19AM (#3692593) Journal
    It doesn't have to do as much with C programming as it has to do with memory management implementation:

    Since we all have "virtual memory" nowadays, it is entirely possible that a malloc() call reserves pages of memory that are only physically allocated once you use them. Whether or not this happens depends on your kernel's memory manager.
  • by Craig Ringer ( 302899 ) on Thursday June 13, 2002 @07:52AM (#3692681) Homepage Journal
    It's a heap overrun. Very hard to exploit to exec custom code, all you can really do is crash the server. Not that that's a good thing... interesting to see that IIS5 auto-restarts too (so that an attacker can compromise the binary then crash the server so it re-loads?)

    MS actually _overplays_ this one in the release. For once. Too bad they claim its newly discovered.

    OTOH the moz bug is (a) not in mozilla but in X as mentioned elsewhere, (b) not really fixed, just workarounded in mozilla and (c) A TOTALLY DIFFERENT ISSUE.

    OTOH the IIS bug was an overrun and would be a 5min patch.
  • Re:Flawed logic (Score:4, Informative)

    by gotan ( 60103 ) on Thursday June 13, 2002 @08:16AM (#3692781) Homepage
    I don't believe that MS does so much testing for their patches. I heared enough about MS patches not fixing the bug/hole it's supposed to, causing new problems, or not play well with some applications (i.e. causing them to crash). How can that happen if MS did all that testing you describe? Also i really wonder why it should take two weeks to put a patch on a webserver and write a brief documentation about it, especially since they've enough time to put together documentation while doing internal testing (they need that anyway for customer testing).

    And while some (unsure about the percentage) mozilla fixes cause regression, they often hit the nail on the head with the first patch. In that ideal case the bug is squished within 3 days. Even if your "schedule" for mozilla fixes were correct, the mozilla developpers can do four iterations of that in the six weeks time it takes MS to issue their first patch. Then you assume that usually MS get's the fix right the first time, but if they don't and find regression after one week of internal testing they have to iterate too until they get it right and it'd be about as fast as an iteration in the mozilla case. If they catch it in the first week of "customer testing" they need 3.5 weeks for a cycle.

    The advantage of the mozilla strategy is, that as soon as the patch is ready, anyone can test it (and at least the big linux distributions probably do so), and if there is a problem with a patch, information gets back to the developpers much earlier.
  • Re:Status Quo (Score:2, Informative)

    by Anonymous Coward on Thursday June 13, 2002 @08:20AM (#3692792)
    Hey troll. IIS != OS.
  • Depends on the OEM (Score:4, Informative)

    by TechnoLust ( 528463 ) <<moc.liamg> <ta> <tsulonhcet.iak>> on Thursday June 13, 2002 @08:41AM (#3692858) Homepage Journal
    If you are talking about the IIS feature in Win2k, this is only installed by default on CERTAIN OEMs. For example, Dell desktops with Win2k preinstalled do NOT have IIS installed. In cases where it is preinstalled, that's the OEMs fault, not MS. If RedHat or Susie had an option to install a trojan and some users were dumb enough to do it, would you blame them? Or the stupid users? If you blamed the users, would you then say all Linux users were idiots because some of them did a terrible install job? Then why does it work that way for Windows users? I just don't understand the double standard. I use Windows and Mandrake Linux, and both have their strengths and weaknesses.

    As for the HTR, anybody that does a "typical" install (i.e. just selecting default options) of a Web server has larger problems than their OS.

  • Re:Status Quo (Score:1, Informative)

    by Anonymous Coward on Thursday June 13, 2002 @09:07AM (#3692999)
    As for "time to fix", well XFree86 has been out for a while now, so presumably it was vulnerable all along.

    And you're implying that IIS has only been available since mid-April?

    The "time to fix" is the time from when the vendor is notified until they produce a patch.
  • by Anonymous Coward on Thursday June 13, 2002 @09:16AM (#3693057)
    if (stristr(HTTP_USER_AGENT,'mozilla')){
    echo '16666666666';
    } else {
    echo '12';
    }
    Hmm...
    *takes a look at his HTTP_USER_AGENT*
    Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.0.3705)
  • by Erik Hensema ( 12898 ) on Thursday June 13, 2002 @10:45AM (#3693621) Homepage
    Found it: bug 120238 [mozilla.org] is the bug I remembered, it was filed 2002-01-16 and still stands unresolved (IOW it has beem ignored). Worse still, bug 90547 [mozilla.org] also reports a crash due to large fonts. It was reported around 2001-07-12, which is 11 months ago.
  • by mmacdona86 ( 524915 ) on Thursday June 13, 2002 @11:33AM (#3693978)
    [Not that it's clear that the IIS bug is really a remote access bug (see above where it's explained as a DOS bug) but there have been plenty of remote access IIS bugs (see Code Red).]

    The X bug only crashes your machine if you browse to a malicious web site. The malicious person can't do anything to your machine if they can't induce you to go to their web site, and the effect on your machine of visiting the web site is immediately obvious (X and possibly your whole box crashes) so you can learn not to visit that web site again. The malicious user doesn't really gain anything other than the jollies of knowing they crashed some machine.

    A remote access bug allows someone to take over your machine surreptitiously, which is much, much worse than just crashing your machine. It means your machine's data can be inspected and changed without your knowledge, and also that your machine can be used as a staging point for other illegal activities. Particularly if your data is sensitive, this provides a great deal more incentive to a malicious user.

  • by scrytch ( 9198 ) <chuck@myrealbox.com> on Thursday June 13, 2002 @12:20PM (#3694499)
    This is a fabulous example of something that still sucks mightily about X, and shows no signs of being fixed. Ok, how a real font system would render a 500 foot tall 'A':

    send the 'A' glyph, along with whatever hinting it needs for 'insanely, off the scale big' (i.e. probably the hint for the biggest glyph it defines, like 72 pt). The renderer takes the 'A' and converts it into a series of strokes. The strokes are then rendered into the clipped region, resulting in pretty instantaneous drawing. The font manager decides wisely that this rendered glyph, being "pretty big", shouldn't get cached as a bitmap the next time you want to draw it.

    Here's how X does it:

    Request the font for the 'A' glyph, scaled to 500 feet tall. Construct an uncompressed 1bpp bitmap of the letter A to give to X to blindly blit onto the screen. Die a miserable thrashing death.

It is easier to write an incorrect program than understand a correct one.

Working...