Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

First OpenOffice Virus, Not In the Wild 169

NZheretic writes "According to APCmag, the first cross-platform OpenOffice.org virus — 'SB/Badbunny-A' — was emailed directly to Sophos from the virus developers. The proof-of-concept virus affects Windows, Mac OS X, and Linux systems and uses different methods on each. It has not yet been seen in the wild. Despite Sun's OpenOffice.org developer Malte Timmermann's claims to the contrary, this kind of embedded scripting attack represents a real threat to OpenOffice.org users. Back in June 2000 when Sun first announced the open sourcing of OpenOffice.org, the twelfth email to the open discussion list put forward a two-part solution for providing OpenOffice users with Safe(r) Scripting using restricted-mode execution by default and access by signed digital certificates. In October 2000 the issue of treating security as an 'add-on' feature rather than as a 'system property' was again raised. Is it time to now introduce such measures to the OpenOffice.org Core to greatly reduce any future risk from scripted infections?"
This discussion has been archived. No new comments can be posted.

First OpenOffice Virus, Not In the Wild

Comments Filter:
  • The real solution (Score:5, Insightful)

    by Rix ( 54095 ) on Tuesday May 22, 2007 @01:49PM (#19224315)
    Is to stop enabling scripting by default in software that has no real need of scripting. Hasn't even Microsoft learnt this by now?
  • by Anonymous Coward on Tuesday May 22, 2007 @01:55PM (#19224423)
    Documents shouldn't run scripts unless explicitly authorized to do so. That goes for word processors, spreadsheets, PDF readers, email clients and web browsers. The problem is that the world is full of dickheads who needlessly distribute documents that require executing script, so users end up clicking yes every time.

    Imagine how few viruses and trojans there would be if requiring script was the exception rather than an unfortunate rule.

    Oh well, we can all dream.
  • by truthsearch ( 249536 ) on Tuesday May 22, 2007 @01:59PM (#19224501) Homepage Journal
    Ever work in a financial company? Some live almost entirely off of their scripted Excel spreadsheets. There is a lot of value in allowing spreadsheets to support scripting. But it's the abilities of those scripting languages that's a real problem. Just like JavaScript needs to be limited in scope within a web browser, so too should the spreadsheet scripts. Unfortunately these office suite scripts are often used for things like disk access to import data.
  • by needacoolnickname ( 716083 ) on Tuesday May 22, 2007 @02:00PM (#19224523)
    What is an untrustworthy website?
  • Why must Sun (Score:4, Insightful)

    by gillbates ( 106458 ) on Tuesday May 22, 2007 @02:02PM (#19224545) Homepage Journal

    Copy even Microsoft's mistakes?

    I mean, really. We've known about macro viruses for 20 years, and the danger of putting executable code in documents for about the same, and yet, in 2007, an open-source application, backed by a major UNIX vendor is released with this vulnerability?

    Apparently many eyes do not make bugs shallow. I guess the community was asleep at the switch. Or maybe, something in the process is broken. Or maybe Sun just doesn't care.

    Now, lest you think this a troll, consider: Security and virus immunity have been a big selling point for open source systems. Until now. Sun is a large player in the open source arena, and this makes everyone else - secure or not - look bad. Security was the major selling point for OO, and now that it's questionable, I'm not sure where Sun is going to go with this: they can't compete with Microsoft on features, OO is far from a universal standard (which means you're going to be plagued with interoperability issues), and OO's last major selling point is that it is free as in beer.

  • I don't know of any wide distro that doesn't have Perl or xchat.
    Getting write and execute permissions is a concern. Because they wider the Linux audience, the more people will want to double click on an attachment to see the 'dancing ponies' or whatever.

    Sad, but true.

  • by Rix ( 54095 ) on Tuesday May 22, 2007 @02:14PM (#19224749)
    Those that do can enable scripting. There's no reason to expose the vast majority who will never, ever, use that functionality to the risk. Which is why I said "disable by default" and not "rip it out and burn it".

    You are correct that vulnerable functionality should be in a protected wrapper. However, this will simply reduce, not eliminate shenanigans. Clever monkeys will still find a way.
  • by radarsat1 ( 786772 ) on Tuesday May 22, 2007 @02:14PM (#19224753) Homepage

    Unfortunately these office suite scripts are often used for things like disk access to import data.


    And that, of course, is almost directly related to the fact that the MS file formats are closed. With an open format like ODF, scripts for importing data aren't critical, since it's quite easy instead for a program to export it in the proper format, or to write an external script or program to transform data into ODF format. After all, it's XML.

    Unfortunately MS has trained industry to rely on scripting to do basic things that should be done in other ways, just for the sake of not having to divulge file format details.

    But in any case, I agree with the opinion expressed elsewhere in the comments that scripting isn't inherently bad, but it should be limited in ability by default. If a company needs unprotected scripting so badly, I don't see why their IT department can't just deploy it with the correct defaults.
  • by LiquidCoooled ( 634315 ) on Tuesday May 22, 2007 @02:21PM (#19224849) Homepage Journal
    Don't open email attachments of an unknown sender

    Many people get viruses (appearing to come) from well known trusted sources, so this advice is wrong.

    The correct thing to say is:

    Don't open unsolicited attachments or files, ever .

    If in doubt, speak to the sender and confirm its validity.
  • by Anonymous Coward on Tuesday May 22, 2007 @02:27PM (#19224913)
    Thank god /usr/bin is read-only! Its sentimental value is irreplaceable. Grandma can, of course, get /home back off the install disks. Hey, wait.
  • by BosstonesOwn ( 794949 ) on Tuesday May 22, 2007 @02:30PM (#19224953)
    whereis insert_mailapp_here?

    because we all uninstall everything we don't use right? you fail to see that they can be written to use other apps, this just happens to use mirc or xchat.

    never underestimate a determined thief.
  • by fluffman86 ( 1006119 ) on Tuesday May 22, 2007 @03:14PM (#19225697) Homepage
    I really like McAfee SiteAdvisor [download.com] to help me decide. It's available as a Firefox extension and turns green if a site is not known to have any bad downloads or send unwanted emails. It's gray if unknown, and red if a site has malicious downloads or sends out a lot of emails. It's by no means an excuse for not using your brain FIRST, but it helps sometimes.
  • by Macthorpe ( 960048 ) on Tuesday May 22, 2007 @03:19PM (#19225783) Journal

    OO's default is to not run macros. The user get's a warning and has to say "yes" to the thing. This is the best that can be done and still be "compatible" with M$ Office.
    Isn't this the exact same 'security feature' that you've been saying is so shit about Vista?
  • virusscanner bloat (Score:3, Insightful)

    by pe1chl ( 90186 ) on Tuesday May 22, 2007 @04:50PM (#19227359)
    was emailed directly to Sophos from the virus developers ... who dutyfully included it in their signature database, so it will be looked for in millions of computers even though it is not in the wild.

    meanwhile, our computers get slower and slower. virusscanners eat up lots of resources and become ever slower. I recently noticed clamav takes 13 seconds to scan an infected .scr file of 16kb before deciding that it is safe (because it not yet had the signature).

    wouldn't it be time that antivirus companies slim down the signature lists a bit. of course it is cute to boast a "number of signatures" above 100.000, but who is really getting benefit from the scanning of all those hypothetical viruses?
  • by jimicus ( 737525 ) on Tuesday May 22, 2007 @04:57PM (#19227517)
    In any company, there's a whole bunch of departments other than IT.

    Those departments don't always fancy calling the IT department when they have an IT requirement - particularly if it doesn't seem that complicated. There is always someone in the department who knows their way around Excel (and possibly Access) better than any of their colleagues. So they cobble something together in some 'orrible mess of VB macros linking who knows what files, referential integrity or scalable design be damned.

    Were you to audit any sizeable business for spreadsheets made somehow interactive with scripts and badly designed databases thrown together in Access, I guarantee you'd be amazed and disturbed in equal measure. And you really don't want to start trying to figure out which ones have somehow become critical to the business.

    This has been going on for years. Try taking that functionality away today, you might as well suggest replacing their computers with slide rules.

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...