Wu-ftpd Remote Root Hole 515
Ademar writes: "A remote exploitable vulnerability was found in wu_ftp, which is distributed in all major distros. The CERT has a (private) list to coordinate this kind of disclosure so vendors can release updates together, but RH broke the schedule and released their advisory first. You can see the full advisory from securityfocus in bugtraq, but here is a quote: "This vulnerability was initially scheduled for public release on December 3, 2001. Red Hat pre-emptively released an advisory on November 27, 2001. As a result, other vendors may not yet have fixes available."" CNET has a story about this too.
Wu-FTP not in OpenBSD (Score:3, Interesting)
You're a nit. You're a nit. Here's another one!
Re:Wu-FTP not in OpenBSD (Score:3, Informative)
The latest Slackware comes with ProFTPd.
Re:Wu-FTP not in OpenBSD (Score:2, Informative)
Wu-FTP in Debian but not as default (Score:2)
# ant-get update
# apt-get install proftpd (or ftpd)
And you can rid yourself of wu-ftpd on Debian.
--Dan
Re:Wu-FTP in Debian but not as default (Score:3, Interesting)
#apt-get install bsd-ftpd
which is a port of the audited OpenBSD FTP server.
Ok - What does this attack LOOK like? (Score:3, Interesting)
Re:Ok - What does this attack LOOK like? (Score:3, Informative)
This is very similar to an exploit discovered about 4 months ago. Why didn't the Wu-FTP people check to see if they were vulnerable?
According to my sources.. (Score:3, Offtopic)
Nimda: IIS 5.0 is not installed by default in OpenBSD
Ping of Death: The Microsoft TCP/IP stack is not loaded by default in OpenBSD
Recent Linux Kernel Bug: OpenBSD unfortunately uses the BSD kernel and the Linux kernel is not installed by default in OpenBSD
As you can see, OpenBSD is obviously the superior operating system, for namely, its lack of features.
Thank you.
I've changed my mind (Score:5, Interesting)
Until 5 mins ago I was a beleiver in complete disclosure,
But with 6 wu-ftpd boxes to admin I'm not so sure any more.
Hope I see a fix today.
Re:I've changed my mind (Score:2)
Re:I've changed my mind (Score:2)
And what's with the broken counter on replies on slashdot? It claims it was 14 seconds ago that i replied.. I'm sure i didn't find and type the above paragraph, in a mere 14 seconds.
Re:I've changed my mind (Score:2, Insightful)
It's not like only Redhat distro users can now get a safe version of wu_ftpd--it's just that not everyone (neccessarily) has the packages ready for all there configurations.
If you have 6 boxes, better start checking versions and installing newer ones. Sure it sucks, but it's better than being surprised when your servers are "owned"
Re:I've changed my mind (Score:4, Flamebait)
Re:I've changed my mind (Score:4, Insightful)
I hear this all the time. "Security through obscurity is bad!" What other forms _are_ there? Passwords and encryption _is_ the same as obscurity. People using this "security through obscurity is bad" argument seem to have another agenda: tearing down IP laws and promoting freedom of information. While IP may be bad, it is a very seperate issue.
How do people claim security through obscurity is a bad thing? Why is it bad? How else does security work? There is physical security or there is abstract/obscure (i.e. encryption) security. What else?
There is also insecurity through ignorance, which seems like a disease in the networked world. It really doesn't matter much if you post the memo on the admin/end-user's forehead if they don't bother to read it. This seems to be the case more than script kiddies finding out before knowledgable admins. After all, where do script kiddies get their info? Same place admins do: Bugtraq. By the time those damn elusive script kiddies on IRC exploit a few holes in nasa.gov, I'm sure at least one knowledgable admin has posted a report to bugtraq. In case you didn't pick up the sarcasm, most script kiddies travel in herds and attack usually obvious "high-risk" sites. If someone knows something before Bugtraq, I'm sure you have very little to worry about. The exploiter is probably a knowledgable cracker and probably has specific targets. If you happen to be a target, I wish you well, but I don't think any amount of Bugtraq info will keep someone determined to get in your system out (hint: There is a whole world of social explotation that is damn near impossible to detect or even be aware of).
Re:I've changed my mind (Score:5, Insightful)
Hmm, when I think of "Security through Obscurity", I tend to think of it in a different way than thought of above. I think of it as keeping the method used to encrypt/secure/hide something secret, thinking that because the method is secret it is secure.
For example, say I develop a new top secret encryption scheme, called Rot-13. I tell no one of how it works. Since I am not a professional cryptographer, the chances are my algorithm is not cryptographically sound. So it is only secure as long as its method is secret. Once the secret is out, its security is gone. This is security through obscurity.
An example of the opposite would be RSA. The algorithm is well known, therefore with peer review, it is thought of as secure. Even though I know how RSA works, I'm still unlikely to be able to crack it if used properly.
regards,
garc
Re:I've changed my mind (Score:3, Informative)
If you consider a safe to be secure, even when its location is known, then it really isn't security through obscurity. Don't get me wrong, the fact that its location is unknown helps. Keeping something secret can help, but only if it would be secure even if it wasn't a secret. An example of this is the RSA-like encyption that the NSA developed years before it was discovered by the public.
regards,
garc
Re:I've changed my mind (Score:2)
Re:I've changed my mind (Score:2)
Re:I've changed my mind (Score:2)
#apt-get dist-upgrade
Re:I've changed my mind (Score:2)
i don't have any anonymous logins running either
and *most* of the holes require a login prior to exploit.
Re:I've changed my mind (Score:5, Insightful)
Not disclosing this asap will only give you a false sense of security, and will deny you from making your own risk assessment.
Hell, why do you think Microsoft wants to limit disclosure? To empower the sysops?
Re:I've changed my mind (Score:5, Insightful)
Well then close the service off. An unuseable service is better than a r00ted server.
It is good to know that it could potentially be rooted. Being ignorant of security holes does not make it secure - no matter what Scott Culp may tell you.
Re:I've changed my mind (Score:2, Informative)
If you can't wait, you can probably get pure-ftpd [sourceforge.net] going without too much trouble. Its been written from the ground up with security in mind, and so far no one has found a remote exploit.
Re:I've changed my mind (Score:2)
Here's the alert (minus my system info and edited to avoid the LAME lameness filter):
---
Red Hat Network has determined that the following advisory is applicable to
one or more of the systems you have registered with the Software Manager
service:
Security Advisory - RHSA-2001:157-06
Summary:
Updated wu-ftpd packages are available
Description:
An overflowable buffer exists in earlier versions of wu-ftpd.
An attacker could gain access to the machine by sending malicious
commands.
It is recommended that all users of wu-ftpd upgrade to the lastest
version.
--
Taking Action
--
You may address the issues outlined in this advisory in two ways:
- log in to Red Hat Network at https://rhn.redhat.com and from the
listing showing under 'Your RHN' select the affected servers and
download or schedule a package update for that system.
- run the Update Agent on the affected machine.
--
Changing Notification Preferences
--
To enable/disable your Errata Alert preferences globally please log in to RHN
and navigate from "Your RHN" / "Your Account" to the "Preferences" tab.
You can also enable/disable notification on a per system basis by selecting an
individual system from the "Systems List". From the individual system view
click the "Details" tab.
--
Affected Systems List
--
This Errata Advisory may apply to the systems listed below. If you know that
this errata does not apply to a system listed, it might be possible that the
package profile for that server is out of date. In that case you should run
'up2date -p' as root on the system in question to refresh your software profile.
There is 1 affected system registered in 'Your RHN' (only systems for
which you have explicitly enabled Errata Alerts are shown).
Release Arch Profile Name
7.1 i686 localhost
The Red Hat Network Team
This message is being sent by Red Hat Network Alert to:
RHN user login: localhost
Email address on file:
Re:I've changed my mind (Score:4, Insightful)
Seriously?
Re:I've changed my mind (Score:4, Insightful)
The facts did not change a whit. This is just another in a long train of gaping holes in critical software, which you must have been aware of. Either you never thought to ask yourself, "What if this bug affected a service that I rely upon?" (in which case you were intellectually lazy), or you failed to appreciate the impact it would have (in which case you erred in judgement). It happens, I know, but don't make excuses.
linuxtoday.com (Score:2, Interesting)
My favorite quote (Score:3, Interesting)
The problem, known in security circles as the wu-FTP Globbing Heap Corruption Vulnerability, allows attackers to get remote access to all files on a server, provided they can access the FTP service.
Whew! Your whole system is only wide open if you can access the FTP service. That makes me feel better!
Re:My favorite quote (Score:2)
Re:My favorite quote (Score:2)
That's not a problem to me, as I would never expose an FTP port to the outside world. The FTP protocol is inherently difficult to secure and it has outlasted its usefulness. For outgoing data, you can just use HTTP. And public access for incoming data just means that you will be hosting gigs of ripped movies and porn. FTP should be filtered at the firewall and made available to trusted hosts only.
Re:My favorite quote (Score:2, Interesting)
For outgoing data, you can just use HTTP.
HTTP vs. FTP (Score:5, Insightful)
HTTP really is all that.
HTTP/1.1 supports, among other things, file resuming via a standardized header (Range:) and pipelining (whereas FTP's control port+data port means n+1 TCP connections). HTTP can give you a file compressed the way you want it - and in the language you asked for - without filename hacks. HTTP's If-Modified-Since: header makes it more cacheable. In addition, most HTTP server implementations are more flexible - they can authenticate against things other than the local account database, and there is a widely implemented standard for HTTP over SSL - HTTPS. CGI is also more pervasive and useful than SITE EXEC.
Let FTP die the death it has so long deserved.
Re:HTTP vs. FTP (Score:3, Informative)
Microsoft Outlook (not express) can use HTTP/1.1 instead of imap for remote message folders.
IE has WebDAV support as well.
--jeff
Re:My favorite quote (Score:5, Insightful)
For uploads, FTP is still probably better, if only because nobody seems to use the HTTP PUT command.
For downloads, though ...
What are the advantages to FTP for downloads (especially anonymous, but also authenticated)? I honestly can't think of any ATM.
CERT and private lists (Score:5, Interesting)
So, once again use an occasion such as this to resoundingly denounce the fact the CERT, and major Linux distros other than Red Hat, have chosen to do the essentially same.
I suspect that the complaints of this type of behavior will be much less in the case of CERT, since Microsoft's disclosure policies simply allow slashdotters to take pot shots at MS, but we'll see...The shoe's on the other foot this time.
This should have been public knowledge... (Score:3, Insightful)
The people who would really use the exploit already know about it in their cracker circles, so why are we limiting the public in this knowledge? Just tell us and we'll shut down the FTPs or temporarily switch the access to a different daemon while you write a patch for it.
Again, this is security by obsurity, and shame on the OSS community for trying to hide it!
Re:CERT and private lists (Score:2, Insightful)
However considering the quality record of wu-ftpd if you are running it on your box you don't care about security already so it could be worse. Overall people should probably be use proftpd or maybe even zope for their ftp server.
On a plus note there are wu-ftpd packeges in incoming for sid and those might have the fixes people need to debian boxes. If you are running wu-ftpd and refuse to use something else try those.
Whats ethical? (Score:3, Insightful)
Personally, i would rather be told of the hole, and advised to turn off the daemon, as opposed to running the daemon and not knowing about the hole.....some people think ignorance is bliss.....not me. =)
The customer is always right (Score:2)
Once a company has a fix they owe their customers that fix. Anything less is a compromise of their customer's security and risks tarnishing their trust. Yes, getting a fix out first does matter.
Red Hat did the right thing. If your distro has not put out a fix yet, are they working fast enough? (You think there were no script kiddies out there before Red Hat "broke the news?")
Another globbing bug? (Score:2, Flamebait)
Besides; if you're running a public FTP and it's not in a chroot jail, you are a moron anyways.
Re:Another globbing bug? (Score:5, Interesting)
LS
Re:Another globbing bug? (Score:2, Informative)
For the most part, the general canon of "don't run things you don't absolutely need, and keep the ones you need up to date" will take you pretty far. If you can prevent your machine from accepting incoming connections (ipchains/iptables/ipf/whatever, assuming you're not running a server from your "personal use" box), that helps a lot.
Re:Another globbing bug? (Score:2)
It wants to have two interfaces, an external one and an internal one. On boxes with only one NIC, I specify the LAN-connected interface as the external one, and loopback as the internal one.
Re:Another globbing bug? (Score:3, Informative)
Maybe to YOU, how about all the other people who will get nailed when YOUR box is hacked and used in Distributed Denial of Service attacks? How about the emabarassment of discovering your box being used as a drop point for many megs of porn for sexuality other than your own? How about all the webmasters who have to put up with probes (at least) from your box after it catches the latest worm? How about your ISP being notified that you've committed criminal activity against another computer because a cracker cracked you and used your box as a springboard?
If you can't be bothered, take your box of the internet, PLEASE.
Steps to a (more) secure box:
Turning off unneeded services, then firewalling (actually, packet filtering) to allow only known-good protocols is 'defense in depth' - the odds of screwing up in both places the same way are smaller than for either one singly.
Interesting story: I was doing work on a box for a guy who only had *dial-up* access and only used it to send/receive email and browse a little. He was cracked, which I discovered when his netstat wouldn't take the -p option (his version had been replaced after he was cracked, which is common - the crackers replace common utilities with versions specifically written to *not* show their activities on your machine). Ooops - time to reformat and re-install. The fact that you are on a slow link or you are obscure doesn't help much - the script kiddies pick a block of IP addressess at random and scan them all for their vulnerability du jour - if you have it, you're toast.
Re:Another globbing bug? (Score:5, Informative)
Breaking chroot jail:
http://www.bpfh.net/simes/computing/chroot-brea
Proftpd globbing bug:
http://www.linuxsecurity.com/advisories/other_a
maru
Why should they wait? (Score:2)
Business is business.
that;s the beauty.. (Score:2)
download the sources and install. simple and effective.
Hiding the fact there's is a security flaw only gives the black hats that much more time to use the exploit un-noticed.
It's time to thow out the "leaders" in this industry and start replacing them with men and women with scruples.
Magic Lantern... (Score:2, Offtopic)
WuFTPD has poor security history (Score:2)
Wu-ftp/BIND/Sendmail does NOT make me confident.
And quit carping on RedHat, probably just an error, and this bug was reported to ALL the vendors some time ago.
People still trust Wu-ftpd? (Score:4, Informative)
PureFTPD (based on TrollFTPD)
ftpd-BSD (port from OpenBSD)
Virtual FTPD (based on ftpd-BSD)
are all good examples of decent alternatives. I've even heard good things about vsftpd.
Some people (myself not included) even consider ProFTPD to be a viable alternative.
How can people still trust software that has had more holes in it then the finest Swiss Cheese?!
Why use Wu-ftpd (Score:2, Informative)
1. sendmail
2. bind 8
3. Wu-ftpd.
There are replacements for each. Djbdns will give you $500 (IIRC) if you find an exploitable bug in their code. Proftpd, lukemftp, and the bsdftpd are all *much* better replacements for Wu-Ftpd. Sendmail...i can't remember, but there are replacements.
Nevertheless, bind should be run in a chroot jail. Doing things like that makes a bind hole useless. Please uninstall Wu-ftpd and use a replacement. Finally, if you don't need to run it, DON'T!
how would you exploit this, though? (Score:3, Insightful)
Color me stupid, but that doesn't sound too feasible for a remote hack. How would you muck with the malloc heap this way? DoS, maybe, but unless there's something I'm missing, not too great for root access. Let me know if there's something I'm missing.
Tim
Here's how... (Score:3, Informative)
The basic idea is that you experiment on a local system (in the debugger) to characterize to behavior of malloc()/free() when this bug is triggered.
Once you've done that, you should be able to get free() to overwrite some specific piece of memory by doing a glob operation that succeeds, followed immediately by one that fails, or some such.
Then, you use that building block to work out an attack. It's not exactly rocket science, but it IS more complicated to exploit than a typical security hole.
-Mark
Re:how would you exploit this, though? (Score:2)
Yeah, it seemed to me that the requirement that you be able to write into process memory made this a no-op. It's kind of like a way to pick a lock that requires you to already be on the inside of the door. If you can write into process memory, don't you already pretty much have the keys to the kingdom? But it's not the easiest thing to get.
Again, if I'm missing something here, please set me straight gently. Maybe there are standard clever hacker tricks for exploiting deallocation of unallocated pointers. But I've been programming (legitimately) for twenty years and I don't know how I would make use of this to do anything but risk a crash, unless I already had so much access that I wouldn't need this trick.
Tim
Re:how would you exploit this, though? (Score:2)
I'm not an expert on doing this, but I know a little assembly, and it is quite feasible to do this remotely, with no access to the server. It is even possible to make something "useful" happen (like getting a remote root shell) if you have the same binary available to play with (and a debugger and a lot of free time).
For a general overview of how this sort of thing is done see this page [cultdeadcow.com]. (Note that there is nothing disgusting on this site. Just some ASCII cows and some screen shots of windows crashing. Well, maybe kind of disgusting.)
-Peter
Stop using stupid C language (Score:3, Insightful)
Re:Stop using stupid C language - good point (Score:4, Insightful)
I have not made an ontology, but it seems to me that nearly all exploits the past few years have been (in decreasing prevalence order)
Its not impossible, or even hard, to avoid these sins in C programming. But, it also isn't impossible or even hard to screw up and commit this sins.
Programmers make mistakes. That is why it is called programming instead of typing. Choosing a language that minimizes the security impact of mistakes makes a lot of sense.
Don't forget about other criteria. You may need the speed that can be had with well written C code. Usually you won't.
I look at my servers. They are all the slowest rackmount machines I could buy from Gateway when I bought them, 800MHz PIII is typical. (They are plural because the have different security policies, not because of load.) They handle things like mail, http, samba, cvs, ldap, the usual suspects for a 100 engineer software firm. They rarely go beyond 5% cpu utilization. I would gladly sacrifice my surplus cpu cycles for slower, safer, services. When they do go beyond 5% it is almost always for a very specific function like the rsync algorithms or blowing backup data over to another box. Make the hot spots of these functions fast, spend a lot of time making them secure. Probably not more than 400 lines of code between them. Let the rest be written in a safe language.
Marketing move, or horrible mistake? (Score:2)
On the other, this could easily and very vocally show RedHat, true or not, to be a good OS if you want to avoid security vulnerabilities. FUD victims could be saying to themselves, "These other guys sit on their hands for over a week?? I'm going to go with redhat!"
Microsoft social engineers news stories like this all the time. Single examples that Lemmings treat as a global sample of productivity, security, programmers' skill, or whatever other wonderful thing the company wants to tote.
more to the story (Score:5, Informative)
item: the securityfocus vuln-help people are supposed to help coordinate vendors & the software maintainers. they sent notification of the bug to the wrong address, so the wu-ftpd developers weren't even aware that there was a bug present until the day the rh advisory went out.
item: there was supposed to be a coordinated advisory put out on dec. 3rd. rh preempted that, causing this nasty confusion.
greg lundberg posted a big explanation of what went on to several mailing lists... it should be on the wuftpd-questions [landfield.com] archive, but i don't see it there yet.
also, see the news item [securityfocus.com] at securityfocus about this.
Re:more to the story (Score:3, Informative)
Come on, this is WU-FTPd we're talking about here. EVERYONE is aware there's LOTS of bugs. It's a given.
What you should have said was 'the wu-ftpd developers weren't aware of this bug'.
I mean, really, every time I bash WU-FTPd, someone tells me that 'WU-FTPd is no worse than proftpd'. C'mon guys, even if ProFTPd is as bad, at least it's not incredibly well known for being as bad. Let's pick a decent FTP daemon and stop defaulting to crap.
--Dan
Re:more to the story (Score:3, Interesting)
don't get me wrong here - i don't use wu-ftpd, either. i use the openbsd ftpd [debian.org] ported to linux.
i just felt that people should be aware that there was more to the story.
Breech of Trust (Score:2)
If there was a formal agreement not to release the information ahead of schedule, should this not be seen as a mark against RedHat?
Unfortunately, there is only one punishment I can see for this. RedHat should be removed from the mailing list for a specific amount of time, but not permanently.
The biggest problem I see with that is that it would hurt the customers, which is what we don't want.
Does anybody else have an idea of a suitable remedy?
Re:Breech of Trust (Score:2)
Re:Breech of Trust (Score:3, Funny)
RedHat has CONSISTENTLY done the Right Thing in a number of areas with respect to Linux. Despite a number of chances not to. This endless self-destructive attitude of the linux community, mainly centered with people who have yet to contribute a line of code anywhere I suspect, but who love waving their hand and yelling foul should stop.
Seriously, I'd love to auto-mod down folks who don't contribute jack, but cause endless heartache on endless lists. Recently a flame war errupted when someing claiming to be one of the 10 people in the world who wanted to see the kernel improve came on and said linus should stop maintaining 2.5, despite the fact he'd yet to write a line of code for the kernel.
Taking what trolls like this and the one above seriously undermines things.
The irony is that the linux camp is all for full disclosure, so RH arguably did the RIGHT thing and let us all know of a problem we wouldn't have found out about till later.
Know what you're doing. (Score:3, Interesting)
I think it's better that Red Hat released the advisory ahead of time. The faster sysadmins, programmers, and other users know about remote root exploits, the faster the exploit can be closed.
Of course, there are some folks out there who won't patch their system. For those people, advisories like this don't help at all. But then, if you're running anything important, you should take the time to learn how to properly configure and maintain the system. Trying to hide known exploits from the public only serves to make things more difficult and dangerous for those of us who DO know what we're doing.
In other words, if you don't know what you're doing, you shouldn't be using a computer.
OH WELL.
Re:Know what you're doing. (Score:2)
>Of course, there are some folks out there who won't patch their system. For those people, advisories like this don't help at all.
That's their problem. But:
>But then, if you're running anything important, you should take the time to learn how to properly
>configure and maintain the system. Trying to hide known exploits from the public only serves to make
>things more difficult and dangerous for those of us who DO know what we're doing.
No. Actually it depends on how well known the vulnerability is in the wild. If it's not well known then the chances of your box being rooted is very small. Right now there is total knowledge- the only thing that people can do is remove this service; assuming they are awake right now- heaven knows what people in India are going to do- their boxes are going to be seriously at risk.
>In other words, if you don't know what you're doing, you shouldn't be using a computer.
Yep, you, me and anyone else without true omniscience shouldn't be using a computer. Hardly a practical position is it?
Re:Know what you're doing. (Score:2)
Probably already in use by the kiddies... (Score:2)
What annoid me is that I read the warning on this and I could not make heads or tails what the actual cause of the hole was. And I am a programmer!
Security warning by obscurity?
Shame (Score:3, Funny)
Hypocrisy Detected!!! (Score:5, Insightful)
Now you guys are criticizing Red Hat for releasing information too quickly?!
Make up your minds. Either it is a Good Thing to release this sort of information to the public or not. IMO, if CERT is withholding information to the public that just gives a wiley cracker that much extra lead time to perform exploits. Whereas if the info was just released in the first place, at least people could turn their FTP servers yet, or switch to something like pure-ftp, which has yet to be cracked.
I agree with Red Hat on this one. They did people a favor by releasing the information.
Re:Hypocrisy Detected!!! (Score:2, Insightful)
Microsoft is bashed because they take so long to release a fix that they know will work. RedHat releases a FIX immediately when they know it works.
Which company would you rather have a support / maintainance contract with ? Yeah, I thought so.
CERT had knowledge of the bug, a patch available, and quality assured with that patch... yet they still asked for a delay in publicizing the bug. Why ? The question should not be about RedHat, who acted responsibly, but instead why CERT is causing holdups that allow people in the underground communities more time.
Hmm... I wonder if the FBI, NSA, or CIA is on the list of "early notifications"
Re:Hypocrisy Detected!!! (Score:5, Funny)
Actually, IIS does a pretty good job of letting *everyone* remotely administer your Windows system.
No surprises here (Score:5, Insightful)
I looked through the source of Wu-FTPd some time ago, when I was interested in adding support for an encrypted form of FTP proposed in a recent RFC (the protocol never caught on). What I found scared me. Most of the server is one humungous 8000-line C source file which appears to do pretty much everything.
Having quite a bit of experience with the FTP protocol, I expected to immediately understand what was going on, but at first glance, this code baffled me. It's full of pointer arithmetic and chains of if-statements performing mysterious, undecipherable operations on fixed-length arrays. It's not divided into clear levels of abstraction and I had difficulty telling what most functions were supposed to do, let alone what they actually did.
Anyway, I immediately gave up any thought of adding any new features to this godawful mess. Considering all the weird cruft that goes on in that code, it's no surprise to me that people are constantly finding new security holes in it. There are other featureful FTP servers out there; it's hard to see why distributions continue to include a bug-ridden program like Wu-FTPd as default in their distributions.
Re:No surprises here (Score:2, Redundant)
wu-ftpd/bind/sendmail literally give me the shudders. There are solid competitors for all of these. Greater or equal features, and designs that are much more secure.
Secret awareness of security exploitability: scary (Score:2, Interesting)
I just know that the powerful interests, not just the federal government, but also foreign governments and corporate espionage types, become aware of these things, and likely have crack teams of dedicated crackers to rapidly turn out an in house exploit.
Asymetric information is inequitable, giving an inevitable advantage to the elite in the know.
Lack of knowledge is powerlessness.
Security must-dos for RedHat (Score:5, Informative)
#
man NAME_OF_THING_YOU_DONT_KNOW_WHAT_IT_IS
#
get the latest nmap from freshmeat.net.
do this:
# nmap -sS -P0 YOURIPORHOSTNAME
do you see any ports you weren't expecting?
Turn off the services!
Install portsentry + ipchains on a firewall,
or if you don't have more than one box, your
own box! Set portsentry to listen on bind to
catch a lot of automated attackes from a RH6.2
bug. Move your ssh (2.X or greater!!) daemon
to a non-standard port (edit
then set the normal ssh port as a portsentry
tripwire.
Very active attacks right now:
Bind
ftp
finger
telnet
ssh
port 59 (anyone know wtf that is?)
wu-ftpd had an *earlier* vulnerability that
was causing increased scan activity too!
Subscribe to the cert.org mailing list, and
"grep for linux".
you have to take an active role and pay attention
to all security bulletins out there, because
you will literally be attacked within an hour
of bringing up a new DSL/T1 server anywhere in
the wild. I've seen portscans on newly installed
lines in less than 5 minutes!
port 59 is the "well-known" port for "NFILE" (Score:4, Informative)
ironic.. (Score:3, Interesting)
Then this comes out. I hope he got my email.
Re:Or go with WebDAV! (Score:3, Insightful)
I just spent a week playing with WebDAV, investigating it as a possible solution for a customer looking for secure Internet file access. Anyone please correct me if my findings are incorrect.
For the unitiated, WebDAV is the protocol name for the "web folders" feature of IE5.5 and up. I ran it as an Apache module. It was incredibly easy to setup. HOWEVER.. Under WinNT, you can only copy files to and from the web folder, not open or edit them directly. With Win2k and up you can open and edit files directly in the web folder without needing to transfer them to your local PC first, which is much nicer.
The reason I wouldn't recommend it for my customer is that AFAICT the reads and writes on the server side are done with the user and group that the web server runs as. While it does indeed support ACL's, the ACL's are just for the web server protecting the file space in general, and do not maintain the uid/gid of the web-authenticated user down to the file level. It would be sufficient for providing a "common" drive for all the authorized users with no file-level ACL's. You would need to create a new VirtualHost for each file area that needs its own ACL (think home directories).
Imagine 100 users. That would require 100 VirtualHost blocks with independent htaccess files and at the filesystem level, every file and every directory would still be owned by the web server! Not exactly a suitable solution for a client to implent his own in-house version of WebDrive.
In addition, I repeatedly experienced "this operation could not be completed due to an unexpected error" in Windows NT when trying to traverse certain directories of MP3's. If it doesn't work for me in certain situations, it would be disastrous for the customer looking for a "highly available" solution. More like "barely available". I can't architect a solution around something like that.
Having said that, I would love to see a major web archive like ibiblio.org set this up for easy file browsing and access. That would also give the WebDAV team an enormous amount of feedback from a single site, and hopefully iron out more of the issues that keep this unsuitable as an enterprise-class solution.
To those who would cry "hypocracy" (Score:4, Insightful)
The closed source vendors who are against full disclosure would prefer that the vulnerability is never announced, which would (according to them) allow them to take their time and roll the update into their next service pack release or whatever.
And to the people who suspect some kind of nastiness on Red Hat's part for their early announcement, the individual at Red Hat who claims personal responsibility has already apologized on the private list, and has admitted to erring. The private list has existed for a long time and has worked very well in the past, allowing several vendors to all release fixes at once to a previously unknown vulnerability. It would have worked fine again in this case, except for the mistake by Red Hat.
noah
some juicy links for the un-enlightened (Score:2, Insightful)
i know it's tempting for all the [insert your OS of choice] zealots to waive their flags when another OS becomes known to have a security exploit. but for fucks sake, just because wu has a hole in it, doen't mean that the entire OS is scrap.
oh by the way -
SNORT [snort.org] is a NIDS (network intrusion detection system) that could help you detect and prevent a good deal of network attacks. IIRC, it has some windows plugins too.
DEMARC [demarc.org] is a web-based console for SNORT, plus a pretty good host/service monitor.
Tiny Violins (Score:5, Informative)
So, the root of the situation is: 1) Anyone who did NOT know about this hole had been vulnerable LONG before the posting. 2) When told about the hole, but without a patch, any of those admins could then take whatever steps would be needed to keep thier server secure (even shutting ftp down if it came to that).
RedHat was right.
Jumping the smoking gun. (Score:2, Informative)
Date: Mon, 19 Nov 2001 12:49:47 -0700 (MST)
From: Vulnerability Help
To: bugtraq@securityfocusHeya all,
The SecurityFocus Vulnerability Help Team is in the process of notifying vendors of a remotely exploitable problem in WU-FTPD .
[snip]
I must admit, I simply filed this in my todo list, but I suspect anyone who really wanted to know what was fixed could have found a patch or at least a patched version before the advisory release date.
Regarding disclosure... (Score:5, Informative)
Now, RedHat maybe shouldn't have ever made this "agreement" to pospone patches. Maybe they noticed that people were already making use of this not-so-secret-to-black-hats bug. Or, maybe it was just a mistake... I don't know. I'm just glad I don't have a public wu-ftp server to deal with.
WU-FTPD maintainer ain't happy... (Score:5, Informative)
http://marc.theaimsgroup.com/?l=wuftpd-questions&
Go with something more secure. (Score:3, Informative)
ProFTPd [proftpd.net]: the ftpd that I prefer most. It was designed with security in mind (wow, rhyme) and its configuration is akin to Apache's.
PureFTPd [sourceforge.net]: a relative newcomer; said to be fairly secure. Based upon TrollFTPd.
If you're an administrator that prefers security over convenience, you may wish to check into secure FTP or simply use SSH to transfer files. Like many "old style" daemons, FTP transmits sensitive data (namely passwords) without any type of encryption applied. Just remember: system security depends only on the competence of your administrator. Most administrators (at least myself and those that I know) refuse to touch wu-ftpd with a fifty foot pole.
Anyone using wu-ftpd... (Score:3, Insightful)
C lang remains inappropriate for network daemons (Score:5, Insightful)
I know that we sometimes live with legacy code; fair enough. But I claim that it is entirely inappropriate to write security-critical internet daemons in C!
There are lots of people here claiming that this is caused by sloppy or inexperienced programmers. I think that this is bullshit. Are the authors of wu_ftpd bad programmers? BIND? IIS? perl? telnetd? quake 3 arena? sshd? All of these have had remote overflow (or related) exploits. There are hundreds more... Have you personally ever written a multi-thousand-line network daemon that you know is buffer overflow free? How do you know?
Here is what I say: C the language makes it easy to make the kind of mistake that leads to a remotely exploitable buffer overflow. It is almost as if the language is designed to enable this behavior. According to CERT and others, buffer overflows (and related format-string vulnerabilities, also endemic to C) are the most common source of security holes in UNIX applications (On win32, they are second only to Outlook attachments).
There are only two reasons I can imagine that people would reasonably use C:
Low-level Hardware Access - Fair enough. There are not really any good alternatives now. However, network applications do not need to do low-level hardware access at all.
Raw Speed - Though I believe that other languages are very near to C in performance (http://www.bagley.org/~doug/shootout/craps.shtml) , conventional wisdom says that if you want ultimate speed, use C. However, network applications are not typically CPU-bound, they are network bound. ESPECIALLY FOR THE HOME USER, with a 1.5ghz PC and 5 users per day, this argument is totally silly. Outside the enterprise (where hopefully people can custom tune their software and have people devoted to keeping it secure), there's no reason to need C's speed in a network daemon.
IN A NETWORK APP, SECURITY (SAFETY) IS CRITICAL. That means that all network apps should be written in a language with machine-checked safety. This might mean Java for people who need it to feel like C. (Note that there are several good native code compilers for java, and it has reasonable network support.) In these kinds of languages, buffer overflows and format string vulnerabilities are automatically impossible. Personally, I prefer a more efficient language with stronger safety guarantees: SML. (Ocaml [inria.fr] might suit the slashdot audience better) In fact, at the time of the last wu_ftpd remote root exploit, I decided that it was time for me to rewrite my ftp daemon in SML. It took me only 1 weekend to get it working, by myself. It does not support every feature of FTP (especially obsolete things and dubious "features" like SITE EXEC), though it supports plenty for say, the average linux desktop user. Writing code in a modern, high-level language has other benefits too: it is only about 3000 lines, including library code that I wrote to implement MD5 passwords and various other things that I plan to use in other daemons (the core ftp server is only 850 lines). Compare this to wu_ftpd (8000+ lines) and the PAM MD5 password implementation (200 lines). Most importantly, I know that by using a safe language that I have a 100% buffer overflow free daemon. Thus, I can spend more time looking over the code for more subtle security problems, such as possibilities for Denial of Service attacks. (I didn't do much of this, actually, though it is not vulnerable to the ls globbing attack, SITE EXEC, or PAM authentication bugs that have been in other ftp servers.)
If you think this sounds good, you can get my FTP server here [sourceforge.net] and an ML compiler here [sourcelight.com] . (It is just a proof of concept, so don't get too excited!) But what I would rather you do is just listen to my advice, and demand better from your software manufacturer! Linux distributions that want to be secure should be rewriting this kind of software in some modern safe language. It is easy to do, and the results are worthwhile.
Why is a FTP daemon running as root? (Score:3, Insightful)
Can kernel security patches do something against t (Score:3, Insightful)
It works amazingly well, and for almost everything on your system.
But does it apply to SSH and FTP? Probably not. When you give FTP access to customers so that they can upload web pages, the FTP server needs read/write access to everything in
Re:Nice. (Score:2, Insightful)
You don't see Microsoft doing this, do you?
Re:Nice. (Score:5, Interesting)
I'm somewhat surprised--but either way it brings the unresolved question of disclosure bubbling to the froth again.
Re:Nice. (Score:5, Troll)
This isn't a troll, but an honest question - what tookem so long, and why didn't they just throw it open to end-users to protect themselves (like closing down ftps in worst-case) like is supposed to be standard practice?
Re:Nice. (Score:3, Interesting)
What's open source's role in the security-by-obscurity debate?
Open-source software is neither more nor less secure than closed-source software. And the whole issue of whether open source is more secure is a red herring. We have a chapter in the book about it. Security by obscurity doesn't work. But just because you have your source code sitting around in public doesn't mean someone's going to do a free security review on it, either, which is what the open-source guys think. That's wrong.
Re:Nice. (Score:3, Informative)
"We were releasing some advisories on the same day, and an overzealous administrator pushed this out as well,"
So essentially some sysadmin who strongly believes in full disclosure decided to go against company policy and announce it. He's probably getting reprimanded (perhaps fired) and it looks bad on Red Hat because of a "rebel" employee.
Re:Redhat (Score:2)
It wouldn't be very cool of them to leave me vulnerable to a break-in when the fix is available. And the fix is available in the wu-ftpd package, regardless of whether the various distributors have packaged it for their systems, so I can install the fix even if my vendor hasn't gotten it's act together.
My whole complaint with the non-full-disclosure movement is that vendors under it tend to not acknowledge that security holes exist (which means I can't even do something as simple as disable the vulnerable service until a fix is out) and delay putting patches out (so I'm either vulnerable or off the air longer than needed). I'd be more annoyed at CERT for not reporting the vulnerability than at RedHat for telling me about it.
Re:Please Explain, dude(ttes)... (Score:3, Informative)
[Unix;common] To expand special characters in a wildcarded name, or the act of so doing (the action is also called `globbing').
Re:Please Explain, dude(ttes)... (Score:2)
I real basic terms, to glob is to expand a wildcard character to mean one or more characters. Like if you say something like "sudo rm -rf /*" that asterisk is expanded to mean "zero or more of any character". You might have also seen the question mark used. It means one single character. The Foldoc web site [ic.ac.uk] has a much better explanation.
Oh, and while smarter people than I are explaining...the quote at the bottom (the one I see)...what is a Vegemite? Ever since that Men at Work song, I've wondered.
Vegemite is a nasty product made of yeast extract. It's a brownish paste-like stuff which is spread on bread and the like. An Aussie could probably explain better. I tasted it just once (on a cracker), and that was enough for me.
-B
Re:Please Explain, dude(ttes)... (Score:2)
No, I actually only had a wee little bit on a cracker. It was foul. Seems to me to be an acquired taste, like caviar or something.
-B
Re:A non-microsoft security bug? (Score:3, Insightful)