Sun Security Patch Introduces Security Hole 265
Rich0 writes "Sun is announcing that their 'Security Hardening Package' for their Cobalt RaQ 4 Linux servers allows remote users to execute arbitrary code. Ironically, the solution is to remove the package, potentially removing protection from other compromises. There's a CERT advisory, as well as an article posted on Extremetech." Yikes, one would hope there's a forthcoming patch in the works.
Re:Damnit! (Score:1)
The news thread he refers to is here [google.com], but it's in dutch.
In short: site owner believes he's had both the sun exploit, and a DDoS attac. He now thinks his backups are corrupted by the cracker as well, so that's why he says he's very slow restoring the sites. (about 48 hours down now, for some).
Also, he thinks the cracker entered about 4 days or more ago (well, he's down 2 days now, and he writes the cracker entered a couple of days before the site went down).
Re:Wow! (Score:1)
Re:Wow! (Score:1)
Re:Wow! (Score:4, Insightful)
What Microsoft is saying is simply "some time ago we signed and released a piece of code. this code has bugs. don't download it. yes, it is signed but so what? don't download it anyway."
Say I have a 3-year old PGP distribution signed by PGP Corp. It is signed. But it has known bugs (discovered long after signing). Should I install it? No. The fact that it is signed does not mean anything beyond simple fact that it was produced by particular person/corporation.
By the way, do you know any other vendor who has been signing their software as long as MS?
I remember Apple updates simpy downloaded unsigned code from their web server, without verifying any signature at all. So a man-in-the-middle could inject trojan.
Linux ISO-files usually are "protected" by MD5 hash. So if you sit in the middle and can modify both ISO file and MD5 hash, you can do whatever you want with this distribution.
Re:Wow! (Score:5, Insightful)
The problem with this Cobolt 'security' release is one of a flawed implementation. Microsoft's bug was one of tragically bad design. The latter is much harder to work around.
Re:Wow! (Score:2)
This is pure FUD. You don't have to turn on "Always trust Microsoft Corp" to donwload any control. For every control you decide whether you want to download it or not. Signature only verifies that it is coming from Microsoft, nothing more. You should decide yourself whether you want particular control or not. Signature verify the origin, not content.
Just like in Sun's situation: some fixes are broken, some are not. You decide install or not. You should know what you are installing - security vulnerability or a fix.
Microsoft's bug was one of tragically bad design.
Where is bad design? I am sure that if Sun signs their patches, both bad patch and a fix are signed by same key. A key per file is just stupid and does not make any sense. You don't want to turn your PKI infrastructure into file-recall infrastructure. When PGP found a bug in their software, they did not recall the public key used to sign previous builds. They simply released a fix, and singed it (probably by same key, but I can't verify this).
OK, happy Microsoft bashing.
Re:Wow! (Score:2)
Precisely. There is no way for a user to say that "this version is bad. don't even offer to install it". MS can't use a different signature, and the MS EULA may even make it illegal for a user to disect to file to find out if it's realy trustable. MS's signature system was designed by marketing. It didn't take into account the possibility that their own code might have to be marked as bad.
Bad design.. Nothing a user can (legally) do about it
Big Honking Deal! (Score:4, Insightful)
Bugs happen every day.
Patches are generated in response to those bugs
Patches sometimes generate further bugs
Sometimes these bugs involve security. D'oh
profit?
Re:Big Honking Deal! (Score:1)
Re:Microsoft Security Patch Introduces Security Ho (Score:1)
Re:Microsoft Security Patch Introduces Security Ho (Score:1)
Rich0 writes "Steve Balmer from Microsoft is announcing that their 'Security Hardening Package' for their Windows 2000 servers to be released in March of 2003 includes a new feature that allows remote users to execute arbitrary code."
Re:Big Honking Deal! (Score:3, Insightful)
Patches are generated in response to those bugs
Patches sometimes generate further bugs
Sometimes these bugs involve security. D'oh"
Too bad every time MS does it, Slashdot has a 'everybody who uses MS is stupid!' field day.
Re:Big Honking Deal! (Score:2)
Um, no. What I said was a reflection of what I see on Slashdot, it has nothing to do with the parent poster.
"I see more posts on MS related threads saying something like the parent than I do MS bashing threads!"
Why do you think that is? Take a moment to ponder. Slashdot has filled people with so much bullshit about MS that even the anti-MS zealouts are sick of it. Sorry to say that it's not really cool to hate MS anymore. If this topic is any indication, we might finally be seeing the end of the Jerry Springer-esque MS fights around here.
Gee, I'm sorry my comment didn't suit your tastes, but the people who moderate these comments are regular posters just like you. Obviously they felt I was on to something.
Patch Testing (Score:4, Insightful)
Another issue is that sometimes to fix a bug, a newer version of a code block may be used (like taking a Linux 2.5.x solution back to fix a bug in 2.4.x). This code block may have unwanted functionality (because it has been inadequately tested).
Now all the above goes for commercial software, where there is a formal testing and 'fixit' budget. It therefore goes for free software too. Although individual teams are well motivated to sort out their software, it is more difficult to organise proper testing across teams.
In this case, we are lucky as a single team are working on this and it was sorted out quickly. Somehow some closed source developers don't seem to be so good about quick releases of their patches, and when they do, they still contain as many bugs (IE patches anyone?).
The point: Closed source == No workaround (Score:4, Informative)
If it is true that the vulnerability is caused by a flaw in the input validation of a CGI (common gateway interface) script, and yet there is no workaround other than removing the Security Hardening Package, this implies that the CGI validation script (overflow.cgi) is not available for modification, so regardless of what license this is under, it's effectively not open source, otherwise there would be a workaround.
Well, we hardly need reminding of that in this forum, but perhaps somebody should make this point to ExtremeTech and to Sun. The CERT advisory rather oddly avoids this point as well, despite identifying the flawed component. It probably just shows that a company's inflexible procedures (package updates in this case) can effectively close even a theoretically open platform like the RaQ.
Re:The point: Closed source == No workaround (Score:2)
There are workarounds though including removing the offending package. This is NOT Solaris, it's just a Linux distribution on the Cobalt RaQ. In my honest opinion though I would no longer recommend a Cobalt RaQ to anyone anymore since Sun bought the company. They have gone downhill and patches take months to come out. We didn't get a patch for the Apache ROOT EXPLOIT for over 2 months! Thankfully there is a dedicated community that helps to support the product and there was a workaround using the mod_blowchunks, or you could recompile Apache yourself, but then why pay $4k for an appliance if you're compiling shit? I could just get a $500 x86 box and install Debian on it. Anyway, when it comes time to replace the raq4's I guess we'll just have to hack together scripts to do everything the RaQ did as far as GUI administration or maybe try one of those packages.
And your point is? (Score:2)
Are you insinuating we should just ignore bugs from now on? Especially one that "allows remote users to execute arbitrary code". Seems newsworthy to me, even if it's not a Microsoft bug.
Re:Big Honking Deal! (Score:2)
A bug is a bug is a bug.
Not.
Microsoft bugs happen every day.
Open Source bugs happen. The scurrying around may be somewhat disorganized, but the job gets done, rather well and rather quickly actually.
Sun bugs do happen, but not that often. "Sun Security Patch Introduces Security Hole" is a pretty rare phenomenon, and even thou I don't use Sun gear, I do want to hear about it. Loud and Fast.
Solaris has many many patches (Score:2)
Have you ever actually managed a patching system for solaris? It's god aweful. At my last job I ended up writing a suite of scripts that managed all our patching and even then the patching was troublesome as numerous patches broke other things.
Sun currently has a bug in 108940-45 through -48 that they haven't fixed, and then they haven't made the last good version of the patch available.
As of two years ago sun had over 4GB of patches.
Half the problem is that everything is managed individually, so a lot of people don't actually patch until they have a direct need to do so, ie something doesn't work or they get attacked. It's too difficult to apply the latest patches and then make sure nothing was broken. I've been burned several times by sticking with the latest patches. It can easily take half of a full time employees time to keep a mmodestly sized network patched.
I'm not saying anyone is better off, but sometimes more is less.
-shane
Re:Big Honking Deal! (Score:2)
RE: Slam SUN?! the Other Microsoft?? (Score:1)
Note: To those of you who are looking for an argument I am being sarcastic. I run Linux; and hate ms/anyone else who doesn't embrace Open Source. Except China.
Re: Slam SUN?! the Other Microsoft?? (Score:1)
nope [sunsource.net] not backing it [openoffice.org] at all [siliconvalley.com]
and well your at it do me a favor and call the gnome developers and ask them if sun has thrown any money their way.
Yet Another Reason No One Takes Linux Seriously (Score:5, Funny)
MS: doesn't release bug fixes because their are no bugs. Only security updates and service packs to appease people.
Sun: releases a bug fix with an even bigger bug.
Linux: released bug fixes quickly.
And that's it, linux will forever be in last because of the fact they can't follow simple rules. You would think that everyone had a copy of Linux's source the way bugs are spotted and fixed so quick .. sheesh. Perhaps we should try and sell the source of linux to India?
PS - that was sarcasm ...
Re:Yet Another Reason No One Takes Linux Seriously (Score:2, Informative)
Re:Yet Another Reason No One Takes Linux Seriously (Score:4, Insightful)
Re:Yet Another Reason No One Takes Linux Seriously (Score:3, Funny)
Manager: "From now on we don't call *point at a thick pile of papers* these 'problem logs' or 'bugs', we call them 'Instances'."
Programmer: "So....we've...673 'Instances' pending right? Can we conclude this 2-hour meeting so that we could continue fixing bugs?"
All Managers: "INSTANCES"
Poor programmer: "Argh...sorry, 'Instances', right?....can we go now?"
Re:Yet Another Reason No One Takes Linux Seriously (Score:3, Funny)
Re:Yet Another Reason No One Takes Linux Seriously (Score:1)
Man speaking to cylist by roadside (Score:5, Funny)
"I'm ripping the patch off this inner tube."
"You're taking the patch off? Whatever for?"
"Well, you see, it's got this big hole in it."
"Ummmmmmmmm, are you *sure* you know what you're doing?"
"Don't worry, I can patch the patch when I get home and then nail it back on."
KFG
Excuse me sir... (Score:1, Offtopic)
we cobalt owners call this par for the course (Score:5, Informative)
that particular machine runs a custom rolled distro of Red Hat 6.2 and has been known to be very reliable, and have mild issues from updates. every one of the holes it covers has some sort of workaround, which those admins have probably employed already.
i'd like to take this opportunity to complement the Cobalt Raq Users List members as well. without people like bruce timberlake, jeff lasman, steve werby (a /. contributor) and a whole host of others (can't name everyone) the raq has a vibrant community of admins willing to help even the newbiest of owners.
my machine runs on a lovely 64-bit mipsel processor from MIPS and is one of the dutch (sun bought cobalt a while back, it started on the other side of the pond) original models. they are tremendously power efficient, quiet and dependable boxen. mine uses a dinosauric 2.0 kernel and modified red hat 5.1 , and runs php 4.1.2/mysql like a champ.
not only that, but the cobalt raq IS a web appliance. In other words, its not really meant to do all that out of the box (back then anyway). today's raqs run a full gamut of oss and free software, and come pre-installed with everything you need as a webmaster.
it is an oustanding machine for NT admins to learn how to switch over, with the cushion of a working system to learn from.
yes, sun doesn't always get it right, but they put their backs into it so to speak, and it is not unusual for a Cobalt engineer to post solutions (even unofficial ones) to the list.
for all you cobalt users out there, you know what i'm saying, and if you're not on the list, you're missing out.
this post has voided your warranty. peace.
Re:we cobalt owners call this par for the course (Score:2)
My only real gripes with it was that it was awfully hard to get a lot of stuff to compile (there was only ever one version of OpenSSH which would build cleanly, and getting a new version of gcc going was a real pain) and although it was perfectly adequate for PHP and MySQL and the usual Apache stuff (oh, and PHP didn't work out of the box either, it died with a floating point exception without patching) it was HORRIBLY slow for Perl and Perl cgi scripts. If you had a single "use" Perl statement in your perl script, the Perl script would take 3 to 4 seconds to start using 100% CPU. I never did find a fix for that problem.
Re:we cobalt owners call this par for the course (Score:1)
yes, i love the advantage of being script kidde proof. or as we like to say "the kiddies skipped their MIPS assembler lessons today"
Re:we cobalt owners call this par for the course (Score:1)
Re:we cobalt owners call this par for the course (Score:1)
Re:we cobalt owners call this par for the course (Score:1)
There is a patch already (Score:5, Informative)
I quote:
===
5. Resolution
This issue is addressed in the following releases:
Intel
* http://ftp.cobalt.sun.com/pub/packages/raq4/eng/R
===
Re:There is a patch already (Score:5, Informative)
Cheers,
Ian
(Raq 4 owner)
Re:There is a patch already (Score:2)
> for the flawed patch. There's no replacement in
> functionality for the original.
How ironic.
D'oh!
Re:There is a patch already (Score:2)
As an aside, anyone else find it mildly ironic that the problematic file in question is called "overflow.cgi"?
Give them credit (Score:1)
Aside from that, every patch in and of itself is a glaring security hole. You don't think that by examining the code in the patch you can get a general idea for how the program itself works? That's how most weaknesses are found (by the slinky malicious cracker anyway).
It all comes down to the Admin. For if he is well-minded and concerned greatly with security, none of the security holes we learn about would have much chance of being used against you.
Exploits out in the wild, first victims show up (Score:4, Informative)
Official patch (Score:4, Informative)
The official solution is not to remove the whole package, but to install this patch:
http://ftp.cobalt.sun.com/pub/packages/raq4/eng/R
Note that it's a flaw in the admin site scripts that causes this problem. So if you don't use that and have disabled it, then no problem.
Re:Official patch (Score:2, Informative)
Just let me eat my own words before I get flamed. Yes, I've just realised that that patch is actually a shell script which removes the original package. Hmmm...
Surely you can just remove the offending CGI script instead?
Re:Official patch (Score:2)
Nothing new (Score:2)
Of course, this was much more dangerous than the current case because it had already been claim that Solaris 8 was not affected by that BIND bug.
ROFL - xref Jon Johansen case (Score:1)
Get a grip guys (Score:2)
Anyone who's been a Sun administrator has seen Sun screwup patch packages (breaking something during the fix). This is not news. What is going to happen is that in a week or two (or months, depending on the severity or difficulty to fix), Sun will release yet another patch package that will resolve the issue.
So if you put it in, back it out. Devise your own workarounds if you think its a significant vulnerability. Security is established through design and monitoring. Firewalls, subnets, switches, ssh, checksums, login authentication, log monitoring. You can't rely on vendors to resolve your security issues. Companies can only fix the security holes that they are aware of. You're only screwed when you're stuck with an improperly designed legacy system or policies that can't be defended. But that's not Sun's fault.
What a great concept... (Score:2)
It's a good thing that OS developers are smart and would never be so stupid as to develop an OS that would require a high security risk software, like a browser, just to run. An OS has to be modular and highly configurable in order to do that, and that always makes more sense than a monolithic beast.
A product that works as advertised... (Score:2)
forthcoming patch? (Score:2)
Isn't that this whole thing got started in the first place? Instead of a security patch they should release a "zero security" patch. If they're consistent, using the powers of reverse psychology it will be the most secure system ever developed.
It must be a revelation to some... (Score:1)
The question is, will this unceasing paranoia about "security holes" lead to better software, or terrible software?
See? (Score:3, Funny)
You owe me a buck, man.
Buy my new operating system. (Score:2)
Here it is: Ø
If you find a bug or want additional features, just submit a report and we'll fix it and issue a patch.
Last Post! (Score:1)
I recently read an article that said, "reply by mail, I'll summarize."
What should I do?
-- Doubtful
Dear Doubtful:
Post your response to the whole net. That request applies only to
dumb people who don't have something interesting to say. Your postings are
much more worthwhile than other people's, so it would be a waste to reply by
mail.
-- Emily Postnews Answers Your Questions on Netiquette
- this post brought to you by the Automated Last Post Generator...