
Cross-Site-TRACE 187
quackking writes "Uh-oh! Looks bad for RFC 2068! Kudos to WhiteHat out of Santa Clara, CA for this one. ALL current web servers comply with this RFC, which means they ALL are vulnerable to this newly named attack - XST - cross-site-trace.
When misused, TRACE, part of the HTTP protocol, allows an unauthorized script to be passed to a Web server for execution even if the server is secured against running such scripts. Even devices like web-managed routers are open to this."
relation? (Score:3, Insightful)
Re:relation? (Score:1)
Re:relation? (Score:1)
Re:relation? (Score:4, Interesting)
Re:relation? (Score:1)
Re:relation? (Score:2)
Re:relation? (Score:3, Interesting)
Re:relation? (Score:2, Insightful)
Re:relation? (Score:2)
nd.edu, rpi.edu, psu.edu, syr.edu, ohiou.edu, albany.edu... and from the hostnames, they don't sound like student machines, but real servers.
Sigh.
-l
Re:relation? (Score:2)
-Mark
Re:relation? (Score:1)
For me, this has just started up... I attach my Zone Labs Log File so you may compare the activity to what you are seeing. ( I am not trying to take up valuable area, but rather am trying to give you another dataset to compare your experiences to. Presently I am getting hit about once every fifteen seconds attempting to connect to my port 1434. As you can see, these are coming from various other IP's on varying ports.
I am on a dialup. DHCP. ( I get whatever IP PacBell assigne me for the duration of my connect).
ZoneLabs Log:
FWIN,2003/01/24,14:23:48 -8:00 GMT,216.161.101.173:62540,67.112.46.155:3525,TCP FWIN,2003/01/24,14:23:48 -8:00 GMT,216.161.101.173:62539,67.112.46.155:3525,TCP FWIN,2003/01/24,14:23:48 -8:00 GMT,216.161.101.173:62541,67.112.46.155:3525,TCP FWIN,2003/01/24,14:30:22 -8:00 GMT,67.112.46.162:1028,67.112.46.155:137,UDP FWIN,2003/01/24,14:30:28 -8:00 GMT,67.112.46.161:1097,67.112.46.155:137,UDP FWIN,2003/01/24,14:37:08 -8:00 GMT,67.112.46.161:1098,67.112.46.155:137,UDP FWIN,2003/01/24,14:38:54 -8:00 GMT,67.112.46.161:1096,67.112.46.155:137,UDP FWIN,2003/01/24,14:40:16 -8:00 GMT,4.62.221.54:0,67.112.46.155:0,ICMP FWIN,2003/01/24,14:48:20 -8:00 GMT,67.112.46.161:1025,67.112.46.155:137,UDP FWIN,2003/01/24,15:03:22 -8:00 GMT,200.64.172.254:1084,67.112.46.155:137,UDP PE,2003/01/25,00:32:57 -8:00 GMT,Netscape Navigator application file,206.13.29.12:53,N/A
and this is when the crap started flying
PE,2003/01/25,00:33:08 -8:00 GMT,The Proxomitron,206.13.29.12:53,N/A FWIN,2003/01/25,00:37:22 -8:00 GMT,128.205.156.40:3537,67.112.46.156:1434,UDP FWIN,2003/01/25,00:38:42 -8:00 GMT,67.112.251.186:2991,67.112.46.156:80,TCP FWIN,2003/01/25,00:40:02 -8:00 GMT,211.13.231.200:4216,67.112.46.156:1434,UDP FWIN,2003/01/25,00:41:00 -8:00 GMT,63.254.129.14:4632,67.112.46.156:1434,UDP FWIN,2003/01/25,00:41:32 -8:00 GMT,207.97.136.48:4899,67.112.46.156:1434,UDP FWIN,2003/01/25,00:44:32 -8:00 GMT,64.239.122.46:53342,67.112.46.156:1434,UDP FWIN,2003/01/25,00:45:10 -8:00 GMT,207.46.200.139:2126,67.112.46.156:1434,UDP FWIN,2003/01/25,00:51:02 -8:00 GMT,62.149.128.35:1235,67.112.46.156:1434,UDP FWIN,2003/01/25,00:54:58 -8:00 GMT,63.240.201.75:1478,67.112.46.156:1434,UDP FWIN,2003/01/25,00:56:36 -8:00 GMT,216.97.147.185:1706,67.112.46.156:1434,UDP FWIN,2003/01/25,00:58:12 -8:00 GMT,129.250.226.100:3581,67.112.46.156:1434,UDP FWIN,2003/01/25,00:58:28 -8:00 GMT,24.30.207.206:4096,67.112.46.156:1434,UDP FWIN,2003/01/25,01:01:10 -8:00 GMT,212.219.8.246:4686,67.112.46.156:1434,UDP FWIN,2003/01/25,01:01:48 -8:00 GMT,10.208.128.97:4222,67.112.46.156:1434,UDP FWIN,2003/01/25,01:05:42 -8:00 GMT,164.67.192.239:4850,67.112.46.156:1434,UDP FWIN,2003/01/25,01:06:12 -8:00 GMT,64.15.237.180:1459,67.112.46.156:1434,UDP FWIN,2003/01/25,01:08:36 -8:00 GMT,66.230.209.230:3513,67.112.46.156:1434,UDP FWIN,2003/01/25,01:09:46 -8:00 GMT,130.94.19.249:2482,67.112.46.156:1434,UDP FWIN,2003/01/25,01:09:56 -8:00 GMT,65.118.242.70:3108,67.112.46.156:1434,UDP FWIN,2003/01/25,01:10:30 -8:00 GMT,62.129.134.253:1226,67.112.46.156:1434,UDP FWIN,2003/01/25,01:12:40 -8:00 GMT,64.210.7.98:4182,67.112.46.156:1434,UDP FWIN,2003/01/25,01:13:04 -8:00 GMT,66.28.8.72:3420,67.112.46.156:1434,UDP PE,2003/01/25,01:13:09 -8:00 GMT,Netscape Navigator application file,127.0.0.1:8080,N/A FWIN,2003/01/25,01:14:00 -8:00 GMT,210.214.8.133:1025,67.112.46.156:137,UDP FWIN,2003/01/25,01:16:06 -8:00 GMT,205.243.25.86:4181,67.112.46.156:1434,UDP FWIN,2003/01/25,01:17:24 -8:00 GMT,217.160.133.189:1098,67.112.46.156:1434,UDP FWIN,2003/01/25,01:18:48 -8:00 GMT,139.134.5.239:2274,67.112.46.156:1434,UDP FWIN,2003/01/25,01:19:26 -8:00 GMT,80.13.193.122:1026,67.112.46.156:137,UDP FWIN,2003/01/25,01:19:38 -8:00 GMT,145.101.195.133:2886,67.112.46.156:1434,UDP FWIN,2003/01/25,01:24:00 -8:00 GMT,62.20.108.24:1291,67.112.46.156:1434,UDP FWIN,2003/01/25,01:24:12 -8:00 GMT,65.160.127.210:2722,67.112.46.156:1434,UDP FWIN,2003/01/25,01:26:20 -8:00 GMT,157.169.10.11:3281,67.112.46.156:1434,UDP FWIN,2003/01/25,01:26:48 -8:00 GMT,129.125.140.178:2536,67.112.46.156:1434,UDP FWIN,2003/01/25,01:27:16 -8:00 GMT,193.140.134.125:1033,67.112.46.156:1434,UDP FWIN,2003/01/25,01:28:32 -8:00 GMT,216.29.52.98:3466,67.112.46.156:1434,UDP FWIN,2003/01/25,01:28:56 -8:00 GMT,129.242.210.240:1574,67.112.46.156:1434,UDP FWIN,2003/01/25,01:32:00 -8:00 GMT,212.141.84.123:1954,67.112.46.156:1434,UDP FWIN,2003/01/25,01:33:16 -8:00 GMT,65.209.2.2:1062,67.112.46.156:1434,UDP FWIN,2003/01/25,01:37:22 -8:00 GMT,203.251.202.13:1576,67.112.46.156:1434,UDP FWIN,2003/01/25,01:38:16 -8:00 GMT,63.215.151.135:1970,67.112.46.156:1434,UDP FWIN,2003/01/25,01:38:30 -8:00 GMT,61.61.104.231:1028,67.112.46.156:137,UDP PE,2003/01/25,01:41:18 -8:00 GMT,OPERA.EXE,127.0.0.1:8080,N/A FWIN,2003/01/25,01:41:34 -8:00 GMT,128.186.85.26:1757,67.112.46.156:1434,UDP FWIN,2003/01/25,01:43:00 -8:00 GMT,195.194.95.160:4327,67.112.46.156:1434,UDP FWIN,2003/01/25,01:43:10 -8:00 GMT,63.243.24.97:1107,67.112.46.156:1434,UDP FWIN,2003/01/25,01:45:18 -8:00 GMT,202.125.128.100:1603,67.112.46.156:1434,UDP FWIN,2003/01/25,01:45:38 -8:00 GMT,67.35.15.77:0,67.112.46.156:0,ICMP
Actually, while I type this, I have had ZoneLabs notify me each time I get a hit, and I am now up to hit #12 or so. Weird! Its gonna be interesting to read on Slashdot just what this thing is.
Re:relation? (Score:1)
http://www.der-keiler.de/Mailing-Lists/Securiteam/ 2002-07/0115.html
1434 is the general connection accept port. (Score:4, Informative)
It's best to 'hide' the SQLServer from the internet, and/or disable TCP/IP listening for SQLServer totally when it's connected to the Internet. MS also suggests SQLServer should never be exposed to the Internet directly. You can hide SQLServer (2000) directly, using the Server network utility, shipped with SQLServer. You can there first deselect TCP/IP as a protocol that's active, and if you need it, you can select 'hide' to hide the server on the internet, however it's better to disable TCP/IP totally, since you do not need it when you work with SQLServer from the same box (f.e. a website running on the same box accessing the SQLServer).
Oh, of course it should be mentioned, there is a patch for this available at MS' technet site.
Re:relation? (Score:1)
Traceroute to a.root-servers.net:
<snip/>
14 376 ms 340 ms 337 ms so-2-3-0.washdc3-nbr1.bbnplanet.net [4.24.4.109]
15 401 ms 347 ms 336 ms p2-0.vienna1-nbr2.bbnplanet.net [4.24.4.214]
16 345 ms 349 ms 343 ms p1-0.vienna1-cr6.bbnplanet.net [4.0.2.138]
17 494 ms 471 ms 460 ms h2-0.internap5.bbnplanet.net [4.1.9.242]
18 345 ms 334 ms 334 ms border7.ge2-0-bbnet1.wdc.pnap.net [216.52.127.11]
19 * * * Request timed out.
(goes on and on.... Gives up at 30)
So it looks like 1 root server cannot be reached from my location (Geelong, Australia). I was able to reach b.root-servers.net though. I can't be bothered to do all of them.
Re:relation? (Score:1)
Re:relation? (Score:4, Informative)
Re:relation? (Score:4, Funny)
Sprint seems to be doing very well, though.
Re:relation? (Score:3, Funny)
Re:relation? (Score:1, Offtopic)
No relation (Score:3, Informative)
I'm watching my firewall logs fill up even as I type, and all the 1434 hits are coming from different IPs... no dupes yet that I can see (maybe there are... but I'm not planning on sitting here all night reading logs).
These SQL attacks are coming from a plethora of different ports on the machines that are hitting me... anybody know if this is a normal part of this worm's behavior?
Re:No relation (Score:3, Informative)
It details stack-based, heap-based and network-based DOS vulnerabilities. Wheee!
Re:relation? (Score:5, Funny)
hrmmmmmmmmmmmmmmm????
Re:OT: So, I'm not the only one? (Score:1)
Are you sure about that? I mean, any port that isn't accepting connections should send a "Connection refused by host" message, shouldn't it?
So, if the server machine is getting hit hard on an inactive port, the machines tcp/ip stack, at least, would still have to respond to each and every connection attempt, wouldn't it?
I guess I shouldn't have slept through class.
Re:OT: So, I'm not the only one? (Score:1)
Tell me about it. I'm a DSL subscriber, the DSL modem uses NAT, and it does not have any kind of reporting abilities. Port forwarding is turned off, so I have no idea if the problems I'm having are because of my ISP, or my DSL modem working so hard.
How I wish everyone was still using BBS's. At least then, when you got a busy signal, you knew what the problem was.
not related (Score:5, Informative)
It is not likely to be related to the current DDOS [matrix.net], which seems to be this MS vuln [matrix.net].
Re:not related (Score:5, Informative)
Re:not related (Score:1, Offtopic)
Re:not related (Score:2, Insightful)
Re:not related (Score:4, Informative)
Disassembly of the current probe packets available here [freedom.org] for what its worth. This is a nasty little sucker.
Re:not related (Score:1)
Speaking of new exploits, how about reposting a bad link to get uber karma? Or has this one been in the bag for awhile already?
Nukes & ResComp (Score:1)
So the Internet, which is supposedly impervious to a nuclear barrage, has succumbed to a simple attack from some moderately skilled hacker(s). Amazing how much more damaging sheer traffic volume can be than a physical destruction of the network, eh?
At least people will soon be able to continue downloading things like this [dhs.org]. (Beware, it's > 3 gigs--a long download from my slow connection!)
Re:Nukes & ResComp (Score:1)
Makes for an interesting evening I guess.
Re:not related (Score:3, Informative)
I don't believe that that vulnerability is what's being exploited at the moment. From the CERT article:
I'm getting hammered, and I am not a Microsoft SQL server. It's probably not too unreasonable to assume that SQL Server is what's been exploited, but I don't think it's the exploit you mentioned.
The write-up is misleading (Score:5, Informative)
The script is not executed on the server. It is executed on the client.
This is a sort of cross-site scripting vulnerability, not an "execute arbitrary commands on any web server" vulnerability like the writeup suggests.
Re:The write-up is misleading (Score:3, Informative)
It is just that on the client, to prevent cross side scripting, there is some sandboxing; which is now violated.
That is called cross site scripting.
/!\ Security Alert _ [] [X] (Score:5, Funny)
Internet IP Address. With This Address, Someone Can
Immediately Begin Attacking Your Computer! [ OK ]
Shut up Slashdot. I get all the Security Alerts I need from media*.fastclick.net.
This story is crap (Score:5, Informative)
http://online.securityfocus.com/archive/1/307778/
http://online.securityfocus.com/archive/1/308165/
Re:This story is crap:/.up date (Score:1)
Web Vulnerability Puts Internet Users, Sites At Risk
ByDavid Worthington, Freelance Writer, special to ExtremeTech
January 23,2003 9:10AM
IE Vulnerability Puts Internet Users, Sites At Risk
BugTraq-Thor Larholm
--
Re:This story is crap (Score:3, Funny)
Hey, don't knock alarmist crap. It's a real cash cow for some people!
CRAP! (If it's not Scottish, it's...) (Score:1, Informative)
Re:CRAP! (If it's not Scottish, it's...) (Score:2)
Re:CRAP! (If it's not Scottish, it's...) (Score:3, Insightful)
There can be no security vulnerability in HTTP that is due to cross site scripting PERIOD.
This is because support scripting was never considered in the design of HTTP. Scripting has known security problems. The onus for solving those problems rested and rests today on the idiots who introduced scripting. It has nothing to do with the protocol layer.
TRACE was in the HTTP specs long long before Javascript was cobbled together in two weeks at Netscape. Netscape could not even be bothered to ask for advice from the HTTP community before unleashing their abomination, so why is this supposed to be my fault eh?
Java script sucks, alwasy has always will. It was yet another of those hacks Netscape put in to please the advertisers or whichever customer they were going after that week. As a result we have pop-under adds and sites can screw up the navigation buttons. Oh yes and sites keep coming up 'javascript error class not found'.
None of the uses javascript is necessary for could not have been better supported through extensions to HTML. But the Netscape guys didn't want to do that because they wanted to try to control the standards by simply throwing whatever crap they wrote over the wall and faxing the 'specification' to W3C to they could say that it had been submitted in their press release.
Well..... (Score:2, Informative)
I just finished reading this so-called whitepaper and the press release, and
all I can say is hyped, sensationalised snakeoil.
The HttpOnly cookie feature, a proprietary Microsoft extension designed to
mitigate a single aspect of XSS, can be circumvented in myriads of ways. In
fact, reading the HTTP response in any other way than through the
document.cookie property immediately exposed through JS will return the
cookie to you. Calling from JS to a Java applet that in turn parses a HTTP
response, using a Flash movie (or most any other plugin) or even needlessly
complicating matters by parsing the BODY of a TRACE response received
through XMLHTTP - such as this 'whitepaper' suggests.
By design, HttpOnly makes the cookie available only through the HTTP
headers - which, among many others, the XMLHTTP control can read.
What we end up with from WhiteHat Security is a way to circumvent the
HttpOnly cookie feature in IE6SP1, nothing else. In itself, worthy of a note
in a roundup of browser problems or a comment in a reply to the posting
announcing the HttpOnly feature on Bugtraq - but hardly a whitepaper,
pressrelease and blurbs such as comparing this to Code Red and Nimda or
calling this a flaw in all web servers worldwide. This is simply not "a new
class of web-app-sec attack" or a flaw in TRACE, as hyped by WhiteHat
Security.
System administrators should most definitely not waste their precious time
on implementing the silly workarounds suggested, such as disabling
TRACE/TRACK requests. The one, and only, impact the discovery from WhiteHat
Security has is that it re-enables cookie reading from JS despite if you had
already cared to specifically alter your webapplication to accomodate this.
in short, absolute FUD dreamt up by some "whiteHatSecurity" bahaha
Re:Well..... (Score:2, Redundant)
Re:Well..... (Score:1)
Re:Well..... (Score:1)
Of course I, unlike you, never demanded anyone or anything be "modded down." I didn't care that much. It's not like karma actually.. you know.. matters.
Re:Well..... (Score:2)
but not for long, with this comment!
but since i said that, people won't mod me down!
but now they will!
my brain hurts!
Note - above text is pasted from bugtraq (Score:3, Informative)
Opera effected? (Score:1, Interesting)
will it effect Opera browser?
.
Re:Opera effected? (Score:1)
What the hell is that document trying to say?? In english please.
THE XSL VULNERABILITY IS SNAKE OIL (Score:5, Informative)
If your applications aren't vulnerable to XSS, you have nothing to worry about w.r.t. HTTP TRACE. If your applications ARE vulnerable to XSS, you have bigger problems than HTTP TRACE.
If users visiting other sites somehow have untrusted code running in them, which performs an HTTP TRACE to your site, the user's browser is broken for not enforcing domain restrictions.
Ignore this advisory, it's sensationalist snakeoil. Leaving HTTP TRACE enabled is harmless (although you probably don't use it, so disable it anyway).
A couple choice quotes from the "whitepaper" (Score:5, Insightful)
To re-iterate: your web server or site isn't vulnerable because it supports trace, that's about as silly as blaming ping packets for the ping-of-death problems on early windoze systems, sheesh.
This is all a bunch of crap that requires a browser to be vulnerable to cross scripting, and for the user to have visited a malicious site just beforehand.
sorry about the lack of breaks... (Score:4, Informative)
From: Michael Bacarella
Date: Fri Jan 24, 2003 11:11:41 PM America/Los_Angeles
Resent-To: bugtraq@securityfocus.com
To: nylug-talk@nylug.org, wwwac@lists.wwwac.org, linux-elitists@zgp.org
Subject: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!
I'm getting massive packet loss to various points on the globe.
I am seeing a lot of these in my tcpdump output on each
host.
02:06:31.017088 150.140.142.17.3047 > 24.193.37.212.ms-sql-m: udp 376
02:06:31.017244 24.193.37.212 > 150.140.142.17: icmp: 24.193.37.212 udp port ms-sql-m unreachable [tos 0xc0
It looks like there's a worm affecting MS SQL Server which is
pingflooding addresses at some random sequence.
All admins with access to routers should block port 1434 (ms-sql-m)!
Everyone running MS SQL Server shut it the hell down or make
sure it can't access the internet proper!
I make no guarantees that this information is correct, test it
out for yourself!
--
Michael Bacarella 24/7 phone: 646 641-8662
Netgraft Corporation http://netgraft.com/
"unique technologies to empower your business"
Finger email address for public key. Key fingerprint:
C40C CB1E D2F6 7628 6308 F554 7A68 A5CF 0BD8 C055
Re:sorry about the lack of breaks... (Score:5, Informative)
Re:sorry about the lack of breaks... (Score:3, Insightful)
SQL Server 2000 SP3 (Score:1)
Re:sorry about the lack of breaks... (Score:1)
this is fud
ummm.... (Score:1)
In particular, it affects XMLHTTP.
See here [securityfocus.com] and here [securityfocus.com]
Re:sorry about the lack of breaks... (Score:2, Informative)
That ICMP packet is not indicative of a ping flood, that's an ICMP unreachable message from the host saying it can't get to 150.140.142.17 on UDP 1434. Since its UDP, which is not stateful, you probably have some sort of access control preventing your host from making outbound UDP connections on 1434.
At least... (Score:4, Funny)
Can you imagine the royal slashdotting that RIAA/MPAA/MS/etc would receive if the thousands of script kiddies that read /. suddenly had access to such a thing?
Perhaps this is what Obi-Wan was talking about when he felt the tremor in the force, and the whole Alderaan blowing up thing was just a bizarre coincidence...
Re:At least... (Score:2)
Re:At least... (Score:1)
Read BugTraq (Score:5, Informative)
As been discussed on BugTraq the latest days, this is not a 'general' vunerablility, rather a bug in Microsoft's XMLHTTP component (nomatter what the whitepaper says).
References: RE: TRACE used to increase the dangerous of XSS. [securityfocus.com]
Original posting to Bugtraq [securityfocus.com]
Turn Javascript, activex, java off (Score:4, Informative)
Given what this attack can do, you have to 100% trust any site which you visit with these active stuff on, because they can use the active stuff to snarf your cookies and info for other sites.
In this light, how should you treat a site which absolutely _requires_ you to turn such dangerous stuff on in order to use their site? Is it worth all that potential hassle just to see some stupid shockwave which only the PHB likes?
Is there a javascript/activex/java program that will turn off javascript/activex/java support in a viewer's browser?
I also proposed a tag to mark regions of HTML as unsafe so the browser ignores any javascript/active stuff that slips through the site's filters. But there wasn't any interest. This doesn't help if users visit malicious sites, but it helps decent sites protect their users from stuff slipping through.
Re:Turn Javascript, activex, java off (Score:1)
Re:Turn Javascript, activex, java off (Score:1)
Cookies... well, to secure your cookies, the best policy is to turn all the aforementioned capabilities of your browser off. I for one prefer a little more security while browsing as opposed to seeing stupid sites with badly written/unnessesary scripting.
Turn off flash too (Score:2)
You can turn cookies off if you want, but that makes it hard to implement sessions between your browser and the site you are using. Implementing sessions by using cgi parameters has disadvantages like if your browser leaves to another site, your browser could send the cgi parameter in the http referrer field.
So if your browser supports it just turn on cookies for selected sites and leave it off for other sites. The risk with cookies - if sites work together they can track where you go and what you do.
Whereas with the active content stuff - javascript, activex, flash etc, you risk losing control over your entire computer, and your online accounts with other sites. Actually Java has been a tad more secure, but so far most java applets are either jokes or toys. You won't miss most of them, and it's likely they'll be ported to your cellphone anyway
Other scripts? They'd probably be just as dangerous, but most people don't have python/perl plugins in their browser, so attackers are less likely to cater for that.
Sure the risks aren't that high, it's just the consequences can be really annoying. You know that spam you get? Those by crooks who think nothing of sneaking in installs of software that dial up international numbers? If you or your cat accidentally clicked one of their urls, how sure are you that these crooks won't abuse this trace flaw to steal info? They can get your browser to send trace requests to the usual sites - banks, ebay, amazon, hotmail, yahoo etc, and collect all the echoed associated cookies and authentication data.
Even turning such stuff off isn't 100%. Last year whilst testing something out I actually managed to create some sort of a virus/worm on a site just by using IFRAME or img src (quite harmless - but in theory could do other nastier things ). Got them to fix it tho. That sort of problem affects the site and info on the site. THe site is responsible for securing their apps to prevent this sort of thing.
You secure your computer and apps and hopefully your favourite site secures their stuff.
Re:Turn Javascript, activex, java off (Score:3, Interesting)
For the last couple of weeks, IE has been popping up warnings that my security settings may not allow Slashdot to display properly, because I don't have ActiveX scripting enabled. I do allow Slashdot to use Javascript, but don't allow everything it wants to do.
The stupid warnings are really irritating, but the only things I'm losing are the banner ads at the top of the page. I think the offending code is this:
var prs="ads.PointRoll.com/PRServe/?ad=424m2002121917
document.write("<scr"+"ipt language='JavaScript' src='http://"+prs+"'></scr"+"ipt>");
Any suggestions on how to get rid of this irritant?
Re:Turn Javascript, activex, java off (Score:2)
Of course, the people at Slashdot who sell the ads might not think this is a good solution, since I don't see *any* ads now.
Re:Turn Javascript, activex, java off (Score:2)
Trouble is even tho I have everything off, IE still pops up annoying dialogs on some sites e.g. www.theinquirer.net
Stupid IE. I know the site may not work "properly" with the stuff turned off, that's why I turn it off. Stop bugging me.
I'm not switching to Mozilla/Netscape because Mozilla is bloatware - even more annoying. IE is pretty safe with all that crap turned off - 99% of the vulns won't work even if your browser is unpatched.
Re:Turn Javascript, activex, java off (Score:2)
In Internet Explorer, javascript= activescript.
What is trace? (Score:1)
back of the request message. The final recipient of the request
SHOULD reflect the message received back to the client as the
entity-body of a 200 (OK) response
.
SitRep (Score:4, Informative)
I'm up because I'm multi-homed and I have no MS servers at all running on my network, but every other network that i know of running some MS servers is having blackouts.
We need to find out what is going on right now, and we need to make sure the media does NOT misrepresent exactly what is at fault. Everyone here has a responsibility!
Re:SitRep (Score:1)
Just saw the scanning originating from my friend's Windows machine. So at least it is not Linux only, if at all.
Cheers,
e.
Re:SitRep (Score:2, Insightful)
I fully-admit that some of the replies may not be related to the RFC trace issue that the main message applies to, however, the news article was posted right in the middle of a major backbone outage on the Internet. At this point, we're not sure the root cause of this, and so this seems the appropriate forum to post situation reports and news gathered. Slashdot remains one of the few trustworthy sites to check when things like this happen.
Hmm... Why RFC 2068? (Score:2, Informative)
Strange... RFC 2068 seems to be obsoleted by RFC 2616 since June 1999...
'net Traffic (Score:1)
Note the story submitter's name (Score:3, Informative)
Quack King.
Next!
--LP
Update (Score:4, Informative)
We have reason to believe that something called the "SQL Worm" is in play. Some sort of DDOS attack which creates overwhelming traffic on port 1434. This is all preliminary stuff, so take it as such but I have one link up and 3 others down.
I don't have confirmation or details on what systems are affected but we have information to indicate that the following networks are currently affected: Quest, Cable & Wireless, Broadwing, Sprint (partially). My Worldcom link seems to be unaffected (which is why I can post). Note that the connectivity interruptions may be regional but that's what we are dealing with in the South Central area of the US. This has been going on now for about 4-5 hours.
What we are seeing is a major outage due to DDOS on port 1434, on portions of the Internet backbone. At this point, the exact pattern of the outage has not been clarified.
Expect the problem to potentially be addressed when the backbone providers start filtering port 1434. However, it's taken them at least four hours to figure this out.
We just got notice (a few moments ago) that Quest finally started filtering port 1434 and everything went back up. So now we need to figure out what vulnerability this was. My information indicates that port 1434 is MS SQL server resolution service (see related CERT advisory [cert.org]. My initial impression is that while this vulnerability was discovered awhile back, someone just recently figured out a very effective exploit using the vulnerability. I am looking forward to hearing more about what people find out.
Likely not related to cross-trace issue (Score:3, Informative)
Alarmist crap article! (Score:5, Informative)
When I read the article on MacInTouch about the TRACE security flaw, I immediately checked our Mac based servers to find out if they support the TRACE option in HTTP. Here's a summary of the servers and the OPTIONS they support. These results were shown after connecting to the server via telnet:
%telnet www.domain.com 80
Trying 123.123.123.123
Connected to www.domain.com.
Escape character is '^]'.
OPTIONS / HTTP/1.1
Host: www.domain.com
* WebSTAR 3.x answers: 405 Method Not Allowed
* WebSTAR 4.4 and 4.5 allows GET, POST, HEAD
* WebSTAR V allows GET, POST, HEAD
* Apache/1.3.27 (Personal WebSharing MacOS X 10.2.3): GET, HEAD, OPTIONS, TRACE
* Apache/1.3.27 (iTools - MacOS X Server 10.2.2): GET, HEAD, OPTIONS, TRACE
* Apache/1.3.27 (iTools - MacOS X Server 10.2.2 - PHP 4.x): GET, HEAD, POST, PUT, DELETE, CONNECT, OPTIONS, PATCH, PROPFIND, PROPPATCH, MKCOL, COPY, MOVE, LOCK, UNLOCK, TRACE
When connecting to a system that has PHP 4.x installed, a lot more options are available.
This only shows which options are supported by which servers, however as the exact details of the flaw were not published, it's hard to say if you can use those options to exploit a server.
Piece of crap (Score:1)
"ALL current web servers?" (Score:2)
I'm possibly not entirely objective here, since my team makes a web server that is current, fairly popular, and most definitely not vulnerable.
Disabling the Use of Trace in Apache (Score:3, Informative)
I haven't tried this yet!
Re:Disabling the Use of Trace in Apache (Score:2, Informative)
The Apache Week article points out that since the vulnerability is in the browser, this doesn't address the issue very well...IE apparently supports other forms of cross-site scripting and header access.
This does contradict the claim in that other article that Apache needed a source code patch if you wanted to block TRACE. Fifteen seconds of editing and a SIGHUP to reread the configuration files are all you need, if that's what you want to do.
Properly secured sites aren't affected (Score:5, Informative)
Upon each page load, the IP address of the original session is checked with the sent cookie ID, and if they don't match, most applications will throw out the session completly. This annoys some with DHCP who like to maintain long sessions, but works a lot of the time for simple ID attacks (since most session IDs are generated from random numbers), because you now need to know both the IP and session ID of the user you want to impersonate. Granted, this can be had with a packet sniffer (for non SSL connections), but so can a lot of personal things. Next they'll be telling us it's quite easy to get into cars: just break the window. That doesn't mean its a security flaw.
Anyway, this is how most [good] sites work. Only fools store sensitive user information in cookies, and I would never subscribe to their site (yes, I check what goes in my cookies).
Also the article/press release (PR for this security company?) seems to be getting client/sever scripting confused, and is generally full of ignorant errors. How can it be trusted with the other claims it makes?
Re:Properly secured sites aren't affected (Score:2)
Associated Press article (Score:1)
Internet traffic broadly affected by electronic attack World Internet Lead
By Ted Bridis
Traffic on the many parts of the Internet slowed dramatically early today, the apparent effects of a fast-spreading, virus-like infection interfering with Web browsing and delivery of email.
Sites monitoring the health of the Internet reported significant slowdowns globally. Experts said the latest electronic attack bore remarkable similarities to ``Code Red'' virus during the summer of
2001 which also ground traffic to a halt on much of the Internet.
``It's not debilitating,'' said Howard Schmidt, one of President George W Bush's top cyber-security advisers.
``Everybody seems to be getting it under control.'' Schmidt said the FBI's National Infrastructure Protection Centre and private experts at the CERT Coordination Centre were monitoring the attacks.
The virus-like attack sought out vulnerable computers to infect on the Internet using a known flaw in popular database software from Microsoft Corp, called ``SQL Server''.
But the attacking software code was scanning for victim computers so randomly and so aggressively - sending out thousands of probes each second - that it overwhelmed many Internet data pipelines.
``This is like Code Red all over again,'' said Marc Maiffret, an executive with eEye Digital Security, whose engineers were among the earliest to study samples of the attack software. ``The sheer number of attacks is eating up so much bandwidth that normal operations can't take place.''
The attack sought to take advantage of a software flaw discovered in July 2002 that permits hackers to infect corporate database servers. Microsoft deemed the problem ``critical'' and offered a free repairing patch, but it was impossible to know how many computer administrators applied the fix.
``People need to do a better job about fixing vulnerabilities,'' Schmidt said.
bollocks - just another (IE) cross site vulnerabil (Score:3, Informative)
http://www.apacheweek.com/issues/03-01-24
http://online.securityfocus.com/archive/1/30816
Have more details.
Ironic... (Score:4, Funny)
It's lucky that the worm writer (Score:2)
It's only the fact the traffic is all destined for a certain destination port that makes it easy to filter.
You are filtering it out on your firewalls, aren't you?
This could have been a lot lot harder to filter out. I expect we'll see ThisWorm v2 soon.
I dread the day someone finds a hole in Apache, Sendmail or something really popular and writes a worm like this...
Re:It's lucky that the worm writer (Score:2)
I dread the day when someone writes a worm exploiting unpatched windows desktops. So far, code red and this one (code blue?! -- would be fitting) have infected only unpatched windows servers. Keeping desktops patched and up-to-date is far more difficult and if a worm hit them, there'd be an insane amount of infected boxes causing havoc on the net.
Re:It's lucky that the worm writer (Score:2)
a: whether the exploit is known about (which it was here),
b: whether there was a release (which there was here)
and c: whether admins of these boxes apply it. (which is the age old problem)
Targetting SQL servers is quite clever, as many of them will be in hosting centres with 34Mbs, burstable to 155Mb (for example).
Re:It's lucky that the worm writer (Score:3, Insightful)
Likewise, you shouldn't be running a database on the same box as your web server for any kind of serious production system - the web server goes on the DMZ, and the database server goes behind the firewall and only talks to trusted machines. Note that this applies to ANY database server, not just MS-SQL Server.
Editors ??! (Score:2)
I've stopped taking the time to M2, why bother when the base quality of this feed has dropped this low. You-all want to enhance quality on this site? Consider an M-system for the original posts/editors.
Maybe it's bin laden (Score:2, Funny)
Need more coffee (Score:2)
As I understand it:
1) My browser requests a page from www.evilhaxor.org.
2) ??????
3) My browser sends a TRACE request to slashdot.org.
4) slashdot.org sends back to my browser my cookie data.
5) ????
6) My browser sends ????? to www.evilhaxor.org.
7) ????
8) Profit!
OK, sorry, but having more than one ???? is sufficient to make a plan unworkable.
Besides, I run with Javascript off - so I guess the only real exploitable would be the Flash plugin (damn I will be glad when this bug [mozilla.org] is fixed!)
Bullshit (Score:3, Informative)
Re:stuff (Score:2, Informative)
Back to the drawing board, methinks. >p>Seriusly, yes, it's always an issue with a vulnerability discovered by a white hat - but on the whole, it's probably better that folk know about it than have to start figuring out what happened *after* they got hit with it.
Re:stuff (Score:2)
It's just windows admins aren't as likely to patch their systems as unix admins are. (for various reasons)
What works for linux, might not work for windows.