|
|
Subscribe / Log in / New account

Security

Brief items

Advisories and relative security

A recent CNN article asks why the Linux community hasn't used the Blaster and SoBig worms for marketing purposes. The author concludes:

Etiquette and naiveté aside, however, perhaps the biggest reason Linux companies haven't touted their products' security advantages is that it's unclear right now how much of an advantage they really possess. Consider this: The Computer Emergency Response Team (CERT) released data showing that 16 of the 29 security advisories it released last year involved Linux or open-source products.

This seems like a good time to go and look at what these advisories really covered. CERT's 2002 advisories were:

Linux-relatedMicrosoftSomething else
2002-03 (SNMP)
2002-05 (PHP)
2002-06 (Radius)
2002-07 (zlib)
2002-12 (dhcpd)
2002-15 (BIND9)
2002-17 (Apache)
2002-18 (OpenSSH)
2002-19 (libresolv)
2002-21 (PHP)
2002-23 (OpenSSL)
2002-24 (OpenSSH trojan)
2002-25 (XDR)
2002-27 (mod_ssl worm)
2002-28 (sendmail trojan)
2002-29 (kerbd)
2002-30 (tcpdump trojan)
2002-31 (BIND8)
2002-02 (AOL ICQ)
2002-04 (IE)
2002-09 (IIS)
2002-13 (MSN Chat)
2002-22 (SQL Server)
2002-33 (MDAC)
2002-37 (Windows shell)
2002-01 (CDE)
2002-03 (SNMP)
2002-08 (Oracle)
2002-10 (rpc.walld)
2002-11 (cachefs)
2002-14 (JRun)
2002-16 (Yahoo Messenger)
2002-20 (CDE)
2002-26 (CDE)
2002-32 (OmniSwitch)
2002-34 (Solaris XFS)
2002-35 (RaQ Servers)
2002-36 (proprietary SSH)

Interestingly, we count 37 advisories for last year, not 29. There is no contesting the fact that the Linux-related column is significantly longer than the others. One could quibble a bit: the mod_ssl worm advisory covers the same vulnerability as the OpenSSL advisory, and the three trojan advisories are individual site compromises rather than widespread vulnerabilities. But that sort of quibbling wouldn't really change the situation.

On the other hand, it is a legimate question to ask why the mod_ssl worm (which affected very few systems) merits a CERT advisory, when worms like Klez, Bugbear, Badtrans, Nimda, and Sircam do not. The costs imposed by any one of those worms is likely to exceed that of all the Linux vulnerabilities put together.

The real point is that anybody who tries to make a security point by counting advisories is building a weak argument. A more honest look at the situation would ask how many vulnerabilities have been actively exploited, and how quickly they have been fixed.

That said, we couldn't resist putting together a 2003 table while we were at it:

Linux-relatedMicrosoftSomething else
2003-01 (dhcpd)
2003-02 (cvs)
2003-07 (sendmail)
2003-10 (XDR)
2003-12 (sendmail)
2003-13 (snort)
2003-21 (GNU FTP crack)
2003-03 (Locator)
2003-04 (SQL server worm)
2003-08 (Windows shares)
2003-09 (ntdll)
2003-14 (html32)
2003-16 (RPC)
2003-18 (DirextX)
2003-19 (RPC exploits)
2003-20 (Blaster)
2003-22 (IE)
2003-05 (Oracle)
2003-06 (SIP)
2003-11 (Lotus)
2003-15 (IOS)
2003-17 (IOS)

This table suggests that the record for Linux-related software is nothing to be all that proud of, but certain other operating systems are currently in the lead in the "advisory count" race. On the other hand, in the fast-changing free software world, it is somehow comforting to see that sendmail continues to give advisory writers something to do - as long as you're running a different MTA...

Comments (15 posted)

New vulnerabilities

gkrellm: buffer overflow

Package(s):gkrellm CVE #(s):
Created:August 29, 2003 Updated:September 3, 2003
Description: A buffer overflow was discovered in gkrellmd, the server component of the gkrellm monitor package, in versions of gkrellm 2.1.x prior to 2.1.14. This buffer overflow occurs while reading data from connected gkrellm clients and can lead to possible arbitrary code execution as the user running the gkrellmd server.
Alerts:
Mandrake MDKSA-2003:087 gkrellm 2003-08-28

Comments (none posted)

horde: session hijacking

Package(s):horde CVE #(s):
Created:September 1, 2003 Updated:September 3, 2003
Description: According to this advisory an attacker could send an email to a victim who used HORDE MTA, to get the victim to visit a website, which then logs all available information about the victim's system.
Alerts:
Gentoo 200309-02.1 horde 2003-09-01
Gentoo 200309-02 horde 2003-09-01

Comments (none posted)

mindi: insecure file creations

Package(s):mindi CVE #(s):CAN-2003-0617
Created:September 2, 2003 Updated:October 1, 2003
Description: Mindi versions prior to 0.86 creates files in /tmp which could allow local user to overwrite arbitrary files.

CAN-2003-0617

Alerts:
Gentoo 200309-05 mindi 2003-09-02
Debian DSA-362-1 mindi 2003-08-02

Comments (none posted)

node: buffer overflow, format string

Package(s):node CVE #(s):
Created:September 1, 2003 Updated:September 3, 2003
Description: Morgan alias SM6TKY discovered and fixed several security related problems in LinuxNode, an Amateur Packet Radio Node program. The buffer overflow he discovered can be used to gain unauthorised root access and can be remotely triggered.
Alerts:
Debian DSA-375-3 node 2003-08-29

Comments (none posted)

pam_ldap: non-functioning host restrictions

Package(s):pam_ldap CVE #(s):
Created:September 3, 2003 Updated:September 3, 2003
Description: pam_ldap 161 contains a bug in the pam_filter module which prevents host-based restrictions from working as advertised; version 1.62 fixes the problem.
Alerts:
Mandrake MDKSA-2003:088 pam_ldap 2003-09-02

Comments (none posted)

phpwebsite: SQL Injection, DoS and XSS Vulnerabilities

Package(s):phpwebsite CVE #(s):
Created:September 2, 2003 Updated:September 3, 2003
Description: phpwebsite contains an sql injection vulnerability in the calendar module which allows the attacker to execute sql queries. In addition phpwebsite is also vulnerable to XSS. More information can be found in the full advisory.
Alerts:
Gentoo 200309-03 phpwebsite 2003-09-02

Comments (none posted)

Resources

Open Source Security Testing Methodology Manual version 2.1 released

The Open Source Security Testing Methodology Manual (OSSTMM) is an open standard method for performing security tests, focusing on the items that need to be tested, what to do during a security test, and when different types of security tests should be performed.

Full Story (comments: none)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2003, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds