|
|
Subscribe / Log in / New account

Security

Review: Exploiting Software

[Cover] The world is full of books on how to secure systems, how to write secure code, and how to deal with breakins. There are rather fewer books that go into details of how to compromise software and carry out breakins. That gap has now been filled by Exploiting Software: How To Break Code by Greg Hoglund and Gary McGraw. This book's purpose is not to help the crackers; those people, according to the authors, already know about the techniques described here. Instead, the authors wish to help programmers and system administrators achieve better security through an understanding of how security failures happen.

To that end, this book covers a number of ways of attacking software. Direct reverse engineering gets a full chapter, much of which is dedicated to things you can do with the Windows debugger. There is a chapter on server attacks; it looks at carefully crafted input, configuration attacks, filesystem browsing, poor authentication schemes, etc. The chapter on client-side attacks covers cross-site scripting, embedded control characters, and more. The creation of malicious input gets a chapter of its own, where issues of how to track what a server does with input, tricks with character encodings, and more are discussed; this chapter also looks at how to get malicious input past intrusion detection systems. Buffer overflows and format string vulnerabilities are discussed in detail; interestingly, the authors claim that format string vulnerabilities were known to the "black hats" for years before being more widely "discovered" and, mostly, fixed. The book finishes with a discussion of root kits.

If you are a cracker wannabe looking to learn the trade, this book might provide a good start - though you will still have to fill in a lot of the details yourself. This book is not a simple cookbook for crackers, though some of its advice ("Also, remember that a Web server will create log files of all injection activity, which tends to stick out like a sore thumb. If this pattern is used, clean the log files as soon as possible.") is not necessarily useful for anybody else. The coverage of the book is not entirely complete either; it has little space for kernel attacks, SQL injection, or exploit generation tools, for example. While Linux is often mentioned, the bulk of the discussion uses Windows for its examples (though almost all of the concepts discussed apply equally to either system). Even so, Exploiting Software is a worthwhile addition to the bookshelf of anybody interested in security issues - as most of us should be.

Comments (3 posted)

Quick review: Secure Architectures with OpenBSD

One other book that recently showed up in our mailbox is Secure [Cover] Architectures With OpenBSD by Brandon Palmer and Jose Nazario. This book is, primarily, a system administration manual, but, since it's for OpenBSD, it is strongly oriented toward running secure systems. It covers all of the usual topics, though often a bit more superficially than one might like. The range of topics is wide, however, extending into firewalling, Kerberos, S/Key, IPSec, IPv6, intrusion detection, etc. If you're looking for a pure BSD administration manual, you may want to supplement this one with the Unix Administration Handbook or something similar. This book, however, is a good, thorough overview of how the OpenBSD variant of BSD is put together and how to keep it secure.

Comments (none posted)

New vulnerabilities

ident2 buffer overflow

Package(s):ident2 CVE #(s):CAN-2004-0408
Created:April 22, 2004 Updated:April 28, 2004
Description: Jack <jack -AT- rapturesecurity.org> discovered a buffer overflow in ident2, an implementation of the ident protocol (RFC1413), where a buffer in the child_service function was slightly too small to hold all of the data which could be written into it. This vulnerability could be exploited by a remote attacker to execute arbitrary code with the privileges of the ident2 daemon (by default, the "identd" user).
Alerts:
Debian DSA-494-1 ident2 2004-04-21

Comments (none posted)

kernel - root exploit in MCAST_MSFILTER

Package(s):kernel CVE #(s):CAN-2004-0424
Created:April 22, 2004 Updated:June 11, 2004
Description: A locally exploitable integer overflow has been found the multicast code of the Linux kernel versions 2.4.22 to 2.4.25 and 2.6.1 - 2.6.3. A successful exploit could lead to full superuser privileges.
Alerts:
Whitebox WBSA-2004:183-01 kernel 2004-06-10
SuSE SuSE-SA:2004:010 kernel 2004-05-05
Slackware SSA:2004-119-01 kernel 2004-04-28
Mandrake MDKSA-2004:037 kernel 2004-04-27
Red Hat RHSA-2004:183-01 kernel 2004-04-22
Fedora FEDORA-2004-111 kernel 2004-04-22
Trustix TSLSA-2004-0022 kernel 2004-04-21

Comments (1 posted)

LCDproc: Buffer overflows and format string vulnerabilities

Package(s):LCDproc CVE #(s):
Created:April 27, 2004 Updated:April 28, 2004
Description: Due to insufficient checking of client-supplied data, the LCDd server is susceptible to two buffer overflows and one string buffer vulnerability. If the server is configured to listen on all network interfaces (see the Bind parameter in LCDproc configuration), these vulnerabilities can be triggered remotely.
Alerts:
Gentoo 200404-19 lcdproc 2004-04-27

Comments (none posted)

racoon: denial of service vulnerability

Package(s):ipsec-tools racoon iputils CVE #(s):CAN-2004-0403
Created:April 26, 2004 Updated:July 29, 2004
Description: racoon does not check the length of ISAKMP headers. Attackers may be able to craft an ISAKMP header of sufficient length to consume all available system resources, causing a Denial of Service. This advisory contains additional details.
Alerts:
Red Hat RHSA-2004:308-01 ipsec-tools 2004-07-29
Mandrake MDKSA-2004:069 ipsec-tools 2004-07-14
Fedora FEDORA-2004-197 ipsec-tools 2004-06-28
Whitebox WBSA-2004:165-01 ipsec-tools 2004-06-10
Fedora FEDORA-2004-132 ipsec-tools 2004-05-19
Red Hat RHSA-2004:165-01 ipsec-tools 2004-05-11
Gentoo 200404-17 ipsec-tools 2004-04-24

Comments (none posted)

XFree86 minor DoS vulnerability

Package(s):XFree86 CVE #(s):CAN-2004-0093 CAN-2004-0094
Created:April 22, 2004 Updated:April 28, 2004
Description: XFree86 is an implementation of the X Window System, providing the core graphical user interface and video drivers.

Flaws in XFree86 4.1.0 allow local or remote attackers who are able to connect to the X server to cause a denial of service via an out-of-bounds array index or integer signedness error when using the GLX extension and Direct Rendering Infrastructure (DRI).

Alerts:
Red Hat RHSA-2004:152-01 XFree86 2004-04-21

Comments (1 posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2004, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds