Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Security Hole Striptease
Security Focus ^ | May 27, 2002 | Tim Mullen

Posted on 05/29/2002 8:21:28 AM PDT by Dominic Harr

Security Hole Striptease


By letting the public catch a tantalizing peek at unannounced security holes, one prolific bug-finder turns up the heat on vendors to close them.

By Tim Mullen

May 27, 2002
The success of "SQLSpida," the worm that targets MS-SQL servers set upon the Net with a blank "SA" password, is testament to how badly basic security education is still needed.

As always, I place primary blame on the administrators of these boxes-leaving the SA password blank on any installation is a rookie move. To do so on a production machine placed on the Internet is just plain stupid. You have probably guessed that my use of "primary" infers a secondary party in responsibility; and indeed it does: Microsoft.

Microsoft has been riding the fence between marketing a concept of "trustworthy computing" and delivering a product that caters to the least common technically proficient denominator. Most products have been specifically designed to allow anyone who can click "Next" to perform a successful installation, but when it comes to their defense of insecure default software settings, they have a matter-of-fact way of telling everyone that they should know better.

For instance, Microsoft knows that the default application extension mappings in IIS are deadly, and we are blamed for not removing or remapping them; yet they are all enabled by default, and one must drill down deep into the interface to turn them off. In default installations of SQL, the SA user can perform remote system-level functions, yet they allow the password to be blank, and they don't even give us the functionality of renaming the account. Administrators are expected to set proper ACL's on system files, but even in their Advanced Server product, Microsoft assumes the admin to be so inept that Windows Explorer hides the contents of the WINNT directory so that the user won't monkey with them.
Litchfield says he provided fully-functioning exploit code to Microsoft, and it still took them a week to respond with simple confirmation they were able to recreate the issue.


It is time for Microsoft to start shipping products with more secure default settings, and to require a certain level of expertise from the administrators of these systems.

Vendor Notification Alerts
But safer out-of-the-box settings are not the only thing we need -- clouds continue to billow on the vulnerability landscape. Too many software vendors are so busy working on the Next Big Thing that they are unnecessarily putting their customers at risk by sitting on security patches for their current products.

If you are not familiar with David Litchfield or Next Generation Security Software, then you should be. Litchfield probably has the world record for discovering the most buffer overflows. And like many other security professionals, he won't disclose details of his exploits to the public until the vendor can release a patch.

But how long is one to wait for the vendor the get their act together? How long must customers' systems lay in wait of exploitation before a patch is released?

Last month, Litchfield discovered a remotely exploitable vulnerability in Sun's iPlanet. Though Sun has already developed a patch for this critical issue, Litchfield says, they have decided not to release it until the end of next month so it can be included in a rollup package. So much for customer service.

And if you think the current scans for SQL Server are high, you ain't seen nuthin' yet. Litchfield has also discovered a heap based buffer overflow in SQLServer 2000 that allows an unauthenticated attacker to gain remote control over the server in the context of the SQLSERVER service. Just the mention of this type of exploit makes a blackhat's mouth water in Pavlovian response.

But even though he provided fully-functioning exploit code to Microsoft, Litchfield tells me it took them a week to respond with simple confirmation they were able to recreate the issue. This is simply unacceptable. Litchfield claims similar discoveries that even eight months later have still not been addressed by Microsoft.

Enter the Vendor Notification Alerts (VNA). Litchfield has decided to roll out an interesting vulnerability alert system somewhere between "full" and "wait for a patch" disclosure.

These VNA's will disclose the vendor and problem product, along with general exploitation protection methods, without giving away too much detail about the vulnerability itself. In this way, the heat can be turned up on the vendor and customers can be alerted to the fact that problems exist, but a blackhat won't get enough information to design an exploit.

To date, 15 such issues exist with other products, including more issues with Oracle, and can be viewed on NGSSoftware's web site.

In addition, Litchfield's "Typhon II" vulnerability assessment tool will have checks for most of these vulnerabilities built into it. Though I'm not one to make public endorsements for commercial products, I can tell you that purchasing a product that alerts you to problems vendors haven't even addressed yet is most definitely a smart thing to consider.

Any successful company knows a customer's interests should come first. If the timely distribution and maintenance of critical security patches for their products is too much for a vendor to deal with, they should get out of the software business. Hopefully NGSSoftware's VNA idea will catch on, and patch production can take priority without exposing the customer to unnecessary risk.



TOPICS: Technical
KEYWORDS: microsoft; techindex
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-95 last
To: PatrioticAmerican
Microsoft needs developers who can consistently provide services without trashing Microsoft.

And there in lies your biggest problem -- all good developers will be very critical of software with flaws. And MS has a lot of software with a lot of flaws.

So in your mind, MS needs 'yes men' salesmen like you and B2k, not 'critical' software developers.

It'll be interesting to see how far such a strategy will go.

I'm about bored with your sales pitch, so unless you've got something new to add . . .

81 posted on 06/03/2002 10:24:16 PM PDT by Dominic Harr
[ Post Reply | Private Reply | To 78 | View Replies]

To: Bush2000
The Java Community Process doesn't own Java, Harr.

What you don't understand is a lot.

And since I know you've been explained the truth about the JCP by several people, your lack of understanding is clearly cultivated.

Oh well, you know what they say: "It ain't done til Lotus won't run".

Aren't you proud of your Brittney?

82 posted on 06/03/2002 10:27:53 PM PDT by Dominic Harr
[ Post Reply | Private Reply | To 80 | View Replies]

To: Dominic Harr
"Brittney"

I'll take the young new thing over your old hag, any day.

83 posted on 06/04/2002 6:06:10 AM PDT by PatrioticAmerican
[ Post Reply | Private Reply | To 82 | View Replies]

To: Dominic Harr
And since I know you've been explained the truth about the JCP by several people, your lack of understanding is clearly cultivated. Oh well, you know what they say: "It ain't done til Lotus won't run". Aren't you proud of your Brittney?

This post of yours is a perfect example of a typical non-responsive Harr post. It is a well-known fact that Sun owns Java and controls all rights to its destiny. You know this to be the case and you're soft-shoeing around the issue of ownership because you don't like what it implies: that some other company could easily hijack Java if Sun fails through the means I've outlined. The only thing that JCP gives you is an organization to promote compatibility and APIs; it doesn't own Java. If it did, the organization would clearly submit Java to ISO or ECMA. But Sun is blocking that move by virtue of its ownership interest.

As for the "It ain't done 'til Lotus won't run" comment, I'm still waiting for proof from a reliable source. Without proof, it's yet another one of your many lies. And it should be obvious to people still reading this thread.
84 posted on 06/04/2002 8:11:01 AM PDT by Bush2000
[ Post Reply | Private Reply | To 82 | View Replies]

To: Dominic Harr
And there in lies your biggest problem -- all good developers will be very critical of software with flaws. And MS has a lot of software with a lot of flaws.

A. You focus your angst almost exclusively on MS software despite the fact that other vendors are equally plagued with bugs.
B. Nobody ever said you were a good developer.
85 posted on 06/04/2002 8:16:42 AM PDT by Bush2000
[ Post Reply | Private Reply | To 81 | View Replies]

To: Bush2000
It is a well-known fact that Sun owns Java and controls all rights to its destiny.

I and about a dozen others have tried explaining this to you, and you still refuse to admit the truth, so I'll leave you to your denials.

And I've criticized Sun, Apple, Oracle, HP, and MS loudly and regularly here on FR.

You know, ironically, that 'never criticize MS' attitude that is likely the single biggest cause of MS's quality problems. A good developer is, by definition, required to see and admit flaws in their products. That is the only way to *fix* flaws. So by selecting it's employees based on their 'yes-man' attitude, MS is stuck with a bunch of developers who can't admit bad things about MS or MS's products. This means they can't fix what they don't admit exists.

Hence, MS software has about ten times the bug rate of other companies. MS even has more bugs that Oracle, which is saying something.

Oh, yeah -- you don't admit to any of this. You don't see any MS quality problems. You believe that all this talk about MS quality problems is just "anti-MS hate speach" by "ABM Bigots". You believe there is a "vast conspiracy" out to get MS, and that MS is the "innocent victim" in all this.

In spite of Mr. Gate's directive to stop being blind to internal quality and security problems, you're still locked into pure denial mode.

And, "It ain't done til Lotus won't run"!

86 posted on 06/04/2002 10:53:58 AM PDT by Dominic Harr
[ Post Reply | Private Reply | To 84 | View Replies]

To: Dominic Harr
I and about a dozen others have tried explaining this to you, and you still refuse to admit the truth, so I'll leave you to your denials.

Another lie. You simply avoid talking about the subject, just like now.

And I've criticized Sun, Apple, Oracle, HP, and MS loudly and regularly here on FR.

Those of us who know how you operate are aware that you spend 98% of your time blasting MS. Your limp-wristed criticisms of other vendors are weak cover for your agenda against MS.

MS is stuck with a bunch of developers who can't admit bad things about MS or MS's products. This means they can't fix what they don't admit exists.

Rubbish. MS recently shut down development on Windows and IIS for several months of security changes.

Hence, MS software has about ten times the bug rate of other companies. MS even has more bugs that Oracle, which is saying something.

References, please. Back it up with facts or admit your lie.

Oh, yeah -- you don't admit to any of this. You don't see any MS quality problems.Reread #35, troll. I admit it when I see that MS has security issues. In this case, IIS. Don't you ever get tired of lying?

You believe that all this talk about MS quality problems is just "anti-MS hate speach" by "ABM Bigots". You believe there is a "vast conspiracy" out to get MS, and that MS is the "innocent victim" in all this.

No, Harr, I don't see a "vast conspiracy". What I see are a small number of misguided folks like yourself who want to demagogue the issue of security in order to promote their own agenda: tearing down MS and replacing it with their sacred cows (Java, Linux, Mac, take your pick, whatever); folks who want to ignore the fact that every platform has serious security problems.

And, "It ain't done til Lotus won't run"!

You can repeat that lie as often as you like, Harr, and it won't make it true. Either prove your statement or retract it.
87 posted on 06/04/2002 11:28:04 AM PDT by Bush2000
[ Post Reply | Private Reply | To 86 | View Replies]

To: Bush2000
What I see are a small number of misguided folks like yourself

A "small number"?

Remember recently, at the Security convention, when the crowd laughed at the mention of MS's "Trustworthy Computing" intiative?

So you think only a "small number of misguided folks" consider MS's quality to be poor. Funny! You're the one in the minority, a small 'clique' of MS-funded yes-men who can't admit unpleasant truths about their corporate masters. Interestingly enough, it's the same small 'fringe'

I don't think you believe this drivel. I think you're just making this up, in a pathetic attempt to sell MS. No one could be that delusional.

Then again . . .

88 posted on 06/04/2002 12:41:19 PM PDT by Dominic Harr
[ Post Reply | Private Reply | To 87 | View Replies]

To: Bush2000, PatrioticAmerican
For over 30 posts it's been down to me and two MS salesmen who can't say anything that isn't on the approved script they got from the sales dept.

This thread is dead, and I'm out.

89 posted on 06/04/2002 12:44:30 PM PDT by Dominic Harr
[ Post Reply | Private Reply | To 87 | View Replies]

To: Dominic Harr
You are not out. You are running scared. You tell lies without and claim other do. You HATE Microsoft and that is all your presence here is about.
90 posted on 06/04/2002 1:39:32 PM PDT by PatrioticAmerican
[ Post Reply | Private Reply | To 89 | View Replies]

To: Dominic Harr
Remember recently, at the Security convention, when the crowd laughed at the mention of MS's "Trustworthy Computing" intiative?

I seem to recall this same crowd laughing about OS stability, as well. They're no longer laughing.
91 posted on 06/04/2002 6:41:40 PM PDT by Bush2000
[ Post Reply | Private Reply | To 88 | View Replies]

To: Dominic Harr
This thread is dead, and I'm out.

I've given you ample opportunity to backup your claims about "It ain't done", bug count comparisons to Oracle, etc -- and you've consistently avoided providing evidence. Therefore, I have to conclude that you are a lying sack of sh*t.
92 posted on 06/04/2002 6:43:41 PM PDT by Bush2000
[ Post Reply | Private Reply | To 89 | View Replies]

To: Dominic Harr
Ah, another Bush-Dominic rumble:


93 posted on 06/05/2002 9:47:32 AM PDT by steve-b
[ Post Reply | Private Reply | To 1 | View Replies]

To: steve-b
:-)
94 posted on 06/05/2002 9:49:53 AM PDT by Dominic Harr
[ Post Reply | Private Reply | To 93 | View Replies]

To: Dominic Harr; Bush2000
Thanks -- it occurs to me that I ought to ping Bush2000 after having taken his name in frivolity.
95 posted on 06/05/2002 10:51:55 AM PDT by steve-b
[ Post Reply | Private Reply | To 94 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-95 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson