Free Republic
Browse · Search
News/Activism
Topics · Post Article

I'm shocked, shocked, shocked!
1 posted on 01/15/2002 4:54:38 PM PST by Bush2000
[ Post Reply | Private Reply | View Replies ]


To: tech_index
bump
2 posted on 01/15/2002 4:54:54 PM PST by Bush2000
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Bush2000
Hmmmmmmmmmm........I need to check the weighting in my portfolio of SUNW.
4 posted on 01/15/2002 4:57:42 PM PST by DoctorMichael
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Bush2000
Two Months?

What do they need, a signed invitation to write a patch for this?

5 posted on 01/15/2002 4:57:56 PM PST by Jhoffa_
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie, hogwaller
You guys were saying something about Microsoft and security ... ? Allow me to repeat this for the millionth time: All operating systems are vulnerable to buffer overflow attacks.
6 posted on 01/15/2002 4:59:59 PM PST by Bush2000
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Bush2000
The UNIX community started CERT because there were so many holes in Unix/Linux that they needed a clearinghouse. One of the most notorious bugs or should I say series of bugs allowing hackers to take superuser control of the unix box occured in the sendmail program. Sendmail runs as root on unix boxes. When you connect to a unix box port 25 the unix box runs sendmail and it gets your keystrokes. If you knew how you could send sets of data to sendmail that would crash it. When sendmail crashed it left you logged in as root, which, sendmail runs as. So there you are logged in as root to a unix box because of a bug in sendmail.

you hear a lot of these 'stack' bugs on unix machines but it's only windows that really has security problems.

7 posted on 01/15/2002 5:03:27 PM PST by go star go
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Bush2000
I'm shocked, shocked, shocked!

LOL!!! Thanks for the ping!

8 posted on 01/15/2002 5:06:19 PM PST by TomServo
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Bush2000
Ping! Not that I'm happy that another hole in another OS has been found. But goes to prove again that no OS is really secure.
9 posted on 01/15/2002 5:19:46 PM PST by SolitaryMan
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Bush2000
The problem is based on error handling routines called exceptions.

In the early days of programming a programmer had to handle every error. As we went to Object oriented programming and the concepts of code and data abstraction that approach would no longer work. So the concept of exceptions was invented. When an error occurs the program creates an exception which calls an exception handler funciton. It goes back up the method and function chain until it reaces the main entry point of the program. Somewhere in this chain the exception is supposed to be trapped and handled. But since this is an abstraction programmers often do not know about all possible exceptions so the fail to handle a lot of them. One advantage of exceptions is that an unhandled exception does not crash the program. Unhandled conventional errors usually do. If a hacker can manage to generate an execption that is not handled the hacker ends up back at the main entry point to the program.

The other things that programmers do is put the security in last. As the program is run and tested programmers don't want to keep setting permissions. So they set permissions as zero qantities. Thus if a permission value is set to 0 you have permission and if it is set to 1 permission is denied. By that I mean permissions are turned off.. They are not turned on. So if permissions are not turned off, the user has them.

Since an unhandled exception when the program starts puts the cracker at the entry point, if the permissions have not been turned off yet, he is at the entry point with all permissions available to him. Becuase operating systems set uninitialized objects to zero and zero means you have permission.

I recoded our companies products so a permission has to be set to 1 to enable that permission. A cracker may still find a way into my application, but when he gets in, he has no permissions. All permissions are set to zero and that means in my case he has no permissions not all. He can't do input, he can't get output. Once he is in, the computer appears totally locked up to the cracker. He just goes away.

With my system even if the cracker can get into the bank, he still finds the vault is locked he can't do anything at all. With the Sun, Linux and Windows sytems, if a cracker gets into the back, he finds the vault unlocked and he has total permission to do everything.

All three operating systems need to invert permissions so if the permissions are all zero there are no permissions granted to do anything at all. And if you have zero permissions you can't set anything to give you permissions.

That makes the computer safe. I have never been able to proove that a cracker could not find a way to generate an exception. But I can prove that if he does it on my systems he can't get permision to do anything harmful.

12 posted on 01/15/2002 5:40:39 PM PST by Common Tator
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson