Unix flaw opens servers to denial-of-service attacks by exhausting process table resources.
`--------------------------------------------------------------
This story was printed from ZDNN,
located at http://www.zdnet.com/zdnn.
--------------------------------------------------------------
Major Unix flaw emerges
By Randy Barrett, Inter@ctive Week Online
March 1, 1999 9:30 AM PT
URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2217922,00.html
A newly discovered Unix design flaw threatens thousands of computers that operate on the Internet.
The vulnerability opens Unix-based servers to a new kind of denial-of-service attack that overloads the servers'
ability to answer incoming queries, according to security expert and Internet service provider (ISP) owner Simson
Garfinkel. Garfinkel's ISP, Vineyard.Net, experienced such an attack in early 1998, but Garfinkel soon realized the
situation was an accident caused by a subscriber's faulty software.
"The buggy software would finger our computer every minute, but it never hung up," Garfinkel said. By not terminating
the connection, the program quickly loaded up his Unix server's "process tables" and brought the ISP to a standstill
for two hours.
"We didn't go looking for this. It hit us. It's not theoretical," Garfinkel said.
The attack entails sending repeated open-connection requests to a Unix server. Subprograms - like Internet
Daemon, Secure Shell Daemon and Internet Message Access Protocol Daemon - are written to automatically answer
the connection and carry out requests. But if the connection is initiated with no request, most Daemons keep the line
open, using resources from the server's process table, which can handle between 600 and 1,500 simultaneous tasks.
Repeated connections eventually overload the process table and crash the server.
Garfinkel publicly outlined the vulnerability - which affects nearly all Unix-based platforms, including Irix, Linux and
Solaris - on a security newsgroup Feb. 19. This was after his repeated attempts to notify programmers at Berkeley
Software Design Inc., Hewlett-Packard, Silicon Graphics Inc. and Sun Microsystems of the problem last year. None
of the vendors gave it any notice, Garfinkel said.
"It wasn't new enough to immediately gain attention. It's a design flaw, not a bug," said Gene Spafford, professor of
computer science at Purdue University.
Sabotage can come from outside
Process table attacks are old news to Unix programmers, but Garfinkel discovered that the assault can come from the
outside. Previously, developers only thought such sabotage could come from someone with internal access.
AT&T Fellow Steven Bellovin said the vulnerability is real. "If I were running a popular server, I would at least try to
add some resource limitation."
Garfinkel said the servers most open to attack are those used for electronic mail, file serving and Web hosting.
Protecting against it is relatively easy: Daemon programs can be rewritten to limit incoming connections or drop them
after 30 seconds.
"They need to have a governor installed," Garfinkel said.
BSDI Director of Product Marketing Douglas Urner said the process table threat is hardly catastrophic. "In theory,
there is a vulnerability here, which is like saying the gas in your car might explode."
BSDI software safe
Urner said the flaw probably wouldn't affect most BSDI software, because of existing safeguards.
SGI Principal Engineer Bill Earl said the threat exists but isn't a big deal, because the Daemons can be easily
configured to limit incoming connections.
Red Hat Software spokeswoman Melissa London wasn't familiar with the process table problem, but she said holes
in Linux usually are solved quickly on public open source bulletin boards. "If there is any breach, we'll work to fix it,"
she said.
A perceived lack of responsible vendor action to patch the problem is partly what spurred Garfinkel to make the attack
known.
"They don't do anything unless its publicly exposed," he said. "I can shut down any one of their servers on the Net."
Hard to stay hidden
But if he did, Garfinkel wouldn't be able to easily cloak his identity. Because the onslaught can take up to 10 hours to
complete, Unix experts and vendors agree that maintaining stealth is nearly impossible.
"It's an attack you're unlikely to see people get away with," Urner said.
That fact doesn't assuage the fears of many Unix experts who take the vulnerability seriously as yet another sign that
the Internet isn't robust enough to handle 21st century threats.
"The real deeper problem is that the whole infrastructure is pretty rotten," said Peter G. Neumann, principal scientist
at the Computer Science Lab at SRI International.
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo