Lucene search

K
packetstormPacket StormPACKETSTORM:12163
HistoryAug 17, 1999 - 12:00 a.m.

process.tbl.attcks.txt

1999-08-1700:00:00
Packet Storm
packetstormsecurity.com
38
`--------------------------------------------------------------  
This story was printed from ZDNN,  
located at http://www.zdnet.com/zdnn.  
--------------------------------------------------------------  
  
Major Unix flaw emerges  
By Randy Barrett, Inter@ctive Week Online  
March 1, 1999 9:30 AM PT  
URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2217922,00.html  
  
A newly discovered Unix design flaw threatens thousands of computers that operate on the Internet.   
  
The vulnerability opens Unix-based servers to a new kind of denial-of-service attack that overloads the servers'  
ability to answer incoming queries, according to security expert and Internet service provider (ISP) owner Simson  
Garfinkel. Garfinkel's ISP, Vineyard.Net, experienced such an attack in early 1998, but Garfinkel soon realized the  
situation was an accident caused by a subscriber's faulty software.   
  
"The buggy software would finger our computer every minute, but it never hung up," Garfinkel said. By not terminating  
the connection, the program quickly loaded up his Unix server's "process tables" and brought the ISP to a standstill  
for two hours.   
  
"We didn't go looking for this. It hit us. It's not theoretical," Garfinkel said.   
  
The attack entails sending repeated open-connection requests to a Unix server. Subprograms - like Internet  
Daemon, Secure Shell Daemon and Internet Message Access Protocol Daemon - are written to automatically answer  
the connection and carry out requests. But if the connection is initiated with no request, most Daemons keep the line  
open, using resources from the server's process table, which can handle between 600 and 1,500 simultaneous tasks.  
Repeated connections eventually overload the process table and crash the server.   
  
Garfinkel publicly outlined the vulnerability - which affects nearly all Unix-based platforms, including Irix, Linux and  
Solaris - on a security newsgroup Feb. 19. This was after his repeated attempts to notify programmers at Berkeley  
Software Design Inc., Hewlett-Packard, Silicon Graphics Inc. and Sun Microsystems of the problem last year. None  
of the vendors gave it any notice, Garfinkel said.   
  
"It wasn't new enough to immediately gain attention. It's a design flaw, not a bug," said Gene Spafford, professor of  
computer science at Purdue University.   
  
Sabotage can come from outside  
Process table attacks are old news to Unix programmers, but Garfinkel discovered that the assault can come from the  
outside. Previously, developers only thought such sabotage could come from someone with internal access.   
  
AT&T Fellow Steven Bellovin said the vulnerability is real. "If I were running a popular server, I would at least try to  
add some resource limitation."   
  
Garfinkel said the servers most open to attack are those used for electronic mail, file serving and Web hosting.  
Protecting against it is relatively easy: Daemon programs can be rewritten to limit incoming connections or drop them  
after 30 seconds.   
  
"They need to have a governor installed," Garfinkel said.   
  
BSDI Director of Product Marketing Douglas Urner said the process table threat is hardly catastrophic. "In theory,  
there is a vulnerability here, which is like saying the gas in your car might explode."   
  
BSDI software safe  
Urner said the flaw probably wouldn't affect most BSDI software, because of existing safeguards.   
  
SGI Principal Engineer Bill Earl said the threat exists but isn't a big deal, because the Daemons can be easily  
configured to limit incoming connections.   
  
Red Hat Software spokeswoman Melissa London wasn't familiar with the process table problem, but she said holes  
in Linux usually are solved quickly on public open source bulletin boards. "If there is any breach, we'll work to fix it,"  
she said.   
  
A perceived lack of responsible vendor action to patch the problem is partly what spurred Garfinkel to make the attack  
known.   
  
"They don't do anything unless its publicly exposed," he said. "I can shut down any one of their servers on the Net."   
  
Hard to stay hidden  
But if he did, Garfinkel wouldn't be able to easily cloak his identity. Because the onslaught can take up to 10 hours to  
complete, Unix experts and vendors agree that maintaining stealth is nearly impossible.   
  
"It's an attack you're unlikely to see people get away with," Urner said.   
  
That fact doesn't assuage the fears of many Unix experts who take the vulnerability seriously as yet another sign that  
the Internet isn't robust enough to handle 21st century threats.   
  
"The real deeper problem is that the whole infrastructure is pretty rotten," said Peter G. Neumann, principal scientist  
at the Computer Science Lab at SRI International.  
`