Feeds

Red Hat pre-releases major Linux bug details

Doh! Other vendors caught unprepared

  • alert
  • submit to reddit

Internet Security Threat Report 2014

On the surface, it was just another turn of the endless cycle of software release, hole discovery, and patching: operating system vendor Red Hat issued an advisory Tuesday warning the world about a serious security hole in a file transfer program that comes with Linux, and urged customers to download a patch.

There was just one problem: Red Hat's advisory jumped the gun on what was intended to be a simultaneous multi-vendor release, carefully coordinated by the government-funded Computer Emergency Response Team (CERT), and scheduled for 3 December. Caught off guard, other Linux vendors were rushing Wednesday to finalize their own patches for the hole-- a memory-allocation bug in the ubiquitous Washington University WU-FTPd program.

"The vendors agreed on releasing the information about the flaw... on December 3rd," wrote Roman Drahtmüller, of Linux vendor SuSE, in an email interview. "This timeline was set up for vendors to build and test their packages, which can be a very time-consuming process... If this timeline is broken, distributors... run into a difficult situation, since their users can't download the update packages."

The hole is the result of a programming error in the portion of WU-FTPd that processes file names containing special characters. BindView's Matt Power discovered in April that the server would crash if presented with the file name '~{', but the program's maintainers believed the bug could not be exploited.

Then researchers at Argentina-based Core Security Technologies discovered the bug themselves in November, and proved that careful manipulation of the bug yields remote root access to vulnerable systems.

To exploit the bug, attackers must first log in to a host's FTP server. But on many systems, limited anonymous FTP access is enabled by default.

The hole affects thousands of users of virtually every Linux release. Because of the wide implications, Core, working with CERT, and, at one point, SecurityFocus' "Vulnerability Help" team, arranged a coordinated release with Caldera, SuSE, TurboLinux, Debian, Red Hat, and other Linux vendors, so that patches would be available for every distribution simultaneously. December 3rd was picked for the release.

That plan went out the window Tuesday, when Red Hat unilaterally issued its own advisory.

"Everybody else, they look like jerks, and they have to scramble to get fixes," said an irate Ivan Arce, CTO of Core Security Technologies. "The only fixes now out publicly are Red Hat's."

Red Hat apologized to other vendors Tuesday night.

"It was a big mistake," says Mark Cox, Red Hat's senior director of engineering. "The package was ready to go live, and we were holding off until the date this was going to hit." Instead, a Red Hat administrator accidentally swept up the advisory with other, unrelated updates sent out Tuesday.

The company has changed its release process to store a 'not-before date' with its pending releases, says Cox. "It's not going to be possible to release something before that date, so we make sure this doesn't happen again. It's not a very good thing."

Despite the snafu, Cox says coordinated releases have worked well for the Linux community in the past. "I don't think it shows any sort of inherent problems in that process."

The FBI's National Infrastructure Protection Center (NIPC) issued an advisory on the hole Wednesday afternoon, and warned that attacks may already be underway. "It is believed that an exploit, leveraging this vulnerability for Linux systems, is already circulating in the hacker community," reads the advisory.

© 2001 SecurityFocus.com, all rights reserved.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
Sway: Microsoft's new Office app doesn't have an Undo function
Content aggregation, meet the workplace ... oh
Sign off my IT project or I’ll PHONE your MUM
Honestly, it’s a piece of piss
Return of the Jedi – Apache reclaims web server crown
.london, .hamburg and .公司 - that's .com in Chinese - storm the web server charts
NetWare sales revive in China thanks to that man Snowden
If it ain't Microsoft, it's in fashion behind the Great Firewall
Chrome 38's new HTML tag support makes fatties FIT and SKINNIER
First browser to protect networks' bandwith using official spec
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.