[LWN Logo]
[LWN.net]

Sections:
 Main page
 Linux in the news
 Security
 Kernel
 Distributions
 Ports
 Development
 Commerce
 Announcements
 Back page
All in one big page

See also: last week's Security page.

Security


Dan Brumleve made an official announcement of a Javascript security hole which allows the theft of the contents of the web browser history, including all form data that has ever been sent via the GET method. In this followup, he re-emphasizes and clarifies the ability to get credit card numbers even when submitted via SSL to secure sites, since the card numbers are only encrypted in transit. More information on the problem can be found, with ongoing updates at the Cash Cow Strikes! web site.

From the information on that site, the best way currently to protect against this security hole is to either disable Javascript or nullify your cache and set the upper bounds to zero. We will post additional information as official fixes become available.

Red Hat sent out a notice saying that their version of CDE is full of nasty security bugs. One can reasonably assume that most other CDE implementations out there have the same problems. Their notice says it all: "Because CDE is not Open Source software, we have no ability to fix either the minor bugs that have been reported over the last year, or these more important security bugs." There is no fix available. Red Hat has announced that they will cease to sell CDE.

Reports of new exploits of rpc.mountd are trickling in. So far, the confirmations of the problems have been made against nfs-server-2.2beta29-5. The latest version of nfs-server included in Red Hat 5.1, for example, is nfs-server-2.2beta29-7. It is likely that the sites that are being affected have not upgraded to this version. It is highly recommended that sites either firewall NFS packets from the Internet, disable their NFS services if they are not being used or upgrade to the latest version. This much forwarded note from the Moria Security Team goes into more details on the exploits and how to protect against them.

Reports are that knfsd 0.4.21 or 0.4.22 are also vulnerable, but no confirmations have been received as of yet.

inetd is also coming under attack again. The attacks appear to be reproductions of the old octopus exploits from a long time ago (many, many connections within a short amount of time). xinetd has been recommended as a superior replacement for inetd, for sites hit with these problems. Again, no official fixes have been reported so far, nor do we have a confirmation that the sites being affected are running the latest version of inetd, so these exploits may be affecting known holes that haven't been closed.

A workshop on security in large-scale distributed computing systems will be held on October 20th in conjunction with the IEEE Symposium on Reliable Distributed Systems.


October 1, 1998

 

Next: Kernel

 
Eklektix, Inc. Linux powered! Copyright © 1998 Eklektix, Inc., all rights reserved
Linux ® is a registered trademark of Linus Torvalds