[sf-lug] Advantages of distro package regimes
Kristian Erik Hermansen
kristian.hermansen at gmail.com
Wed Dec 26 11:17:32 PST 2007
On Dec 26, 2007 1:33 PM, Charles N Wyble <charles at thewybles.com> wrote:
> Your comments above imply that you know something about the security of
> medibuntu. If you know of a vulnerability in there systems or processes
> and do not report it to them you are doing a disservice to the
> community. I certainly hope this is not the case?
It has nothing to do with specific vulnerabilities, although even if I
did know something, it does not mean I am bad for not reporting it.
There are rampant vulnerabilities all over the place, and once you
start looking, it becomes almost a full time job to report all of them
that you see. In fact, some people make careers in vulnerability
reporting or affiliated commercial ventures. I have reported lots of
vulnerabilities, and most of the time, no one cares unless it is
something really nefarious. Now, let's just say that I could attack
medibuntu.org? OK, so I still don't have the private GPG key perhaps,
but a lot of users routinely override that APT warning. In this
sense, here is one thing I see wrong with medibuntu that is obvious.
And remember, the more eyes on the resource, the more bugs that will
be revealed (this is bug finding 101).
The domain was recently registered, and only for a year. Do a whois
if you like to verify. Also notice that they do implement
ClientTransferProhibited, but not ClientUpdateProhibited. If I cared
enough, I am sure I could social engineer an update to the DNS records
to point at my rogue server. With the amount of traffic going to
Ubuntu.com every day, this may not be possible (number of eyes).
However, most people set medibuntu and forget it. It could be a
matter of days before anyone noticed that it was being redirected. I
would do it on a holiday weekend if I wanted to be really sneaky.
These things do happen.
Additionally, Medibuntu has a very large attack surface. This is not
a good thing. What do I mean? Here is some evidence for you to
contemplate...
<snip>
root at hermbuntu-desktop:~# nmap -P0 -T5 medibuntu.org -A
Starting Nmap 4.20 ( http://insecure.org ) at 2007-12-26 13:56 EST
Warning: Giving up on port early because retransmission cap hit.
Warning: Servicescan failed to fill info_template (subjectlen: 1448).
Too long? Match string was line 2800: v/Apache httpd/$1/$2
Warning: Servicescan failed to fill info_template (subjectlen: 1448).
Too long? Match string was line 2800: v/Apache httpd/$1/$2
Interesting ports on zeus.flosoft.info (87.98.242.10):
Not shown: 1652 closed ports
PORT STATE SERVICE VERSION
1/tcp open tcpwrapped
11/tcp open tcpwrapped
15/tcp open tcpwrapped
21/tcp open ftp ProFTPD 1.3.0
22/tcp open ssh OpenSSH 4.3p2 Debian 9 (protocol 2.0)
25/tcp open smtp qmail smtpd
53/tcp open domain
79/tcp open tcpwrapped
80/tcp open http Apache httpd 2.2.3
81/tcp open http Apache httpd 2.2.3
106/tcp open pop3pw poppassd
110/tcp open pop3
111/tcp open tcpwrapped
119/tcp open tcpwrapped
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
143/tcp open imap Courier Imapd (released 2004)
170/tcp filtered print-srv
243/tcp filtered sur-meas
443/tcp open http Apache httpd 2.2.3
445/tcp filtered microsoft-ds
465/tcp open ssl/smtp qmail smtpd
540/tcp open tcpwrapped
635/tcp open tcpwrapped
907/tcp filtered unknown
993/tcp open ssl/imap Courier Imapd (released 2004)
995/tcp open ssl/pop3
1080/tcp open tcpwrapped
1524/tcp open tcpwrapped
2000/tcp open tcpwrapped
5193/tcp filtered aol-3
6667/tcp open tcpwrapped
8009/tcp open ajp13?
8443/tcp open http Apache httpd
10000/tcp open http Webmin httpd
12345/tcp open tcpwrapped
12346/tcp open tcpwrapped
27665/tcp open tcpwrapped
31337/tcp open tcpwrapped
32772/tcp open tcpwrapped
32773/tcp open tcpwrapped
32774/tcp open tcpwrapped
54320/tcp open tcpwrapped
2 services unrecognized despite returning data. If you know the
service/version, please submit the following fingerprints at
http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port110-TCP:V=4.20%I=7%D=12/26%Time=4772A567%P=i686-pc-linux-gnu%r(NULL
SF:,3B,"\+OK\x20Hello\x20there\.\x20<11672\.1198695853 at localhost\.localdom
SF:ain>\r\n")%r(GenericLines,69,"\+OK\x20Hello\x20there\.\x20<11672\.11986
SF:95853 at localhost\.localdomain>\r\n-ERR\x20Invalid\x20command\.\r\n-ERR\x
SF:20Invalid\x20command\.\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port995-TCP:V=4.20%T=SSL%I=7%D=12/26%Time=4772A580%P=i686-pc-linux-gnu%
SF:r(NULL,3B,"\+OK\x20Hello\x20there\.\x20<11713\.1198695876 at localhost\.lo
SF:caldomain>\r\n")%r(GenericLines,69,"\+OK\x20Hello\x20there\.\x20<11713\
SF:.1198695876 at localhost\.localdomain>\r\n-ERR\x20Invalid\x20command\.\r\n
SF:-ERR\x20Invalid\x20command\.\r\n");
Device type: general purpose
Running (JUST GUESSING) : Linux 2.6.X|2.4.X (86%)
Aggressive OS guesses: Linux 2.6.14 - 2.6.17 (86%), Linux 2.4.22
(Fedora Core 1, x86) (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops
Service Info: Host: default-87-98-242-10; OSs: Unix, Linux
OS and Service detection performed. Please report any incorrect
results at http://insecure.org/nmap/submit/ .
Nmap finished: 1 IP address (1 host up) scanned in 497.782 seconds
</snip>
--
Kristian Erik Hermansen
"I have no special talent. I am only passionately curious."
More information about the sf-lug
mailing list