Security hole found in FTP servers

PGP Security's Computer Vulnerability Emergency Response Team (COVERT) has notified three vendors that new vulnerabilities have been discovered in their FTP (file transfer protocol) server software, a PGP official said Monday. The security holes could allow a hacker to break into the servers, steal data, deface Web sites or substitute false data for information a company provides to its customers, according to PGP Security, a Network Associates Inc. business unit.

FTP servers are used by more than 90 per cent of all enterprise networks to share data with employees, partners and customers, and the vulnerability could affect a significant portion of those networks, PGP Security said.

The COVERT lab isn't aware of any serious failures attributed to the vulnerability, but as news of the security hole spreads, "it's kind of a race to see if vendors can patch their systems before they are exploited by the bad guys," said Jim Magdych, manager of COVERT Lab.

The problem was discovered in Unix systems from Sun Microsystems, Silicon Graphics and Hewlett-Packard, Magdych said. PGP Security is working with these vendors so they can provide patches, he said. In addition, COVERT is working with other vendors to help them confirm whether their servers are vulnerable and to get patches out to their end users.

Sun has verified that the security hole exists in its Solaris operating system, and is preparing a software patch that should be available to customers in the next two to three days, said Sun spokesman Russ Castronovo.

"We have (identified) it, we have been able to replicate it, we've developed a patch already, and we're in the process of testing and backporting it to other versions of Solaris," he said Tuesday. Sun was notified of the problem by PGP on March 28, Castronovo said.

HP also said it was notified of the problem by PGP two weeks ago, and "since that time we've been trying to get them to tell us what the (infected) code was," Shirley Quastler, a HP spokeswoman, said Tuesday morning. HP hasn't confirmed yet that the vulnerability exists in its operating system, she added.

"We received the (infected) code (Monday) and it's undergoing analysis right now, and if in fact there is a vulnerability, a patch will be prepared and HP will issue a security alert to protect its customers," she said.

A spokeswoman for SGI wasn't able to comment right away on the issue.

The vulnerability is linked to the "glob" function, which is programming shorthand for a function that allows users to conduct a search using a truncated version of a name or a word. When the glob function is used it often returns more data than expected to the FTP server, causing it to overflow the buffer. This is a common type of vulnerability which leaves that data open to exploitation by software that can be written to alter it, Magdych said.

"If someone could compromise the FTP server, they could potentially replace Web sites, deface them or replace files with Trojan (virus) programs," Magdych said. Trojan programs would be especially insidious because they can be set up to run when unsuspecting users try to download a patch.

The notification about the FTP vulnerability follows the lab's warning in January of a possible vulnerability in the software used in most DNS (Domain Name System) servers. Magdych said the efforts were a continuation of COVERT lab's efforts to identify vulnerabilities in systems that are used broadly by the Internet community and help close those gaps before they can be exploited. PGP Security does not provide the patches, but it sells a risk assessment product called CyberCop Scanner, which has been updated to detect the latest vulnerability.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about Hewlett-Packard AustraliaPGPPGP SecuritySGI AustraliaSilicon GraphicsSun MicrosystemsTuesday Morning

Show Comments