Realistic? Chances are exactly 100%. Looking at my linux firewall I see
tons of scans on all kinds of ports every day so chances are they will
scan your system in less than an day if not in few hours or minutes.

I'm not saying you won't get scanned. The point is that very, very few hackers are likely to know (or want to know) about emcrsh. It is all very well having access to a port but it doesn't do you any good if you can't do anything with it. Additionally emcrsh uses quite a high port number. Most firewalls detect port scans and after the first few they simply report all ports are closed.


As a systems administrator I would not approve of anybody telneting from
the outside to a system on the network I'm responsible for. We already
have too many problems let's not add another one when it can easily be
avoided.

Remember the emcrsh isn't a normal shell. It is simply a text based front end for emc that can communicate over a network. Telnet is just a client that can talk over a network. If you really want you can send emails by telneting directly to an email MTA such as exim. Does that mean all MTAs are dangerous security risks?


One would only need to inject a special string that would execute like a
shell during a session.

How? The only possibility I can think of is some clever buffer overrun exploit. Emcrsh does actually have a buffer overrun problem but all it will do is cause a segfault and shut emcrsh down. I have attached a patch that fixes the problem.

 It could simply sniff for the password, create a
user account and prepare for a long hideout. Don't forget man in the
middle attack where payload is spiced with "special code." Tools are
already there.

This assumes the hacker is in a position to intercept packets. Just having an open port doesn't automatically give a hacker access to the data going through it. How can you create a user account? emcrsh does not have a function to do this.


What was the common perception, never mind the government, of
probability for global recession last summer when the oil prices reached
$147 per barrel? 0.

Actually it was pretty much a foregone conclusion. The economy goes up steadily, sharply peaks then crashes. The cycle then repeats. The bigger the peak, the harder the crash. This has gone on pretty much since the invention of money. Only short sighted and greedy bankers and speculators don't seem to realize this.


No need to advertise. Traffic is simply monitored for type protocols,
applications, etc. use on servers. Bad guys keep databases of "systems
of interest" and when a vulnerability is discovered they know which
systems can be turned into zombies right away.

But emcrsh is a very rarely used application. How many emcrsh sessions are active at the moment behind firewalls/routers that have port 5007 open? You can probably count them on one hand. Very few hackers are going to spend time trying to find ways of subverting it when they know it is only run on a tiny handful of computers.

Only paranoid systems administrators can sleep well at night because
they protect systems from the beginning.

And if you are sensible you will make sure your firewall does not have port 5007 open. This solves the problem. If you really do need to allow external connections then there are plenty of secure options already available.

Les
Index: emcrsh.cc
===================================================================
RCS file: /cvs/emc2/src/emc/usr_intf/emcrsh.cc,v
retrieving revision 1.13
diff -u -p -r1.13 emcrsh.cc
--- emcrsh.cc	23 Dec 2008 15:48:23 -0000	1.13
+++ emcrsh.cc	11 Jan 2009 23:42:49 -0000
@@ -2636,8 +2686,8 @@ int parseCommand(connectionRecType *cont
 
 void *readClient(void *arg)
 {
-  char str[1600];
-  char buf[1600];
+  char str[1601];
+  char buf[1601];
   unsigned int i, j;
   int len;
   connectionRecType *context;
------------------------------------------------------------------------------
Check out the new SourceForge.net Marketplace.
It is the best place to buy or sell services for
just about anything Open Source.
http://p.sf.net/sfu/Xq1LFB
_______________________________________________
Emc-users mailing list
Emc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/emc-users

Reply via email to