The message here is for all those who think closed source is better at 
security than open source - it was in the (closed) code for some time, but 
became apparent when the code was open-sourced.

With enough eyes, all bugs (and security holes) are shallow.

jeff


"Anthony J. Gabrielson" <[EMAIL PROTECTED]>
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> CERT Advisory CA-2001-01 Interbase Server Contains Compiled-in Back Door
> Account
> 
>    Original release date: January 10, 2001
>    Last revised: --
>    Source: CERT/CC
> 
>    A complete revision history is at the end of this file.
> 
> Systems Affected
> 
>      * Borland/Inprise Interbase 4.x and 5.x
>      * Open source Interbase 6.0 and 6.01
>      * Open source Firebird 0.9-3 and earlier
> 
> Overview
> 
>    Interbase is an open source database package that had previously been
>    distributed in a closed source fashion by Borland/Inprise. Both the
>    open and closed source verisions of the Interbase server contain a
>    compiled-in back door account with a known password.
> 
> I. Description
> 
>    Interbase is an open source database package that is distributed by
>    Borland/Inprise at http://www.borland.com/interbase/ and on
>    SourceForge. The Firebird Project, an alternate Interbase package, is
>    also distributed on SourceForge. The Interbase server for both
>    distributions contains a compiled-in back door account with a fixed,
>    easily located plaintext password. The password and account are
>    contained in source code and binaries previously made available at the
>    following sites:
> 
>           http://www.borland.com/interbase/
>           http://sourceforge.net/projects/interbase
>           http://sourceforge.net/projects/firebird
>           http://firebird.sourceforge.net
>           http://www.ibphoenix.com
>           http://www.interbase2000.com
> 
>    This back door allows any local user or remote user able to access
>    port 3050/tcp [gds_db] to manipulate any database object on the
>    system. This includes the ability to install trapdoors or other trojan
>    horse software in the form of stored procedures. In addition, if the
>    database software is running with root privileges, then any file on
>    the server's file system can be overwritten, possibly leading to
>    execution of arbitrary commands as root.
> 
>    This vulnerability was not introduced by unauthorized modifications to
>    the original vendor's source. It was introduced by maintainers of the
>    code within Borland. The back door account password cannot be changed
>    using normal operational commands, nor can the account be deleted from
>    existing vulnerable servers [see References].
> 
>    This vulnerability has been assigned the identifier CAN-2001-0008 by
>    the Common Vulnerabilities and Exposures (CVE) group:
> 
>           http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0008
> 
>    The CERT/CC has not received reports of this back door being exploited
>    at the current time. We do recommend, however, that all affected sites
>    and redistributors of Interbase products or services follow the
>    recommendations suggested in Section III, as soon as possible due to
>    the seriousness of this issue.
> 
> II. Impact
> 
>    Any local user or remote user able to access port 3050/tcp [gds_db]
>    can manipulate any database object on the system. This includes the
>    ability to install trapdoors or other trojan horse software in the
>    form of stored procedures. In addition, if the database software is
>    running with root privileges, then any file on the server's file
>    system can be overwritten, possibly leading to execution of arbitrary
>    commands as root.
> 
> III. Solution
> 
> Apply a vendor-supplied patch
> 
>    Both Borland and The Firebird Project on SourceForge have published
>    fixes for this problem. Appendix A contains information provided by
>    vendors supplying these fixes. We will update the appendix as we
>    receive more information. If you do not see your vendor's name, the
>    CERT/CC did not hear from that vendor. Please contact your vendor
>    directly.
> 
>    Users who are more comfortable making their own changes in source code
>    may find the new code available on SourceForge useful as well:
> 
>           http://sourceforge.net/projects/interbase
>           http://sourceforge.net/projects/firebird
> 
> Block access to port 3050/tcp
> 
>    This will not, however, prevent local users or users within a
>    firewall's adminstrative boundary from accessing the back door
>    account. In addition, the port the Interbase server listens on may be
>    changed dynamically at startup.
> 
> Appendix A. Vendor Information
> 
> Borland
> 
>    Please see:
> 
>           http://www.borland.com/interbase/
> 
> IBPhoenix
> 
>    The Firebird project uncovered serious security problems with
>    InterBase. The problems are fixed in Firebird build 0.9.4 for all
>    platforms. If you are running either InterBase V6 or Firebird 0.9.3,
>    you should upgrade to Firebird 0.9.4.
> 
>    These security holes affect all version of InterBase shipped since
>    1994, on all platforms.
> 
>    For those who can not upgrade, Jim Starkey developed a patch program
>    that will correct the more serious problems in any version of
>    InterBase on any platform. IBPhoenix chose to release the program
>    without charge, given the nature of the problem and our relationship
>    to the community.
> 
>    At the moment, name service is not set up to the machine that is
>    hosting the patch, so you will have to use the IP number both for the
>    initial contact and for the ftp download.
> 
>    To start, point your browser at
> 
>           http://firebird.ibphoenix.com/
> 
> Apple
> 
>    The referenced database package is not packaged with Mac OS X or Mac
>    OS X Server.
> 
> Fujitsu
> 
>    Fujitsu's UXP/V operating system is not affected by this problem
>    because we don't support the relevant database.
> 
> References
> 
>     1. VU#247371: Borland/Inprise Interbase SQL database server contains
>        backdoor superuser account with known password CERT/CC,
>        01/10/2001, https://www.kb.cert.org/vuls/id/247371
>      _________________________________________________________________
> 
>    Author: This document was written by Jeffrey S Havrilla. Feedback on
>    this advisory is appreciated.
>    ______________________________________________________________________
> 
>    This document is available from:
>    http://www.cert.org/advisories/CA-2001-01.html
>    ______________________________________________________________________
> 
> CERT/CC Contact Information
> 
>    Email: [EMAIL PROTECTED]
>           Phone: +1 412-268-7090 (24-hour hotline)
>           Fax: +1 412-268-6989
>           Postal address:
>           CERT Coordination Center
>           Software Engineering Institute
>           Carnegie Mellon University
>           Pittsburgh PA 15213-3890
>           U.S.A.
> 
>    CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4)
>    Monday through Friday; they are on call for emergencies during other
>    hours, on U.S. holidays, and on weekends.
> 
> Using encryption
> 
>    We strongly urge you to encrypt sensitive information sent by email.
>    Our public PGP key is available from
> 
>    http://www.cert.org/CERT_PGP.key
> 
>    If you prefer to use DES, please call the CERT hotline for more
>    information.
> 
> Getting security information
> 
>    CERT publications and other security information are available from
>    our web site
> 
>    http://www.cert.org/
> 
>    To subscribe to the CERT mailing list for advisories and bulletins,
>    send email to [EMAIL PROTECTED] Please include in the body of your
>    message
> 
>    subscribe cert-advisory
> 
>    * "CERT" and "CERT Coordination Center" are registered in the U.S.
>    Patent and Trademark Office.
>    ______________________________________________________________________
> 
>    NO WARRANTY
>    Any material furnished by Carnegie Mellon University and the Software
>    Engineering Institute is furnished on an "as is" basis. Carnegie
>    Mellon University makes no warranties of any kind, either expressed or
>    implied as to any matter including, but not limited to, warranty of
>    fitness for a particular purpose or merchantability, exclusivity or
>    results obtained from use of the material. Carnegie Mellon University
>    does not make any warranty of any kind with respect to freedom from
>    patent, trademark, or copyright infringement.
>      _________________________________________________________________
> 
>    Conditions for use, disclaimers, and sponsorship information
> 
>    Copyright 2001 Carnegie Mellon University.
> 
>    Revision History
> January 10, 2001:  Initial release
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGP for Personal Privacy 5.0
> Charset: noconv
> 
> iQCVAwUBOly/sgYcfu8gsZJZAQF2jwQAiZALQ7P5oxNhWnCGJRMfETtW44WXsXYP
> S+38L9onECW7oYXx/m1H1T0dsiy0H2nR7XnE4slFKDSjvdbWu51bqnyx816DzVBL
> 8OC8eiIErAWDjPvyHbX7DK8kEPQyvjKdcONQjAeN+27PzCPQzU4xeT9TE5xl1bw+
> EC5k1VaYL1A=
> =CfIC
> -----END PGP SIGNATURE-----
> 
> 
> -
> Subcription/unsubscription/info requests: send e-mail with
> "subscribe", "unsubscribe", or "info" on the first line of the
> message body to [EMAIL PROTECTED] (Subject line is ignored).
> 



**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to