The Arms Race of Hacking


Security today is a vicious circle, a cyber arms race between good guys and bad guys. Developers add features to software, people find security vulnerabilities, and system administrators close the holes, hopefully before hackers exploit the vulnerabilities. Before long, developers release a new version of the product, and the cycle repeats.

On May 17, 2002, David Litchfield of NGSSoftware (which develops vulnerability assessment tools) reported to Microsoft a security vulnerability in Microsoft SQL Server 2000. The vulnerability was simple: if an intruder sent the right information on UDP port 1434 to a server running SQL Server, the intruder could cause a buffer overrun and execute his own code on the server. This vulnerability meant an intruder could take over any computer connected to the Internet, provided the computer was running SQL Server. Two months later, on July 24, Microsoft released Microsoft Security Bulletin MS02-039, “Buffer Overruns in SQL Server 2000 Resolution Service Could Enable Code Execution (Q323875).” This bulletin included a description and a patch for the problem. Although this patch was freely available, not everyone installed the patch. The patch was also included in SQL Server Service Pack 3 (SP3), which was released on January 17, 2003. Still, a week later, not everyone had applied the service pack.

At some time during 2002, hackers began developing the Slammer worm, which was designed to take advantage of the SQL Server buffer-overrun vulnerability. (For information on the Slammer virus, see http://securityresponse.symantec.com/avcenter/venc/data/w32.sqlexp.worm.html.) Those hackers counted on the assumption that not everyone would have installed the patch. The Slammer worm sends a short program—just 376 bytes—to UDP port 1434; if a vulnerable SQL server is listening, the SQL Server is infected. The infected SQL Server begins executing an endless loop that generates a random IP address and attempts to infect any computer on that IP address. If a vulnerable SQL server is found on the randomly generated IP address, it too is infected; otherwise, the worm tries another address, and another, and another. This attack results in a huge amount of Internet traffic and makes the infected computer so busy that it becomes unresponsive. Luckily the worm does no further damage—it doesn’t write anything to the hard disk, and rebooting the computer removes the virus until the machine becomes infected again.

The authors of the Slammer worm released it on Friday, January 24, 2003 at about 9:30 p.m. PST. The result was immediate and catastrophic.

The Slammer worm began infecting computers exponentially. The number of infected computers doubled every 8.5 seconds, infecting 90 percent of vulnerable computers within 10 minutes. By 10:00 p.m. PST, over 200,000 machines were infected with the virus, and the Internet crawled to a halt worldwide. The speed with which the worm spread earned Slammer the honor of being the world’s first Warhol virus. A Warhol virus is one capable of infecting every computer on the Internet within 15 minutes, named after the pop artist Andy Warhol, who predicted that in the future everyone will have 15 minutes of fame.

By some estimates, Slammer cost the world between US$950 million and US$1.2 billion in lost productivity. On Saturday, January 25, in the United States, 13,000 Bank of America ATMs refused to dispense cash. Continental Airlines delayed or canceled some flights due to problems with online ticketing and electronic check-in. The City of Seattle’s emergency 911 network stopped working. Microsoft customers couldn’t activate Windows XP, and gamers couldn’t connect to Microsoft Asheron’s Call 2 online gaming system. In South Korea, customers couldn’t connect to the country’s largest ISP, KT. In China, Internet access became almost frozen.

By Tuesday, January 28, things were getting back to normal, but people wanted answers. “Whose fault was it?” “How can we prevent this from happening again?” Both are hard questions to answer. Was it Microsoft’s fault for putting security vulnerabilities into software? Some people noted that Microsoft had released a patch and a subsequent service pack that would have fixed the vulnerability before Slammer hit, had people installed it. However, many administrators don’t install patches as a matter of policy for fear that the patch will interfere with their systems. Occasionally, security patches and service packs have been known to actually destabilize systems. For example, on February 10, 2003, only a few days after the Slammer virus, Microsoft had to revise security patch MS02-071 after it was found that the patch caused random crashes and system reboots on Windows NT 4.0 systems. Some patches also require a system reboot, taking the system offline. Many systems are not designed for such maintenance, and administrators avoid installing patches because they need to keep their systems continuously available.

To make matters more complicated, new security vulnerabilities are found practically daily. According to Symantec’s biannual “Incident Security Threat Report,” the number of vulnerabilities found in 2002 rose 82 percent to 2,524, compared to 2001. (The Incident Security Threat Report is available from http://enterprisesecurity.symantec.com/Content.cfm?articleID=1964 & EID.) At the same time, the number of new viruses discovered in 2002 rose to more than 7,000. It’s no wonder that many people consider that we are in the golden age of hacking. The only reason why Slammer didn’t cause more damage was because it was essentially harmless, causing no damage to machines or networks other than slowing things down.

No Operating System Is Safe

Although Slammer was a Windows-based worm, security vulnerabilities, viruses, and successful exploitations span all operating systems and potentially every product. In a world where computers increasingly rely on networks, there is no safe operating system. The following are some examples of recent vulnerabilities:

  • In December 2002, CERT reported a vulnerability in the Sun Microsystems Sun Cobalt RaQ Server appliance. In February, Sun had released a patch called RaQ 4 SHP (Security Hardening Product). Ironically, this security patch, which protected against buffer overflows and port scanning attacks, also included a new security vulnerability whereby a remote user could gain control of the server with “superuser” privileges.

  • Linux and other UNIX-based operating systems also have their share of hackers. As an example, in November 2002, CERT reported a problem with Red Hat Linux 7.3 and 8.0. The Samba package that provides file and print services included a vulnerability whereby an encrypted password, when decrypted with the old hashed password, could cause a buffer overrun and potentially execute a hacker’s code.

  • Hackers even target the comparatively smaller world of Apple operating systems. In July 2002, CERT reported the Apple Mac OS X had a vulnerability in the Stuffit Expander utility included with the operating system. This vulnerability allowed an attacker to create Trojan horse zip files with executable code.

For examples of vulnerabilities across all platforms, see the CERT Web site http://www.cert.org. (The CERT Coordination Center is a reporting center for Internet security problems.)

Cyber-Terrorism

Slammer was a nondirected, noncoordinated virus that did nothing other than try to infect other machines. But what would happen if terrorists wrote computer viruses that attacked government, military, or commercial targets? The result would be cyber-terrorism, and the mere mention of this term makes many people scared. In recent years, as systems across the world have become more and more interconnected, the fear of cyber-terrorism and cyber-attacks has grown. Many people fear that cyber-terrorists anywhere in the world might hack into the computers at an electrical utility company and cause a nuclear reactor’s core to overheat, following which they might cause a dam to open its gates, flooding a city, and finish by causing two trains to collide head-on at high speed.

These kinds of doomsday scenarios fuel the imaginations of B-grade Hollywood scriptwriters and reporters from small-town TV news stations desperate for any story that can catapult them to the big time. The reality is that the controls for essential systems are usually not connected to the Internet. To drain the water from the core of a nuclear power plant, you need to be inside the plant’s control center. Similarly, the switch that causes the dam gates to open is not connected to the Internet—why would it be? (See Figure 16-1.) Likewise, train companies have set routes and safeguards to stop controllers from accidentally causing a head-on accident.

click to expand
Figure 16-1: Press the button to flood the town below

What is more realistic is an attack on the Internet itself, with the sole purpose of bringing down the entire Internet. How realistic is this? It almost happened in 2002.

To understand what happened, you have to know that at the core of the Internet are 13 domain-name system root servers that translate URLs into the numeric IP addresses computers use to communicate with other computers. Although domain-name servers and gateways cache many of these translations, if all 13 of the domain-name system root servers are down long enough, Internet traffic will grind to a halt. On Monday, October 21, 2002, hackers mounted a distributed denial of service attack targeting the name servers. The attack was in the form of a data flood, which sent an enormous number of Internet control message protocol (ICMP) packets to the 13 root servers. This attack brought down 7 of the 13 servers for several hours. Although no one knows who mounted the attack, most authorities discount terrorists. What is clear, though, is that future attacks might succeed where this attack failed.




Security for Microsoft Visual Basic  .NET
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net