***********************************************************************
DDN Security Bulletin 90-05 DCA DDN Defense Communications System
20 Mar 90 Published by: DDN Security Coordination Center
(SCC@NIC.DDN.MIL) (800) 235-3155
The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security Coordination Center) under DCA contract as a means of communicating information on network and host security exposures, fixes, & concerns to security & management personnel at DDN facilities. Back issues may be obtained via FTP (or Kermit) from NIC.DDN.MIL [26.0.0.73] using login="anonymous" and password="guest". The bulletin pathname is SCC:DDN-SECURITY-yy-nn (where "yy" is the year the bulletin is issued and "nn" is a bulletin number, e.g. SCC:DDN-SECURITY-90-01).
**********************************************************************
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
! !
! The following important advisory was issued by the Computer !
! Emergency Response Team (CERT) and is being relayed unedited !
! via the Defense Communications Agency's Security Coordination !
! Center distribution system as a means of providing DDN !
! subscribers with useful security information. !
! !
+ - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - +
There have been a number of media reports stemming from a March 19 New York Times article entitled 'Computer System Intruder Plucks Passwords and Avoids Detection.' The article referred to a program that attempts to get into computers around the Internet.
At this point, the Computer Emergency Response Team Coordination Center (CERT/CC) does not have hard evidence that there is such a program. What we have seen are several persistent attempts on systems using known security vulnerabilities. All of these vulnerabilities have been previously reported. Some national news agencies have referred to a 'virus' on the Internet; the information we have now indicates that this is NOT true. What we have seen and can confirm is an intruder making persistent attempts to get into Internet systems.
It is possible that a program may be discovered. However, all the techniques used in these attempts have also been used, in the past, by intruders probing systems manually.
As of the morning of March 19, we know of several systems that have been broken into and several dozen more attempts made on Thursday and Friday, March 15 and 16.
Systems administrators should be aware that many systems around the Internet may have these vulnerabilities, and intruders know how to exploit them. To avoid security breaches in the future, we recommend that all system administrators check for the kinds of problems noted in this message.
The rest of this advisory describes problems with system configurations that we have seen intruders using. In particular, the intruders attempted to exploit problems in Berkeley BSD derived UNIX systems and have attacked DEC VMS systems. In the advisory below, points 1 through 12 deal with Unix, points 13 and 14 deal with the VMS attacks.
If you have questions about a particular problem, please get in touch with your vendor.
The CERT makes copies of past advisories available via anonymous FTP (see the end of this message). Administrators may wish to review these as well.
We've had reports of intruders attempting to exploit
the following areas:
BSD 5.61 fixes all known holes that the intruder
is using.
Make sure you are running the most recent version
of FTP which is the Berkeley version 4.163 of Nov. 8 1988. Check
with your vendor for information on configuration upgrades. Also
check your anonymous FTP configuration. It is important to follow
the instructions provided with the operating system to properly
configure the files available through anonymous ftp (e.g., file
permissions, ownership, group, etc.). Note especially that you
should not use your system's standard password file as the password
file for FTP.
Past advisories and other information are available for anonymous ftp From cert.sei.cmu.edu (128.237.253.5).
------------------------------------------------------------------------------
If you believe that your system has been compromised, contact the Defense Communications Agency DDN/MILNET Monitoring Center and CERT via telephone or email.
Telephone: 800-451-7413 or 202-692-5726 (commercial)
312-746-1849 (DSN)