[Tfug] Uptime
Angus Scott-Fleming
angussf at geoapps.com
Wed Apr 15 22:14:48 MST 2009
On 15 Apr 2009 at 16:39, Zack Williams wrote:
> Just logged into a box I set up years ago that gets weekly use by a
> few nonprofits and local governments:
>
> OpenBSD xxxxxx.xxxxx.org 3.4 GENERIC#0 i386
> -bash-2.05b$ uptime
> 6:14AM up 1979 days, 2:02, 2 users, load averages: 0.24, 0.41, 0.43
>
> That's over 5 years! :)
It's really *-nice-* that the box is still up and running after 5 years, but
OpenBSD 3.4 is vastly out of date. I wouldn't be at all surprised if there
were exploits that are available to attack that box (even though it's running
OpenBSD).
FWIW:
------- Included Stuff Follows -------
OpenBSD - http://openbsd.org/
"The current release is OpenBSD 4.4 which was released Nov 1, 2008."
OpenBSD Security - http://openbsd.org/security.html#34
"These are the OpenBSD 3.4 advisories -- all these problems are solved in
OpenBSD current. The patch branch for 3.4 is no longer being maintained,
you should update your machine.
* Dec 14, 2004: On systems running isakmpd(8) it is possible for a local
user to cause kernel memory corruption and system panic by setting ipsec(4)
credentials on a socket.
* Sep 16, 2004: The Xpm library has vulnerabilities when parsing malicious
images.
* Sep 10, 2004: httpd(8)'s mod_rewrite module can be made to write one zero
byte in an arbitrary memory position outside of a char array, causing a DoS or
possibly buffer overflows.
* Jun 12, 2004: Multiple vulnerabilities have been found in httpd(8) /
mod_ssl.
* Jun 10, 2004: isakmpd(8) still has issues with unauthorized SA deletion,
an attacker can delete IPsec tunnels at will.
* Jun 9, 2004: Multiple remote vulnerabilities have been found in the
cvs(1) server which can be used by CVS clients to crash or execute arbitrary
code on the server.
* May 30, 2004: kdc(8) performs inadequate checking of request fields,
leading to the possibility of principal impersonation from other Kerberos
realms if they are trusted with a cross-realm trust.
* May 20, 2004: A buffer overflow in the cvs(1) server has been found,
which can be used by CVS clients to execute arbitrary code on the server.
* May 13, 2004: Integer overflow problems were found in procfs, allowing
reading of arbitrary kernel memory.
* May 5, 2004: Pathname validation problems have been found in cvs(1),
allowing clients and servers access to files outside the repository or local
CVS tree.
* March 17, 2004: A missing check for a NULL-pointer dereference may allow
a remote attacker to crash applications using OpenSSL.
* March 17, 2004: Defects in the payload validation and processing
functions of isakmpd have been discovered. An attacker could send malformed
ISAKMP messages and cause isakmpd to crash or to loop endlessly.
* March 13, 2004: Due to a bug in the parsing of Allow/Deny rules for
httpd(8)'s access module, using IP addresses without a netmask on big endian
64-bit platforms causes the rules to fail to match.
* February 8, 2004: An IPv6 MTU handling problem exists that could be used
by an attacker to cause a denial of service attack.
* February 5, 2004: A reference counting bug in shmat(2) could be used to
write to kernel memory under certain circumstances.
* January 13, 2004: Several message handling flaws in isakmpd(8) have been
reported by Thomas Walpuski.
* November 17, 2003: It may be possible for a local user to overrun the
stack in compat_ibcs2(8) and cause a kernel panic.
* November 1, 2003: The use of certain ASN.1 encodings or malformed public
keys may allow an attacker to mount a denial of service attack against
applications linked with ssl(3)."
--------- Included Stuff Ends ---------
--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
+-----------------------------------+
More information about the tfug
mailing list