[Tfug] Uptime

Angus Scott-Fleming angussf at geoapps.com
Wed Apr 15 22:14:48 MST 2009


On 15 Apr 2009 at 16:39, Zack Williams  wrote:

> Just logged into a box I set up years ago that gets weekly use by a
> few nonprofits and local governments:
> 
> OpenBSD xxxxxx.xxxxx.org 3.4 GENERIC#0 i386
> -bash-2.05b$ uptime
>  6:14AM  up 1979 days,  2:02, 2 users, load averages: 0.24, 0.41, 0.43
> 
> That's over 5 years! :)

It's really *-nice-* that the box is still up and running after 5 years, but 
OpenBSD 3.4 is vastly out of date.  I wouldn't be at all surprised if there 
were exploits that are available to attack that box (even though it's running 
OpenBSD).

FWIW:
------- Included Stuff Follows -------
OpenBSD - http://openbsd.org/
    "The current release is OpenBSD 4.4 which was released Nov 1, 2008."

OpenBSD Security - http://openbsd.org/security.html#34
    "These are the OpenBSD 3.4 advisories -- all these problems are solved in 
    OpenBSD current. The patch branch for 3.4 is no longer being maintained, 
    you should update your machine.  

    * Dec 14, 2004: On systems running isakmpd(8) it is possible for a local 
user to cause kernel memory corruption and system panic by setting ipsec(4) 
credentials on a socket.
    * Sep 16, 2004: The Xpm library has vulnerabilities when parsing malicious 
images.
    * Sep 10, 2004: httpd(8)'s mod_rewrite module can be made to write one zero 
byte in an arbitrary memory position outside of a char array, causing a DoS or 
possibly buffer overflows.
    * Jun 12, 2004: Multiple vulnerabilities have been found in httpd(8) / 
mod_ssl.
    * Jun 10, 2004: isakmpd(8) still has issues with unauthorized SA deletion, 
an attacker can delete IPsec tunnels at will.
    * Jun 9, 2004: Multiple remote vulnerabilities have been found in the 
cvs(1) server which can be used by CVS clients to crash or execute arbitrary 
code on the server.
    * May 30, 2004: kdc(8) performs inadequate checking of request fields, 
leading to the possibility of principal impersonation from other Kerberos 
realms if they are trusted with a cross-realm trust.
    * May 20, 2004: A buffer overflow in the cvs(1) server has been found, 
which can be used by CVS clients to execute arbitrary code on the server.
    * May 13, 2004: Integer overflow problems were found in procfs, allowing 
reading of arbitrary kernel memory.
    * May 5, 2004: Pathname validation problems have been found in cvs(1), 
allowing clients and servers access to files outside the repository or local 
CVS tree.
    * March 17, 2004: A missing check for a NULL-pointer dereference may allow 
a remote attacker to crash applications using OpenSSL.
    * March 17, 2004: Defects in the payload validation and processing 
functions of isakmpd have been discovered. An attacker could send malformed 
ISAKMP messages and cause isakmpd to crash or to loop endlessly.
    * March 13, 2004: Due to a bug in the parsing of Allow/Deny rules for 
httpd(8)'s access module, using IP addresses without a netmask on big endian 
64-bit platforms causes the rules to fail to match.
    * February 8, 2004: An IPv6 MTU handling problem exists that could be used 
by an attacker to cause a denial of service attack.
    * February 5, 2004: A reference counting bug in shmat(2) could be used to 
write to kernel memory under certain circumstances.
    * January 13, 2004: Several message handling flaws in isakmpd(8) have been 
reported by Thomas Walpuski.
    * November 17, 2003: It may be possible for a local user to overrun the 
stack in compat_ibcs2(8) and cause a kernel panic.
    * November 1, 2003: The use of certain ASN.1 encodings or malformed public 
keys may allow an attacker to mount a denial of service attack against 
applications linked with ssl(3)."
--------- Included Stuff Ends ---------

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
+-----------------------------------+







More information about the tfug mailing list