109602 2003-08-14 01:10 /189 rader/ CERT Advisory <cert-advisory@cert.org>
Importerad: 2003-08-14 01:10 av Brevbäraren
Extern mottagare: cert-advisory@cert.org
Mottagare: Bugtraq (import) <6000>
Ärende: CERT Advisory CA-2003-21 GNU Project FTP Server Compromise
------------------------------------------------------------
-----BEGIN PGP SIGNED MESSAGE-----
CERT Advisory CA-2003-21 GNU Project FTP Server Compromise
Original issue date: August 13, 2003
Last revised: --
Source: CERT/CC
A complete revision history is at the end of this file.
Overview
The CERT/CC has received a report that the system housing the
primary FTP servers for the GNU software project was compromised.
I. Description
The GNU Project, principally sponsored by the Free Software
Foundation (FSF), produces a variety of freely available
software. The CERT/CC has learned that the system housing the
primary FTP servers for the GNU software project,
gnuftp.gnu.org, was root compromised by an intruder. The more
common host names of ftp.gnu.org and alpha.gnu.org are aliases
for the same compromised system. The compromise is reported
to have occurred in March of 2003.
The FSF has released an announcement describing the incident.
Because this system serves as a centralized archive of
popular software, the insertion of malicious code into the
distributed software is a serious threat. As the above
announcement indicates, however, no source code distributions
are believed to have been maliciously modified at this time.
II. Impact
The potential exists for an intruder to have inserted back doors,
Trojan horses, or other malicious code into the source code
distributions of software housed on the compromised system.
III. Solution
We encourage sites using the GNU software obtained from the
compromised system to verify the integrity of their distribution.
Sites that mirror the source code are encouraged to verify
the integrity of their sources. We also encourage users to inspect
any and all other software that may have been downloaded from the
compromised site. Note that it is not always sufficient to rely
on the timestamps or file sizes when trying to determine
whether or not a copy of the file has been modified.
Verifying checksums
The FSF has produced PGP-signed lists of known-good MD5 hashes of
the software packages housed on the compromised server. These
lists can be found at
ftp://ftp.gnu.org/before-2003-08-01.md5sums.asc
ftp://alpha.gnu.org/before-2003-08-01.md5sums.asc
Note that both of these files and the announcement above are
signed by Bradley Kuhn, Executive Director of the FSF, with the
following PGP key:
pub 1024D/DB41B387 1999-12-09 Bradley M. Kuhn <bkuhn@fsf.org>
Key fingerprint = 4F40 645E 46BE 0131 48F9 92F6 E775 E324 DB41 B387
uid Bradley M. Kuhn (bkuhn99) <bkuhn@ebb.org>
uid Bradley M. Kuhn <bkuhn@gnu.org>
sub 2048g/75CA9CB3 1999-12-09
The CERT/CC believes this key to be valid.
As a matter of good security practice, the CERT/CC encourages
users to verify, whenever possible, the integrity of downloaded
software. For more information, see IN-2001-06.
Appendix A. - Vendor Information
This appendix contains information provided by vendors for
this advisory. As vendors report new information to the
CERT/CC, we will update this section and note the changes in our
revision history. If a particular vendor is not listed below,
we have not received their comments.
Free Software Foundation
The current files on alpha.gnu.org and ftp.gnu.org as of
2003-08-02 have all been verified, and their md5sums and the
reasons we believe the md5sums can be trusted are in:
ftp://ftp.gnu.org/before-2003-08-01.md5sums.asc
ftp://alpha.gnu.org/before-2003-08-01.md5sums.asc
We are updating that file and the site as we confirm good md5sums
of additional files. It is theoretically possible that downloads
between March 2003 and July 2003 might have been
source-compromised, so we encourage everyone to re-download
sources and compare with the current copies for files on the site.
Appendix B. References
* FSF announcement regarding the incident -
ftp://ftp.gnu.org/MISSING-FILES.README
* CERT Incident Note IN-2001-06 -
http://www.cert.org/incident_notes/IN-2001-06.html
_________________________________________________________________
The CERT/CC thanks Bradley Kuhn and Brett Smith of the Free Software
Foundation for their timely assistance in this matter.
_________________________________________________________________
Feedback can be directed to the author: Chad Dougherty.
______________________________________________________________________
This document is available from:
http://www.cert.org/advisories/CA-2003-21.html
______________________________________________________________________
CERT/CC Contact Information
Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.
CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) /
EDT(GMT-4) Monday through Friday; they are on call for emergencies
during other hours, on U.S. holidays, and on weekends.
Using encryption
We strongly urge you to encrypt sensitive information sent by
email. Our public PGP key is available from
http://www.cert.org/CERT_PGP.key
If you prefer to use DES, please call the CERT hotline for
more information.
Getting security information
CERT publications and other security information are available
from our web site http://www.cert.org/
To subscribe to the CERT mailing list for advisories and
bulletins, send email to majordomo@cert.org. Please include in
the body of your message
subscribe cert-advisory
* "CERT" and "CERT Coordination Center" are registered in the
U.S. Patent and Trademark Office.
______________________________________________________________________
NO WARRANTY Any material furnished by Carnegie Mellon University
and the Software Engineering Institute is furnished on an
"as is" basis. Carnegie Mellon University makes no warranties of
any kind, either expressed or implied as to any matter
including, but not limited to, warranty of fitness for a
particular purpose or merchantability, exclusivity or results
obtained from use of the material. Carnegie Mellon University does
not make any warranty of any kind with respect to freedom from
patent, trademark, or copyright infringement.
______________________________________________________________________
Conditions for use, disclaimers, and sponsorship information
Copyright 2002 Carnegie Mellon University.
Revision History
August 13, 2003: Initial release
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
iQCVAwUBPzqwFWjtSoHZUTs5AQGN4AQAvL/u+S+FpkNWtBH/fe9DCLJQM21I/dzt
QPU0prMxTq53ntvTOAth+yFPtbcbeDaWuLHakju0mL4OSU0Fp+VsXbXnF5ypE+0r
S5mHpMxSmvPBPBNTIMQUGybEKK783P9Ty2lhXxawEW9JbdgMOY44clo2VIupgxuZ
OeyQrFbsq54=
=/72G
-----END PGP SIGNATURE-----
(109602) /CERT Advisory <cert-advisory@cert.org>/(Ombruten)