We are working with Inprise/Borland/Interbase on fixes for all
platforms that ship with InterBase.
I expect we will release these fixes soon.
Best Regards,
/Gordon Garb
>I don't think it's out, yet Borland released a batch for every single
>platform other than Cobalt 'cause I guess not much people are using IB on
>the Cobalt. The same applies to the APOP current problem. I think they need
>to start improving the response time for such issues 'cause new technologies
>are introduced every day and as a Cobalt owner/developer there should be a
>quick turn over for these technologies to be added for us to use. From this
>point of view, I guess the Cobalt is doing great since the Raq 4 has PHP,
>ASP, and variety of choices that can be activated in an easy way. I won't
>even be surprised if the next Cobalt had a ready to use JVM for Servlets,
>Beans, and others. The weakness I guess in my thinking is found in how to
>provide continuous updates and stuff like that in a timely manner for the
>Cobalt Community. I'm not attacking Cobalt or have anything against them,
>and we like the product and use it, however if we can't keep the machine up
>up-to-date within a reasonable timeframe then what's the idea of using the
>product as opposed to using a Linux Machine. Information regarding
>installing, updating the Linux is spread every where but for the Cobalt we
>depend on Cobalt Staff so our business depends on how fast the Support Team
>can provide us with instructions of doing an update, install, etc...
>
>I don't have much experience with the rpm and pkg files, yet I know that the
>Cobalt supports rpm thus if a pkg file takes time, then why not posting an
>rpm that would install to the right directories. This way at least you give
>an option for us to look up information on rpms and do the install without
>any problems...
>
>
>Kal
>
>-----Original Message-----
>From: [EMAIL PROTECTED]
>[mailto:[EMAIL PROTECTED]]On Behalf Of Peter Ball
>Sent: Friday, January 26, 2001 6:36 PM
>To: [EMAIL PROTECTED]
>Subject: RE: [cobalt-developers] Interbase Warning
>
>
>Hi Tim, or anyone from Cobalt,
>
>Any idea when the bug fix for this will be released by Cobalt? Or has it
>been released and I missed it?
>
>
>
>-----Original Message-----
>From: [EMAIL PROTECTED]
>[mailto:[EMAIL PROTECTED]]On Behalf Of Jon
>Rosenberg
>Sent: Thursday, 11 January 2001 8:33 AM
>To: [EMAIL PROTECTED]
>Subject: [cobalt-developers] Interbase Warning
>
>
>For those of you using Interbase:
>
>CERT Advisory CA-2001-01 Interbase Server Contains Compiled-in Back Door
>Account
>
> Original release date: January 10, 2001
> Last revised: --
> Source: CERT/CC
>
> A complete revision history is at the end of this file.
>
>Systems Affected
>
> * Borland/Inprise Interbase 4.x and 5.x
> * Open source Interbase 6.0 and 6.01
> * Open source Firebird 0.9-3 and earlier
>
>Overview
>
> Interbase is an open source database package that had previously been
> distributed in a closed source fashion by Borland/Inprise. Both the
> open and closed source verisions of the Interbase server contain a
> compiled-in back door account with a known password.
>
>I. Description
>
> Interbase is an open source database package that is distributed by
> Borland/Inprise at http://www.borland.com/interbase/ and on
> SourceForge. The Firebird Project, an alternate Interbase package, is
> also distributed on SourceForge. The Interbase server for both
> distributions contains a compiled-in back door account with a fixed,
> easily located plaintext password. The password and account are
> contained in source code and binaries previously made available at the
> following sites:
>
> http://www.borland.com/interbase/
> http://sourceforge.net/projects/interbase
> http://sourceforge.net/projects/firebird
> http://firebird.sourceforge.net
> http://www.ibphoenix.com
> http://www.interbase2000.com
>
> This back door allows any local user or remote user able to access
> port 3050/tcp [gds_db] to manipulate any database object on the
> system. This includes the ability to install trapdoors or other trojan
> horse software in the form of stored procedures. In addition, if the
> database software is running with root privileges, then any file on
> the server's file system can be overwritten, possibly leading to
> execution of arbitrary commands as root.
>
> This vulnerability was not introduced by unauthorized modifications to
> the original vendor's source. It was introduced by maintainers of the
> code within Borland. The back door account password cannot be changed
> using normal operational commands, nor can the account be deleted from
> existing vulnerable servers [see References].
>
> This vulnerability has been assigned the identifier CAN-2001-0008 by
> the Common Vulnerabilities and Exposures (CVE) group:
>
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0008
>
> The CERT/CC has not received reports of this back door being exploited
> at the current time. We do recommend, however, that all affected sites
> and redistributors of Interbase products or services follow the
> recommendations suggested in Section III, as soon as possible due to
> the seriousness of this issue.
>
>II. Impact
>
> Any local user or remote user able to access port 3050/tcp [gds_db]
> can manipulate any database object on the system. This includes the
> ability to install trapdoors or other trojan horse software in the
> form of stored procedures. In addition, if the database software is
> running with root privileges, then any file on the server's file
> system can be overwritten, possibly leading to execution of arbitrary
> commands as root.
>
>III. Solution
>
>Apply a vendor-supplied patch
>
> Both Borland and The Firebird Project on SourceForge have published
> fixes for this problem. Appendix A contains information provided by
> vendors supplying these fixes. We will update the appendix as we
> receive more information. If you do not see your vendor's name, the
> CERT/CC did not hear from that vendor. Please contact your vendor
> directly.
>
> Users who are more comfortable making their own changes in source code
> may find the new code available on SourceForge useful as well:
>
> http://sourceforge.net/projects/interbase
> http://sourceforge.net/projects/firebird
>
>Block access to port 3050/tcp
>
> This will not, however, prevent local users or users within a
> firewall's adminstrative boundary from accessing the back door
> account. In addition, the port the Interbase server listens on may be
> changed dynamically at startup.
>
>Appendix A. Vendor Information
>
>Borland
>
> Please see:
>
> http://www.borland.com/interbase/
>
>IBPhoenix
>
> The Firebird project uncovered serious security problems with
> InterBase. The problems are fixed in Firebird build 0.9.4 for all
> platforms. If you are running either InterBase V6 or Firebird 0.9.3,
> you should upgrade to Firebird 0.9.4.
>
> These security holes affect all version of InterBase shipped since
> 1994, on all platforms.
>
> For those who can not upgrade, Jim Starkey developed a patch program
> that will correct the more serious problems in any version of
> InterBase on any platform. IBPhoenix chose to release the program
> without charge, given the nature of the problem and our relationship
> to the community.
>
> At the moment, name service is not set up to the machine that is
> hosting the patch, so you will have to use the IP number both for the
> initial contact and for the ftp download.
>
> To start, point your browser at
>
> http://firebird.ibphoenix.com/
>
>Apple
>
> The referenced database package is not packaged with Mac OS X or Mac
> OS X Server.
>
>Fujitsu
>
> Fujitsu's UXP/V operating system is not affected by this problem
> because we don't support the relevant database.
>
>References
>
> 1. VU#247371: Borland/Inprise Interbase SQL database server contains
> backdoor superuser account with known password CERT/CC,
> 01/10/2001, https://www.kb.cert.org/vuls/id/247371
> _________________________________________________________________
>
> Author: This document was written by Jeffrey S Havrilla. Feedback on
> this advisory is appreciated.
> ______________________________________________________________________
>
> This document is available from:
> http://www.cert.org/advisories/CA-2001-01.html
> ______________________________________________________________________
>
>CERT/CC Contact Information
>
> Email: [EMAIL PROTECTED]
> Phone: +1 412-268-7090 (24-hour hotline)
> Fax: +1 412-268-6989
> Postal address:
> CERT Coordination Center
> Software Engineering Institute
> Carnegie Mellon University
> Pittsburgh PA 15213-3890
> U.S.A.
>
> CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4)
> Monday through Friday; they are on call for emergencies during other
> hours, on U.S. holidays, and on weekends.
>
>Using encryption
>
> We strongly urge you to encrypt sensitive information sent by email.
> Our public PGP key is available from
>
> http://www.cert.org/CERT_PGP.key
>
> If you prefer to use DES, please call the CERT hotline for more
> information.
>
>Getting security information
>
> CERT publications and other security information are available from
> our web site
>
> http://www.cert.org/
>
> To subscribe to the CERT mailing list for advisories and bulletins,
> send email to [EMAIL PROTECTED] Please include in the body of your
> message
>
> subscribe cert-advisory
>
> * "CERT" and "CERT Coordination Center" are registered in the U.S.
> Patent and Trademark Office.
> ______________________________________________________________________
>
> NO WARRANTY
> Any material furnished by Carnegie Mellon University and the Software
> Engineering Institute is furnished on an "as is" basis. Carnegie
> Mellon University makes no warranties of any kind, either expressed or
> implied as to any matter including, but not limited to, warranty of
> fitness for a particular purpose or merchantability, exclusivity or
> results obtained from use of the material. Carnegie Mellon University
> does not make any warranty of any kind with respect to freedom from
> patent, trademark, or copyright infringement.
> _________________________________________________________________
>
> Conditions for use, disclaimers, and sponsorship information
>
> Copyright 2001 Carnegie Mellon University.
>
> Revision History
>January 10, 2001: Initial release
>
>
>
>_______________________________________________
>cobalt-developers mailing list
>[EMAIL PROTECTED]
>http://list.cobalt.com/mailman/listinfo/cobalt-developers
>
>_______________________________________________
>cobalt-developers mailing list
>[EMAIL PROTECTED]
>http://list.cobalt.com/mailman/listinfo/cobalt-developers
>
>
>_________________________________________________________
>Do You Yahoo!?
>Get your free @yahoo.com address at http://mail.yahoo.com
>
>_______________________________________________
>cobalt-developers mailing list
>[EMAIL PROTECTED]
>http://list.cobalt.com/mailman/listinfo/cobalt-developers
--
-- --
Gordon Garb gordon.garb @sun.com
Senior Manager - Developer Relations
http://developer.cobalt.com/
http://www.cobalt.com/solutions
Cobalt Networks -- the Sun Microsystems Server Appliance Business Unit
555 Ellis Street +1 650 623-2501 fax
Mountain View, CA 94043 USA +1 650 623-2534 voice
_______________________________________________
cobalt-developers mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-developers