Sigh.  See, this kind of thing is what happens when developers don't
take the most elementary precautions when sanity checking their
inputs.  Haven't those people ever heard of Fuzz Testing?

http://pages.cs.wisc.edu/~bart/fuzz/

The researcher documents research published in 1990, 1995, 2000, and
2006.  One of my favorite quotes in those articles is this passage
from the last paper:

----
"     With each new release of fuzz testing results, we are often
asked "do these bugs really matter". When we present our results
to software developers and managers, we get a mixture of three
basic responses:

1.   These bugs do not reflect realistic usage patterns, so it is not
     cost effective to spend time on fixing them.

     In the early years of our studies, we did not have a good
     response to this criticism. However recent events have shown
     this view to be obsolete. The kinds of bugs that we find are
     true favorites for those who are developing security exploits.
     Even if we wish to ignore reliability as an end in itself, vul-
     nerabilities in security have a clear cost. As Garfinkel and
     Spafford noted several years ago, reliability is the foundation
     of security [6]. And we quote from Microsoft, "An insecure
     driver is inherently unreliable, and an unreliable driver is
     inherently insecure." [13]

2.   This crash data is easy to obtain and free, and the crashes
     might occur in actual use, so the bugs should be fixed.

     This is the view that we hope to hear. It is rarer than we would
     like. Note that by "easy to obtain and free", we mean that the
     test programs, results, and fixes are available on our web site.


3.   These are bugs! Bugs! My code is malformed and I must fix it!

     This view is one that resonates with those who see software
     development as a true craft, and not just a job. A woodworker,
     artist, or stonemason would be loath to produce a work with a
     known flaw, and would cringe at the thought of not fixing
     such a flaw if one was pointed out to them. You either get this
     view or you do not. These are the folks that we would like to
     have working for or with us."
----

Which attitude above do you think probably reflects Valve's current
management and dev team?

To summarize:  This is NOT a new class of problem that suddenly sprung
up.  In fact, the tools to perform the testing necessary to find this
problem have been freely available in a platform agnostic, language
neutral way for nearly 20 years.  This is very, VERY basic stuff that
should _never_ affect an application with such a huge public presence.

IOW, Valve screwed up in a very, very big way.  Frankly, I'm surprised
it  took this long for someone to create a packet generator that takes
advantage of the weakness. Here's hoping that Valve gets to work doing
some basic tests before their next release.

>  ----------------------------------------------------------------------
>
>  Message: 1
>  Date: Mon, 28 Apr 2008 19:38:57 -0700
>  From: "Nephyrin Zey" <[EMAIL PROTECTED]>
>  Subject: Re: [hlds] Critical "Nuke Attack" Exploit within Source
>         engine
>  To: "Half-Life dedicated Win32 server mailing list"
>         <[email protected]>
>  Message-ID:
>         <[EMAIL PROTECTED]>
>  Content-Type: text/plain; charset=UTF-8
>
>  It can send any packet of data you tell it to, the key to the attack
>  is the fact that it spams it over and over. I successfully took down a
>  test server here after instructing the tool to spam the string "aaaa"
>  (4141414100)
>
>  - Neph
>

[HUGE snip.  Doesn't anyone bother to practice netiquette these days?]
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to