LinuxPPC Autostart Worm 51
JD Fant alerted
us to an article appearing over at macintouch
that claims that the new R5 of LinuxPPC was released with a benign
worm on it. Apparently it can't spread, but it is there (the
page has comments from Jason Haas)
Re:Um... Worm? (Score:1)
They didn't purposely turn off the flag, it is off by default under Linux when burning a MkHybrid CD.
The worm failed to turn on the Autorun flag, since it doesn't run on Linux, since it is a Mac OS binary.
Re:Ugh (Score:1)
What's important is that we were told of it's existence. I cannot be critical of the coders, they are human(an assumption), and they have busted butt on this. Remember this is *not* Micro$oft, they will tell you there is a problem before they have a fix in place.
Kudos for the LinuxPPC team!
Re:Some nitpicking (Score:1)
Sorry for the worth notation I just took a CS final today and had to write psudo code in worthiam style.
"There is no spoon" - Neo, The Matrix
"SPOOOOOOOOON!" - The Tick, The Tick
Re:Um... Worm? (Score:1)
"There is no spoon" - Neo, The Matrix
"SPOOOOOOOOON!" - The Tick, The Tick
this worm really sucks... (Score:1)
--
Joshua Curtis
Lancaster Co. Linux Users Group
Re:Some nitpicking (Score:2)
Thanks for your info on the gpl and redhat; I should have known that. Perhaps, it may be that RedHat==Linux, so that LinuxPPC used this to gain acceptance. However, I keep thinking that this was an arrangement so that RedHat would maintain/update their installer for the PowerPC chip. Note: the mac end installer for R5 is entirely different than the RedHat installer. The new LinuxPPC Linux installer is okay, but it doesn't seem to have the same level of fine-tuning control that the RedHat installer has.
This is a dangerous post as I am still working on this new release. Perhaps I should keep my ignorant mouth shut until I am more informed about this. However, this is
OSS did this? (Score:1)
I think it speaks to the power of open source software that this was caught
Dare I dispute the Awesome Magical Force of OSS and ask how OSS had anything to do with the catching of this worm?
The virus is a Macintosh virus; it was detected by Macintosh virus detectors. Last time I checked, none of them were in any sort of open-source licensing agreement. I'm sure the people who caught it were using one of the numerous AppleScripts I've seen, or a freeware app, or maybe even something commercial like Virex. But again, not open source stuff AFAIK.
OSS really has nothing to do with this, guys. I like OSS as much as the next guy, but just because someone caught a Mac virus on a Mac Linux distribution CD doesn't mean we should (as we always seem to do) go running in the streets shouting the praises of OSS.
But what do I know, I'm just a Mac user.
Re:Oh well. (Score:1)
Autostart is a Macintosh-ONLY work that propagates by taking advantage of the fact that most Macs are set to automatically execute certain 'flagged' applications on a CD when it is inserted into a drive. Autostart is about the only halfway dangerous virus/worm-like activity the Mac platform has had in about 5 years or so (it was a Big Deal on all of the Mac sites a year or so ago).
Anyhow, since this worm got burnt on the Linux side of things, it is apparently not available on the standard HFS Mac parition - ergo, it cannot run or do any damage. It is dead before it ever had the opportunity to cause damage. This isn't a macro virus, folks, it can't do anything just by being there. It has to execute code like any other self respecting virus.
Now, the fact that they didn't notice it for a while may be cause for concern, but it's not exactly that big of a deal. If you make a Linux distribution, how often do you scan for Windows or Mac virii?
- Darchmare
- Axis Mutatis, http://www.axismutatis.net
Re:Thank God (Score:1)
1. It's IIS 4.0, not 5.0.
2. The problem with IIS 4.0 is nothing to do with viruses or worms.
3. Microsoft posted a workaround to all members of its security mailing list about 5 hours ago; NTBugTraq posted the same message shortly afterwards. Every NT sysadmin who's anyone has plugged this hole by now.
Please stop spreading FUD, it does you a disservice.
Cheers
Alastair
Speaking of R5 problems... (Score:1)
Re:open source? (Score:1)
If you're all that worried about worms... (Score:1)
-lx
I meant commercial versus open source,,, (Score:1)
Re:Windows autostarts (Score:1)
Autostart Information (Score:3)
First some background, way back when (sometime in '95) Apple introduced a new autostart feature to QuickTime. If you've used win95 you probably know how this works, you pop in a CD and it automatically launches an application for you.
According to http://developer.apple.com/qa/qtpc/qtpc12.html, Apple's implimentation works like this: the developer puts the autostart application's file name in a magic place in the first few blocks of the drive. When the drive is mounted and the AutoStart feature is enabled (its a simple check-on, check-off feature) the application launches.
The Worm is simply an autostart application that copies itself to the startup drive so that it is launched at every boot, and then procedes to copy itself to every mounted partition (hard drives, zip drives, network drives, etc.) about every 30 minutes and enables the autostart blocks on those volumes. After infecting the other volumes, it goes about your system overwriting various files with random data.
Anyway, I believe the Linux PPC CD contains the AutoStart Worm application but the CD doesn't contain the blocks that actually tell QuickTime to launch it. You also can't accidentally launch it because the file is hidden, meaning you have to use a seperate utility, not the Finder, to even see that it's there.
There are 3 names that the various strains of the Worm use for the autostart application filename. This is what the antivirus software looks for, and what they find.
Well, that's about all I know on the issue. Perhaps more than any of you wanted, but I find this kinda thing interesting. I am kinda curious why we havent seen a similar worm taking advantage of the Windows 95 autostart feature...
I can't believe nobody else thought of this... (Score:1)
in my apple.
Re:If you're all that worried about worms... (Score:1)
What's that all about??? There's no need to belittle Linux on this thread like that. Especially since:
1. This is a worm for MacOS, not linux (I am going to use linux but I guess I really mean any Open Source OS, so I'm an OS bigot =).
2. Any amount of "code review" isn't gonna stop someone from writing a worm. Code reviews will stop people from putting malicious code in the kernel itself tho. And I really don't think that you can say that linux doesn't have any code review. Besides that, a worm or virus doesn't need to run in kernel space to be effective. (As should be obvious since we don't have the source to MacOS, so you couldn't put a worm in the kernel, and this is a worm FOR MacOS).
3. I personally think that comments like yours which promotes fighting within the Open Source community are a MUCH bigger problem than a slip up like this. This worm isn't causing one bit of a problem. Yet all of the flame bait like what you wrote is yet another thread of conversation that can be used against the open source community.
Just my $0.02
rhavyn
Re:If you're all that worried about worms... (Score:1)
I did misunderstand that the worm is for MacOS, not linux(which makes a little more sense
It's unfortunate, that's all.
-lx
You are confused (Score:1)
Like many in the BSD world, you are confused about how Linux operates. NetBSD, FreeBSD, and OpenBSD are distributions, and are therefore properly compared to Debian, Red Hat, or SUSE, not Linux. Different distributions will have better or worse security policies.
Your claim that this incident is an argument in favor of OpenBSD's "total code review", however, is utter crap: OpenBSD's code review would not necessarily have saved an OpenBSD distributor from making a mistake like this. The bug could have been introduced at the last minute by whoever pressed the CD-ROMs. The worm was not present as source code in the original distribution, so there is nothing to catch by doing a review. And the OpenBSD people are good, but they are not perfect.
The Linux vendors definitely need to improve their security reviews. However, even with the way it is now, it's far better than what we used to get from commercial Unix vendors (who would typically ship with critical files world-writable, with programs setuid that were never designed that way).
Thank God (Score:2)
really embaressing if it blew up with all the
rippin' on Microsoft we've been doing lately =)
Seriously, though; I think it speaks to the power
of open source software that this was caught
before it spread to badly...
----
Ugh (Score:1)
Anyway, I hope it was caught before too many people were exposed (although it appears to be dormant).
open source? (Score:1)
It's a Linux distribution for Macs, that's how (Score:1)
J.
Update on AutoStart bug on R5 discs (Score:3)
start"
Subject: Update on AutoStart bug on R5 discs
Date: Tue, 15 Jun 1999 15:24:39 -0400
From: Jason Haas
Organization:LinuxPPC Inc.
Newsgroups: comp.os.linux.powerpc
We have concluded that the AutoStart worm cannot spread from R5 CDs tousers. No one has reported being infected by the discs, and several people have reported that having the disc in the machine does not cause their machine to become infected.
When we burned the master CD, we used the Linux program mkhybrid, and did not activate the auto-start option. We believe this prevents the worm from spreading to new machines from the disc.
We will have a new pressing of the disc available in about two weeks for users who would like to receive a new, clean copy of the disc.
Jason Haas,
LinuxPPC Inc.
end"
cheers,
mitch
Re:Ugh (Score:1)
I think it helped the Yellow Dog People, but...
"Anyway, I hope it was caught before too many people were exposed (although it appears to be dormant)."
It's nothing to lose sleep over. It *can not*, I repeat, *can not* spread or cause problems, since the activator flag on the CD-ROM wasn't activated. (The flag is -autostart=DB, the worm only works if the CD was burned on a Mac OS based machine, since it was burned under LinuxPPC, the autostart flag was off).
The worst thing this worm (on the CD) can do is set off antivirus software (all 3 mac users that own anti-virus software).
If you are parnianoid, turn of "Quicktime CD-ROM AutoStart". *Very* few CD's use this feature, and since the Autostart Virus for the Mac OS came out last year, it has been common advice for *all* Mac Users to disable this.
I won't comment on CD's not already shipped, where they will be repressed or not, according to MacFixit, with request they will send you a new CD. (For those really parnoid people, the same group that continues to work on bomb shelters or are building humgous store houses of 2yk supplies).
You're right, it is trivial (Score:1)
It could have also been used as FUD against LinuxPPC.
J.
A dead worm? (Score:1)
does this mean it's dead?
Re:Thank God (Score:1)
of open source software that this was caught before it spread to badly..."
Umm... I don't think it was caught too soon. This worm has literally been on the CD image since Memorial Day Weekend (when the master was made with the worm). They had completely shipped it, and a user discovered this when they blunked the CD in their drive and Virex presented this warning: "Warning: This CD is infected with the AutoStart Virus". Some of the people at LinuxPPC had been using this CD for weeks (Jason claims to have had it mounted in the Mac OS for 3 or so weeks).
Anyways the CD was burned in Linux, so that made the virus unspreadable (luckly!). Linux doesn't understand virus when it was being written, so it didn't install the autostart part of the worm. That basically ended the worm's sexuality, it could not spread anymore (take away the antostart part of autostart virus, and you just have two extra files on the disk). No real biggy.
I can not believe nobody did a ls on the CD in Linux, at
DB
Desktop Spooler
I guess nobody really thought about it before sending out the CDs.
Anyways, it's nothing to worry about. The worm is broken due to the Linux CD writing program, so it will not spread.
Re:Thank God (Score:1)
privacy issue that has cropped up with IIS 5.0 as seen on Wired.com. I am aware
of the security bug that has appeared in IIS 4, and was aware that a fix was
forthcoming.
As far as virii versus bugs, if they are included with a shipping product, they are both
issues with a particular package that need to be addressed. A problem included
with a piece of software that is being shipped is something that needs to be taken
seriously by a software manufacturer. I believe that Microsoft's plan of attack where
this is concerned leaves much to be desired. In the case of the recent IIS 4 security
hole, even a period of two days can cause a world of damage. If something like this
appears, it is Microsoft's responsibility to notify sites immediately that this issue
exists, not wait for a hotfix, which has become so popular.
I have to remember that when I post something like this to a forum like Slashdot,
vagueness is not the best trait to have
As far as this being FUD, I did not know that personal opinion could be considered
so damaging. It seems that any personal opinion is taken as slander against
something else. Makes a person afraid to raise a voice......
As I said, though, this is probably all a misunderstanding.
Bryan R.
Re:Thank God (Score:1)
Bryan R.
Re:Update on AutoStart bug on R5 discs (Score:1)
wtf is up with option clicks with single button mice under this distro?
that's the only flakiness complaint i have. otherwise very solid.
Re:Speaking of R5 problems... (Score:2)
Some nitpicking (Score:2)
I don't care if this thing won't spread. It is highly unprofessional to send out a CD with a virus on it (or something that will flagged by a virus scan). There are also some minor "glitches" with the distro. For instance, in one of the readme files, this instruction is given.
Where is the old RedHat installer?
a) Just pass redhat as an arguement to the
To the ?? If you have used BootX before, you would probably realized that this is a parameter to pass to the kernel arguments. They might also wish to spell argument correctly. Note: I am not blaming these nitpicking mistakes to original author of the doc. Remember, this is Linux. Have other ppl review the source.
Nonetheless, I have installed R5 and it looks pretty good. Serious testing starts tomorrow. As a side note: I just realized that I am a totally pathetic (but extremely loyal) Apple/Linux supporter whom is willing to overlook glitches.:-)
I just have one last bitch. I start up LinuxPPC at runlevel 5 and eventually get greeted with the login screen. Off in the upper left hand corner is a fairly obnoxious and rather large RedHat logo. I was wondering, is this the result of some agreement between LinuxPPC and RedHat for the use of the RedHat installer?
Don't flame me if I made mistakes in spelling or grammar in this post (since I nitpick on this issue). I don't have another pair of eyes reviewing my post.
Re:this worm really sucks... (Score:1)
Depends on the strain. From the reports so far, it's the Autostart Worm type "A", the least harmful of them, compared to F, which could over write the Desktop Database, making the disks unusable.
"It also just about killed our nt sever with macintosh shares.(at the time we did not have a any linux server). I would cause a pause on all the macs in the plant every 10 minutes or so. If you watched the little lights on the nt server they would be hammered and it would bsod more that usual."
Yes, it can cause excess network access.
Forently, this *can not* happen on the version included with LinuxPPC R5, since the CD has Autostart completely disabled (they disabled autostart when burning the CD in LinuxPPC).
IF you are paranoid, turn off Quicktime Control Panel -> Autostart CD-ROM (The option does little on Macs, besides work for worms).
The point is response time... something commercial (Score:1)
.02
Re:You are confused (Score:1)
-lx
Re:A dead worm? (Score:1)
I don't like virii either and I take them seriously (though I haven't had to be as paranoid since I left dos/windows behind, though since my home network is no longer behind a firewall, I'll have to up my paranoia again). Actually, I do worry about these things: everything I get from the net always comes as source (yes, I know, not bullet proof) as I have never fully trusted binaries (though djgpp programs are relatively safe, or at least self announcing).
Re:how can it be a worm? (Score:1)
It normally spreads from disk to disk via. CD-ROM burned under the Mac OS, which the worm.
But the worm program, didn't expect for it to burned under LinuxPPC, (using a program that does MkHybrid and PreP boot blocks). This automatically disabled it, because J. Carr didn't enable the autostart part of the virus.
Since the worm in an invisable part of the Mac OS (you can not see/copy it from the Finder, and it contains a Resource Fork,so copying from Linux won't work), their is no way even possible that it could be enabled.