Homeland Security Audit Flags 'Critical' Linux BugBy Ryan Naraine | Posted 2006-05-02 Email Print
Know the Risk: Digital Transformation's Impact on Your Business-Critical Applications REGISTER >
A federally funded open-source security audit program using an automated scanning tool pinpoints a flaw in Unix and Linux systems that is described as a "worst-case scenario."An open-source security audit program funded by the U.S. Department of Homeland Security has flagged a critical vulnerability in the X Window System which is used in Unix and Linux systems.
Coverity, the San Franciso-based company managing the project under a $1.25 million grant, described the flaw as the "biggest security vulnerability" found in the X Window System code since 2000.
The X Window System, also called X11 or X, provides the toolkit and protocol to build GUIs for Unix and Unix-like operating systems. It is used to provide windowing for bit-map displays.
The X Window System also ships as an optional GUI with Macintosh computers from Apple.
Coverity Chief Technical Officer Ben Chelf said the flaw resulted from a missing parenthesis on a small piece of the program that checked the ID of the user.
It could be exploited to allow local users to execute code with root privileges, giving them the ability to overwrite system files or initiate denial-of-service attacks.
Coverity hailed the discovery as proof that its automated code scanning tool can discover serious flaws that the human eye might miss.
"This was caused by something as seemingly harmless as a missing closing parenthesis," Chelf said, describing the severity of the bug as a "worst-case scenario" for the X.Org Foundation that manages the X Windows System project.
Daniel Stone, release manager at X.Org, agreed that the vulnerability was "one of the most significant" discovered in recent memory.
"[This is] something that we find once every three to six years and is very close to X's worst-case scenarios in terms of security," Stone said. "[Coverity's tool exposed] vulnerabilities in our code that likely wouldn't have been spotted with human eyes. Its attention to subtle detail throughout the entire code baseeven parts you wouldn't normally examine manuallymakes it a very valuable tool in checking your code base," he added.
The flaw, which affects X11R6.9.0 and X11R7.0.0, was fixed within a week of its discovery, and Chelf said.
Read the full story on eWEEK.com: Homeland Security Audit Flags 'Critical' Linux Bug