Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Sat Aug 07, 2010 4:48 am 
Offline
Senior Member

Joined: Fri Feb 18, 2005 4:09 pm
Posts: 594
from http://www.sensepost.com/blog/4873.html

"The memcached threat model is pretty simple since the software has a tiny interface. Zero authentication by default helps, and once connected you can read and write all parts of the cache due to the lack of authorisation."

Excellent article. Amazing to see that many large sites allow overwriting memcached data so that malware can be inserted. If this were done there would, of course, be no way to remove the malware from the site code since it does not reside there.

James


Top
   
 Post subject:
PostPosted: Sat Aug 07, 2010 9:43 am 
Offline
Senior Member
User avatar

Joined: Sat Aug 30, 2008 1:55 pm
Posts: 1739
Location: Rochester, New York
Of course, this relies on memcached's configuration being deliberately changed to listen on a public interface. There's a big warning immediately above that configuration line. But noone here would have their memcached listening to the world, right?

(p.s. 192.168.128.0/17 is public, from a security standpoint)


Top
   
 Post subject:
PostPosted: Sat Aug 07, 2010 12:01 pm 
Offline
Senior Member

Joined: Fri Feb 18, 2005 4:09 pm
Posts: 594
hoopycat wrote:
...no one here would have their memcached listening to the world, right?


I think that is unlikely if a single web server and single memcached instance are running on the same server. If separate multiple memcached servers are being used, there might be a temptation to do this for the lazier and the less experienced.

If you would like to find out if any linodes are vulnerable to this problem, the article discusses how to obtain and use a scanning tool made for just such a purpose. My interest in this subject is theoretical, not practical.

James


Top
   
 Post subject:
PostPosted: Sat Aug 07, 2010 2:06 pm 
Offline
Senior Member
User avatar

Joined: Sun Feb 08, 2004 7:18 pm
Posts: 562
Location: Austin
zunzun wrote:
there might be a temptation to do this for the lazier and the less experienced.


Wouldn't one also have to be a complete moron?


Top
   
 Post subject:
PostPosted: Sat Aug 07, 2010 2:15 pm 
Offline
Senior Member

Joined: Sun Mar 07, 2010 7:47 pm
Posts: 1970
Website: http://www.rwky.net
Location: Earth
Xan wrote:
zunzun wrote:
there might be a temptation to do this for the lazier and the less experienced.


Wouldn't one also have to be a complete moron?


Or just have no clue about security and server admin...I recently audited a server which had mysql open to the public with remote logins enabled and a root password of something like 'password123'...yeah that's just about as bad as an open memcached.


Top
   
 Post subject:
PostPosted: Sat Aug 07, 2010 2:22 pm 
Offline
Senior Member
User avatar

Joined: Sun Feb 08, 2004 7:18 pm
Posts: 562
Location: Austin
Sure. But nobody makes a stink about that being a vulnerability in MySQL.


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group