[scripts-announce] Security incident on scripts.mit.edu this afternoon

Geoffrey Thomas geofft at MIT.EDU
Mon Jun 27 19:05:47 EDT 2011


Hello scripts.mit.edu users,

In the interest of full disclosure we would like to let you know that we 
had a security incident on scripts.mit.edu this afternoon. Around 2:50 PM 
today, a user's WordPress blog with custom extensions was broken into by a 
non-MIT attacker. The attacker uploaded a non-public exploit designed to 
take advantage of a race condition in a "setuid root" utility, and was 
able to use it to gain local root privileges on one of our servers, 
whole-enchilada.mit.edu. Our security monitoring infrastructure alerted us 
to the utility granting root privileges, and a scripts.mit.edu maintainer 
noticed the alert immediately and was able to disconnect the machine from 
the network. We promptly disabled the compromised user account as well as 
the vulnerable utility on all the servers.

Later forensics on the disconnected server indicated that the root shell 
did not run any significant commands before the attacker was disconnected 
and the server taken offline. Given those results and the speed with which 
we were able to respond, we are confident no user data was compromised in 
this attack. The server in question has been taken offline so that we can 
restore it to a clean state.

scripts.mit.edu takes its users' security seriously, and realtime 
notification of unexpected events has long been part of our 
defense-in-depth strategy against unknown or unexpected attacks. We are 
happy that this was able to limit the extent of the damage. Still, in 
response to this, we have already removed the setuid bit from most of the 
setuid binaries on the servers, to prevent this class of attacks, and we 
are working on strategies to eliminate setuid binaries without loss of 
functionality. We will also be redoubling our efforts to follow security 
patches in other operating systems (the particular exploit was fixed in 
RHEL but not Fedora 13, despite being found and fixed by Red Hat well 
within the Fedora 13 support cycle) and apply the patches to our servers.

If you have any questions about this or about scripts.mit.edu security in 
general, please contact us at scripts at mit.edu (our regular support/contact 
address) or scripts-root at mit.edu (maintainers only, for private 
information).

-- 
Geoffrey Thomas
SIPB scripts.mit.edu team
scripts at mit.edu



More information about the scripts-announce mailing list