The Anatomy of a Security Breach

“Joomla!” had an extremely serious security issue arise earlier in the week. I’m pretty deeply involved in the project, and I happened to be on the Bug Squad chat when the news broke. The issue was not a SQL injection problem, as many sources have assumed but reported as fact. Ironically, it had to do with defeating a session security feature. The security problem was a programming error. “Joomla!” goes through extensive procedures to defend against SQL injection, and from version 1.5 onward, such a vulnerability in the core code is highly unlikely. [Extensions are another matter. I strongly recommend that users only install open source extensions that have either been audited or that have broad community support.]

Even though this problem caused a fair bit of damage, I’m very proud of how the “Joomla!” team responded to the problem. This was a worst-case scenario: the exploit was published with no advance notification, and it was dead simple to implement.

The first we heard of it was a post on the Dutch “Joomla!” forums. One of the Bug Squad team mentioned this in chat on August 12th at 15:50 EST. We immediately took steps to verify the issue, and then once confirmed, to remove the details from the forum post. A patch was made available for testing at 16:10. A full package release was made available for testing at 18:19. Announcement of the release was made on joomla.org at 18:57, and by 19:40 update packages were also available. That’s three hours and 50 minutes from report to full public release. If that’s not a record I’ll be surprised.

What is distressing is that a large number of security focused sites reported this as a SQL injection vulnerability, along with a variety of other erroneous or misleading information. Almost a week later, many have corrected their errors, but several have not. Considering that the “Joomla!” team responded so quickly, and that complete information was posted as the first item on the joomla.org web site before the exploit became widely known, this suggests that many of these sites simply repeated each other’s misinformation, rather than taking even the smallest steps to verify the report.

Granted a sample size of one event is not sufficient to draw conclusions, but if this is any indication of how “trusted” security information sources behave, then it is no wonder that whole security field has a serious credibility issue. These kinds of reports are extremely serious matters, with a lot of potential for damage. Certainly the timeliness of information is critical, but hopefully not at the expense of accuracy. The security community has a deep obligation to perform the simplest verification of facts before rushing to publication.

Steve Jobs Just Loves Windows Vista!

As more Windows users cry “Help, I’ve been Vista whipped!”, I thought that the introduction of the oppressive Windows Vista was going to be a boon for Linux.

I got the first part right. As Vista subverts your computer into a Microsoft Peripheral, subject to whatever whim “Balmer and The Boys” cook up, users have resisted. A large number of not-so-technical people I’ve talked to want to avoid Vista like the plague. [And in my opinion, rightly so.]

My assumption was that given reasonably priced hardware from several suppliers and completely free Linux distributions like Ubuntu, the discomfort with Vista would be the kick that finally pushed Linux into the consumer mainstream.

Not so. (more…)

Is Microsoft Windows About to Collapse Under its Own Weight?

My McAfee anti-viral, anti-hack, anti-this, anti-that software service updated itself a little while back. Aside from an irritating attempt to assume control over some security functions that I use other tools for, it dropped in a pretty large set of generally reasonable functions to protect my system. Let me qualify that. That’s “generally reasonable” for Windows. For just about any other modern operating system, they’d be redundant or meaningless.

The problem is that even after disabling a lot of the new functionality, this update also did a fine job of reducing the overall performance of my machine by about 30 percent. The incredible load imposed by this class of “defensive software” is a direct result of major architectural flaws in Microsoft Windows.
(more…)

Intellectual Property in a Digital Era

Last night I attended a presentation by Doug Hyatt, Business Economics Professor at the University of Toronto’s Rotman School of Business. Although billed as focusing on the music industry, his comments were actually more broad ranging, even abstract.

I guess that is a telling indication of how early we are in the process of adapting to the digital era. When very smart people who make their careers from studying these problems speak in abstract terms, you know we have a long way to go. (more…)

Mastodon