Critical Security Vulnerability Found in Quicksort
In what is sure to become one of the most wide-reaching security vulnerabilities yet known, a researcher with L0pht Heavy Industries has uncovered a flaw in the standard implementation of the Quicksort algorithm. InfoQ spoke with Dildog of L0pht to learn more about this vulnerability and it's ramifications.
Dildog explained the vulnerability as being of a class of vulnerabilities known as buffer overflow exploits. In these sorts of vulnerabilities, a malicious program is able to execute arbitrary code using the permissions of the user which is executing the given process.
In the case of Quicksort, the source of the vulnerability has not yet been made public, however it has been confirmed by two external security analysis firms as being present in the standard implementation of the Quicksort algorithm. Pseudocode for this algorithm, as found on Wikipedia, is:
function quicksort(array) var list less, greater if length(array) ≤ 1 return array select and remove a pivot value pivot from array for each x in array if x ≤ pivot then append x to less else append x to greater return concatenate(quicksort(less), pivot, quicksort(greater))
This vulnerability has been confirmed as affecting the following libraries, runtimes and products:
- Several implementations of the JVM (including those of Sun, IBM, Oracle/BEA and Apache)
- The .Net CLR up to and including version 3.5 SP1
- The Microsoft Visual C Runtime up to and including version 9.0
- The Adobe Flash runtime up to and including version 10.0
- glibc up to and including version 2.6
- Apache HTTPD up to and including version 2.2.13
- Numerous hubs, switches and routers including some from Cisco, Juniper, D-Link, Netgear and Linksys
According to Dildog, this vulnerability was first discovered while performing forensics upon a system which had been compromised by a previously unknown exploit. This exploit caused the computer in question to change all system sounds to clips of an 80s pop song, and replaced all system images and icons with pictures of assorted Lolcats. Although there have been no other reports of this exploit being seen, we advise all InfoQ readers to keep alert and report any unexpected appearances of either Rick Astley or Lolcats to the proper authorities.
Oh Noes !
Re: Oh Noes !
Similar to bug in binarySearch
(however this bug didn't affect that many applications)
Re: Happy April Fool's Day?
Uwe Zdun, Rafael Capilla, Huy Tran, Olaf Zimmermann Mar 09, 2014
Olav Maassen, Liz Keogh & Chris Matts Mar 08, 2014