Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The FreeBSD Project has disclosed a security incident in which two machines were compromised due to a developer's SSH cryptographic key being captured.
FreeBSD security officers discovered the the breach on November 11 in two machines that were used for building third-party software packages, and believe they may have been compromised as early as September 19 this year.
There was no vulnerability or code exploit within FreeBSD itself, nor is any part of the base operating system at risk, the security officers reported.
As the FreeBSD infrastructure cluster was partitioned, the attacker had limited access to it.
Systems with no third-party packages installed or updated in the timeframe of the compromise are not affected by the breach.
FreeBSD's cluster administration team powered down the compromised machines when the incident was noticed, and also those that the attacker may have had access to.
Audits have been performed to verify the infrastructure and source trees are clean and the suspect machines "are either being reinstalled, retired, or thoroughly audited before being brought back online," the cluster administration team said.
However, the FreeBSD Project is taking "an extremely conservative view" and is assuming that third-party packages generated between September 19 and November 11 this year may have been modified, and therefore, their integrity cannot be guaranteed.
A security audit of systems using FreeBSD.org provided binary packages is recommended, as "anything that may have been installed during the affected period should be considered suspect."
The Project also recommends that everyone stops using the cvsup and csup distribution mechanisms, switching to portsnap instead.
Developers should use Subversion instead, the security team said.
At this stage, it isn't known who the attacker was, or the motive behind the breach, which may have been fully automated.
The popular UNIX-like free open source operating system forms the foundation for a wide range of products.
These include the Juniper Networks Junos router, switch and security device operating system, Citrix Netscalers, Sandvine policy control applications, Sony Playstation 3, Panasonic TVs, Apple OS X and OS X Server, and more.
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.