[comp.risks] RISKS DIGEST 7.30

RISKS@KL.SRI.COM (RISKS FORUM, Peter G. Neumann -- Coordinator) (07/30/88)

RISKS-LIST: RISKS-FORUM Digest   Friday 29 July 1988   Volume 7 : Issue 30

        FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS 
   ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

Contents:
  NASTRAN and ship steel (Lindsay F. Marshall)
  Is vibration a known A300 problem? (Eric Roskos)
  Business Week article on computer security (Woody Weaver)
  Computers can increase privacy, too! (Robert Weiss)
  Viruses - a medical view (John Pettitt)
  Apple viruses -- don't go through the ZLINK
    (Practor Fime, Dr. Logic, The Byter -- via Greg Prevost via Eric Haines)
  On IRS direct computer access (Steven C. Den Beste)
  Re: doing away with privileged users (Alan Silverstein)

The RISKS Forum is moderated.  Contributions should be relevant, sound, in good
taste, objective, coherent, concise, and nonrepetitious.  Diversity is welcome.
CONTRIBUTIONS to RISKS@CSL.SRI.COM, with relevant, substantive "Subject:" line
(otherwise they may be ignored).  REQUESTS to RISKS-Request@CSL.SRI.COM.
FOR VOL i ISSUE j / ftp kl.sri.com / login anonymous (ANY NONNULL PASSWORD) /
  get stripe:<risks>risks-i.j ... (OR TRY cd stripe:<risks> / get risks-i.j ...
  Volume summaries in (i, max j) = (1,46),(2,57),(3,92),(4,97),(5,85),(6,95).

----------------------------------------------------------------------

Date: Thu, 28 Jul 88 10:03:46 WET DST
From: "Lindsay F. Marshall" <Lindsay_Marshall%newcastle.ac.uk@NSS.Cs.Ucl.AC.UK>
Subject: NASTRAN and ship steel

Talking of NASTRAN reminds me of something that happened when I worked for a
company involved in shipbuilding. The steel ordered for a ship that was almost
completed turned out to be too thin so some extra reinforcerment was needed. In
order to find the best places for this they ran the whole ship through NASTRAN.
This job ran for 17 hours and filled several Gbytes of disc with temporary
files. The machine crashed when there was no more available disc space. It
turned out that the run involved 32000 degrees of freedom, but nobody had done
the back of an envelope calculations to see if it was practical...
                                                                      Lindsay
JANET: Lindsay_Marshall@uk.ac.newcastle 
UUCP:  ...!ukc!newcastle.ac.uk!Lindsay_Marshall

------------------------------

Date: Thu, 28 Jul 88 13:13:34 EDT
From: csed-1!csed-47!roskos@daitc.ARPA (Eric Roskos)
Subject: Is vibration a known A300 problem?

> Pilots on France's domestic airline, Air Inter, began a new strike last
> night as part of a three-year campaign over Airbus safety. 

Are there safety concerns other than fly-by-wire involving the Airbus?
Or is this "three-year campaign" just about fly-by-wire?  The above
suggests there may be other safety issues; due to 3 experiences with
A300s, I have suspected for several years that there might be some
problem with resonance of the body to engine vibrations during takeoff.
However, I have no evidence other than firsthand observation as a
passenger on A300s to back this up.

Eric Roskos (csed-1!roskos)

------------------------------

Date:     Fri, 29 Jul 88 16:21 EDT
From:     <WWEAVER%DREW.BITNET@CUNYVM.CUNY.EDU> (Woody)
Subject:  Business Week article on computer security

  The August 1, 1988 issue of BusinessWeek contained as cover article, "Is
Your Computer Secure?  Hackers, Viruses, and Other Threats".  The article,
pages 64-72, is reasonably well written, without inflammatory text, and has
few errors or misleading statements.  The article is in essence examining
the risk to the public and private sectors of computer usage and loss; and
covers employee attacks (Gene Burleson's assault on the Fort Worth security
firm USPA & IRA Co., and arrest for "harmful access to a computer"), physical
security in light of accident (the Hinsdale disaster), child 'phrackers' and
Ma Bell, adult hackers (the Chaos Computer Club and the Deutsche Bundespost)
viruses, and the like.

  It's a glossy article, but is filled with interesting bits of data, such as
US expenditures on computer systems over the last four years versus estimated
sales of computer protection goods and services.  They have photographs of
Richard Brandow and the programmer who created the McMag virus, Pierre Zovile'
(err -- if I ever meet them in a dark alley...) and so on.  Its nice to see
some responsible journalism coverage in a general purpose magazine.  Or
perhaps this is just a measure of how important the private sector rates
computer security...

------------------------------

Date: Thu, 28 Jul 88 20:26:10 CDT
From: "Robert Weiss" <weiss@umnstat.stat.umn.edu>
Subject: Computers can increase privacy, too!

I regularly get reports from my congressperson on his activities, and a comment
in one of the articles grabbed my attention before I could toss the mailing:

	"Technology provides the students with privacy ..."

A different sentiment than we usually read about in RISKS.  This is from an
article on a computer-aided adult literacy teaching project in St. Paul.  PC's
placed in individual booths provide both privacy and flexibility.  If I was 30
years old and unable to read at a 4th grade level, the privacy issue would be
important to me.

This made me realize that while large computers and networks may in general be
detrimental to privacy, there _are_ possibilities for computers to increase
privacy.

Robert Weiss 

    [But probably not if untrustworthy people have authorized access to the
    system or to the data, or if people without authorized access masquerade.
    The biggest problem with putting really sensitive data about an individual
    that might be of interest to someone else (for revenge, blackmail,
    curiosity, leaking, etc.) may be that the temptation level has escalated.
    PGN]

------------------------------

Date: Wed Jul 27 19:00:35 1988
From: mcvax!pyrltd!jpp@uunet.UU.NET
From: jpp@slxsys.specialix.co.uk (John Pettitt)
Subject: Viruses - a medical view

Taken without permission from the Independent (which seems to have
gotten it from the British Medical Journal):

VIRUSES could invade hospitals throught their computer systems,
so new software used by doctors is being quarantined before it is
allowed contact with patients' data, Oliver Gillie writes.

The Royal Infirmary in Glasgow isolated a computer virus in its
laboratory among software destined for the cardiac intensive care
unit.  The virus was found by a technician who destroyed it before it
was able to multiply.

Dr Gavin Kenny, an anaesthetist at the Royal Infirmary, said the virus
was not malignant, but "as soon as it was found, we made a complete sweep
to look for others and now we do regular checks".

"A virus can wipe out the memory on an entire disk - that would 
cause a lot of trouble although it would not put patients' lives
in danger," he added. "But some viruses are benign. There is one which
just comes out on Tuesdays.  It says it is Tuesday and then it goes away
again."

[ stuff about what a virus is and the christmas tree deleted - jpp]

Dr John Asbury, another Glasgow anaesthetist, says a virus got
into an intensive care unit in the city where it corrupted data
and caused files to be lost.  Dr Asbury writes about computer
virus disease in the latest issue of the British Medical Journal.

John Pettitt, Specialix, Giggs Hill Rd, Thames Ditton, Surrey, U.K., KT7 0TR
{backbone}!mcvax!ukc!pyrltd!slxsys!jpp            jpp@slxsys.specialix.co.uk

------------------------------

Date: Fri, 29 Jul 88 13:06:44 EDT
From: saponara@tcgould.tn.cornell.edu (John Saponara) [REALLY Eric Haines]
Subject: Apple viruses

From batcomputer!cornell!mailrus!uwmcsd1!ig!agate!ucbvax!pro-carolina.cts.COM!gregp Fri Jul 29 11:52:17 EDT 1988
Article 7320 of comp.sys.apple:
Path: batcomputer!cornell!mailrus!uwmcsd1!ig!agate!ucbvax!pro-carolina.cts.COM!gregp
>From: gregp@pro-carolina.cts.COM (Greg Prevost)
Newsgroups: comp.sys.apple
Subject: Virus Information
Date: 26 Jul 88 21:54:43 GMT
Reply-To: pnet01!pro-simasd!pro-carolina!gregp@nosc.mil
Organization: The Internet

Ok folks, in the past few days I have seen some major stuff going on.  There
are at least two different viruses running around.  One is called Cyberaids
and the other is made by some group called Festering Hate.  Here is some of
the info I have picked up on it in the last few days.

 - = - = - = - = - = - =

50/50: Warning Apple users
Name: Practor Fime #13 @4
Date: Sat Jul 16 17:16:14 1988

CAUTION:

        ZLink+, ZLink.PBH, ZLink are all viruses, if you run ZLink then you
now are the happy parent to a rodent virus. It seem Zlink has some sort of
virus that attaches to files and stuff.  My friend has it on his HD and it
creates some file entry in the ROOT directory that is hidden from every utility
EXCEPT APW or ORCA.  Every time you boot the prodos with the virus it will do
and ON-LINE vol check (even if you specifiy the exact pathname) and install the
virus on systems files such as, Mr Fixit, Basic.system,Copy II+ etc....

 - = - = - = - = - = - =

(92 of 100)
Titled : <*** W A R N I N G ***>
Author : Dr. Logic/Bill of [None]
Stamped: July 13, 1988 at 12:07 AM

There is a file going around (currently on the Hard Drive) called Z.LINK.PLUS.
It is supposed to be a terminal program somewhat like ProTERM.  It is a decent
program but the main reason I posted this is when you boot it up, it GOES TO
EVERY ON-LINE DRIVE AND MODIFIES >BASIC.SYSTEM<!!!

At bootup, it looks like it's doing an On-Line call and checks every drive.
Then it goes back to some and starts doing some modifications (especially
noticeable on floppy drives).  The program modified copies of BASIC.SYSTEM,
FILER, BACKUP.SYSTEM and PROSEL (don't ask me how it chooses, it usually just
attacks BASIC.SYSTEM).

After installing itself into BASIC.SYSTEM, everytime you boot a disk with that
BASIC.SYSTEM on it, it will do another on-line check and continue to add itself
to other copies of BASIC.SYSTEM.

One of the tell-tale signs of this is it will leave behind tracks such as the
modification date of the files it altered (that's how I found out).  BE
CAREFUL!!!  I do not know if this is a virus as my HD is still operable and
I've replaced all infected files with backups.  Either way, I don't like
something that spreads itself around, especially doing an on-line call after
every bootup.


Please spread the word around.  I don't know what kind of file this is but it
sounds like bad news to me.  I encourage those of you who are more
knowledgeable about machine language to d/l the disk and examine the contents
of the files.  I don't trust it but you have been warned.

WARNING: This is a FOR REAL virus not a trojan, if interested I will pack the
         Infected Basic System and U/L it if you want to make a detoxin for it

-Jon

 - = - = - = - = - = - =

                                    Virus
                                    ~~~~~
        The first verified virus of the ProDOS operating system is out and
around.  The first identified carrier of this virus was a terminal program
called "ZLINK.PLUS", which was discovered about one week ago.  Today, our board
was struck by the same virus, which was hidden inside another file,
"MR.FIXIT.3.7", and since I have found it to inhabit "SQUIRT.1.5" as well.  Be
careful.  The most telltale sign of this virus is the fact that when you
execute a system file which is a carrier, it will scan all of your online
prodos devices, and will then occasionally write to one of them.  Check your
directories carefully, look at the modification date on your system files.  If
it is recent, you may have an infected program.  Files in subdirectories are
NOT safe.  I have not found it to copy itself into any file other than
BASIC.SYSTEM, but I hear that other people have had it copy onto other SYS-type
files.

The Byter

(This is the Byter who runs Cabal of the Lexicon in 213.)

------------------------------

Date: Fri, 29 Jul 88 09:09:58 -0400
From: denbeste@OAKLAND.BBN.COM
Subject: On IRS direct computer access

I think this is going to fail. High school students all over the state will
spend their evenings making up social security numbers and entering phony
returns. Perhaps one time in thirty or so they'll hit pay dirt (a real social
security number!).

The only way to prevent this is to have the machine know the names of the
people who own the SSN - and reject any return which isn't right.

Only, having done that, what happens if the legitimate owner of the SSN doesn't
enter their own name is quite the same way it is held in the database?

Perhaps the right answer is for the computer to categorize the returns into one
of two groups: "Those where the name was correct" and "those which a human
being will check for validity".

Steven C. Den Beste,   Bolt Beranek & Newman, Cambridge MA
denbeste@bbn.com(ARPA/CSNET/UUCP)    harvard!bbn.com!denbeste(UUCP)

------------------------------

Date: Thu, 28 Jul 88 18:31:41 mdt
From: Alan Silverstein <ajs%hpfcajs@hplabs.HP.COM>
Subject: Re: doing away with privileged users

In 7.29, Allan Pratt said:

> If there is NO SUCH THING as privileged access, where can you go wrong?

Alas, there is NO SUCH THING as "NO SUCH THING as privileged access".

Why?  Because computers aren't as smart as people and as trustworthy as
their administrators.  Situations inevitably arise which require ad hoc
human intervention -- by privileged users.

What if there were no distinction of "privilege"?  If any user could
handle the interventions?  There'd also be precious little protection of
users's data from other users.  Even cooperating users need protection
from each other's mistakes.

Alan Silverstein, Hewlett-Packard HP-UX DCE Lab, Fort Collins, Colorado

------------------------------

End of RISKS-FORUM Digest 7.30
************************
-------