InterBase: What Was The Chance... - InformationWeek
IoT
IoT
Mobile // Mobile Applications
Commentary
7/27/2005
11:23 AM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
[Dark Reading Crash Course] Finding & Fixing Application Security Vulnerabilitie
Sep 14, 2017
Hear from a top applications security expert as he discusses key practices for scanning and securi ...Read More>>

InterBase: What Was The Chance...

My last column raised as many new questions as I had when I researched it. This one concerns the back-door login that had been compiled into Borland's InterBase code. If anyone knows the answer, or knows someone who might, give me a shout.

My last column raised as many new questions as I had when I researched it. This one concerns the back-door login that had been compiled into Borland's InterBase code. If anyone knows the answer, or knows someone who might, give me a shout.So here's the deal: Borland licensed a whole bunch of InterBase servers between 1994 and 2000, and every last one of them contained that hard-coded back-door account. Yet neither Borland nor any of its customers, to my knowledge, have ever admitted a case of unauthorized access, much less a case of lost or stolen data.

Like I said in he piece, this is fishy for one big reason: the login and password for the back-door account were dropped into the code as plaintext strings. A simple ASCII dump of the InterBase executable binary would have revealed the prize -- assuming someone was motivated enough to sift through a really big pile of dirt in search of that priceless nugget.

By the mid-1990s, I don't think there was any shortage of people willing to party down on a couple hundred enterprise DB servers with wide-open, undetectable back doors. In fact, that seems like a no-brainer. So the whole game comes down to a couple of questions:

- How likely a target was InterBase for cold-calling intruders williing to probe the software purely on spec ?

- Assuming InterBase ever received this type of attention, how likely is it that an attacker would have tried a plain ol' ASCII dump, presumably with an eye out for anything resembling a login or password text string.?

Got a clue about this sort of thing? Let me know about it, please.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll