InterBase: What Was The Chance... - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile // Mobile Applications
Commentary
7/27/2005
11:23 AM
Commentary
Commentary
Commentary
50%
50%

InterBase: What Was The Chance...

My last column raised as many new questions as I had when I researched it. This one concerns the back-door login that had been compiled into Borland's InterBase code. If anyone knows the answer, or knows someone who might, give me a shout.

My last column raised as many new questions as I had when I researched it. This one concerns the back-door login that had been compiled into Borland's InterBase code. If anyone knows the answer, or knows someone who might, give me a shout.So here's the deal: Borland licensed a whole bunch of InterBase servers between 1994 and 2000, and every last one of them contained that hard-coded back-door account. Yet neither Borland nor any of its customers, to my knowledge, have ever admitted a case of unauthorized access, much less a case of lost or stolen data.

Like I said in he piece, this is fishy for one big reason: the login and password for the back-door account were dropped into the code as plaintext strings. A simple ASCII dump of the InterBase executable binary would have revealed the prize -- assuming someone was motivated enough to sift through a really big pile of dirt in search of that priceless nugget.

By the mid-1990s, I don't think there was any shortage of people willing to party down on a couple hundred enterprise DB servers with wide-open, undetectable back doors. In fact, that seems like a no-brainer. So the whole game comes down to a couple of questions:

- How likely a target was InterBase for cold-calling intruders williing to probe the software purely on spec ?

- Assuming InterBase ever received this type of attention, how likely is it that an attacker would have tried a plain ol' ASCII dump, presumably with an eye out for anything resembling a login or password text string.?

Got a clue about this sort of thing? Let me know about it, please.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Commentary
Augmented Analytics Drives Next Wave of AI, Machine Learning, BI
Jessica Davis, Senior Editor, Enterprise Apps,  3/19/2020
Slideshows
How Startup Innovation Can Help Enterprises Face COVID-19
Joao-Pierre S. Ruth, Senior Writer,  3/24/2020
Commentary
Enterprise Guide to Robotic Process Automation
Cathleen Gagne, Managing Editor, InformationWeek,  3/23/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
IT Careers: Tech Drives Constant Change
Advances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market. Read it today!
Slideshows
Flash Poll