Educause Security Discussion mailing list archives

Re: False positives scanning Red Hat servers running Apache


From: Allison Henry <akhenry () BERKELEY EDU>
Date: Thu, 26 Apr 2007 08:57:07 -0700

Yes we see this problem with many vendors that backport patches --
Apple, Ubuntu, RedHat, etc. And it is also possible that the sysadmin
has taken other actions to mitigate the vulnerability, such as disabling
the affected Apache modules, and we can't detect that either with
version checking scans. We add a short disclaimer to our vulnerability
notices:

    Be aware that in some cases the "vulnerability" shown points
    only to a potential problem:  for example, the scanner may have
    detected a version of software that would be vulnerable only if
    not patched, yet it cannot tell that a patch has been applied.

While our scanner is capable of intrusive checks, I believe it is best
to pass on the information we collect to the sysadmins for
investigation, rather than risk running a DoS attack on our own network.
It is a minor inconvenience to the sysadmins to check out a potential
vulnerability than to restore a service brought down by the scanners.

Allison Henry
System and Network Security
University of California, Berkeley
http://security.berkeley.edu

Clifford Collins wrote:
I've recently been scanning some servers on our campus that have
returned known vulnerabilities for Apache. I forwarded the results to
our Linux systems administrator. He investigated the claims and declared
them as false positives. His explanation was that Red Hat "backports"
patches to stable versions rather than deploying the newer version
because newer versions can introduce new features or changes that render
an existing server non-functional.  He was also critical of the scanner
for failing to detect the patches and relying on the reported version
number from a web query.

Has anybody encountered this problem? Is there a solution or a product
that can detect undeclared patches on a Red Hat server without actually
doing a penetration test? Is there a query that will yield the patch
level? Your suggestions and comments are welcome!

Clifford A. Collins
Network Security Administrator
Franklin University
201 South Grant Avenue
Columbus, Ohio 43215
"Security is a process, not a product"

Current thread: