Featured Articles

Nvidia Shield 2 shows up in AnTuTu

Nvidia Shield 2 shows up in AnTuTu

Nvidia’s original Shield console launched last summer to mixed reviews. It went on sale in the US and so far Nvidia…

More...
AMD CSO John Byrne talks ARM

AMD CSO John Byrne talks ARM

We had a chance to talk about AMD’s upcoming products with John Byrne, Chief Sales Officer, AMD. We covered a number…

More...
AMD Chief Sales Officer thinks GPU leadership is critical

AMD Chief Sales Officer thinks GPU leadership is critical

We had a chance to talk to John Byrne who spent the last two years as Senior Vice President and Chief…

More...
OpenPlus One $299 5.5-inch Full HD phone

OpenPlus One $299 5.5-inch Full HD phone

OnePlus is one of the few small companies that might disrupt the Android phone market, dominated by giant outfits like Samsung.…

More...
KFA2 GTX 780 Ti Hall Of Fame reviewed

KFA2 GTX 780 Ti Hall Of Fame reviewed

KFA2 gained a lot of overclocking experience with the GTX 780 Hall of Fame (HOF), which we had a chance to…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 01 December 2010 10:03

Free software archive attacked

Written by Nick Farell
hackers

Encrypted passwords nicked
The Savannah GNU free software archive has been attacked with encrypted passwords stolen that enabled the attackers to access restricted project material.

The hackers used a SQL injection attack against the savannah.gnu.org site which has bought the operation to its knees. The site is still offline and a notice says that the group has finished the process of restoring all of the data from a clean backup and bringing up access to some resources.

However it is still in the middle of adjusting its security settings to prevent further attacks. Some of the passwords were discovered by brute-force attack, leading in turn to project membership access, the site said. The site has been rolled back to November 23 when all was working.

“While effort was made in the past to fix injection vulnerabilities in the Savane2 legacy codebase, it appears this was not enough," the group said in its notice.

So far only one project appears to have been affected by the compromise.

Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

Comments  

 
+1 #1 ghelyar 2010-12-01 12:43
SQL injection is not a brute force attack. Maybe they used SQL injection to get password hashes and a rainbow table to get the passwords, but in that case the passwords should have been salted anyway.

It's also not that hard to prevent SQL injection, if you just use prepared statements. Using lazy find/replace etc is not sufficient.
 

To be able to post comments please log-in with Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments