DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T c

⟦17357eee9⟧ TextFile

    Length: 39182 (0x990e)
    Types: TextFile
    Names: »christmas.exec«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦this⟧ »./papers/Virus/christmas.exec« 

TextFile

\f


From:	Will Martin __ AMXAL_RI <wmartin@almsa_1.arpa>  4-MAR-1988 18:47
To:	Clement Taylor <CGTAYLO%erenj.bitnet@rutgers.edu>
Subj:	[40970] Re:  BITNET Security

	[Moderator note: part 1 of 2.   _H*]

Here is a compilation of data on the CHRISTMA EXEC virus which I collected
from postings in the RISKS Digest:

Regards, Will Martin

***Begin Included Messages***
From: minow%thundr.DEC@decwrl.dec.com (Martin Minow ML3-5/U26 223-9922)
Date: 11 Dec 87 11:55
Subject: Yet another virus program announcement fyi

From CRTNET, number 115.  From T3B%PSUVM.BITNET.
 
Subject:      Christmas Virus Warning

If you are at a CMS site and receive a program called CHRISTMA EXEC, please
(a) warn your postmaster and (b) discard the exec (or keep a copy for the
postmaster to look at, but DO NOT RUN IT).  This exec paints a Christmas
tree on your screen and then sends itself to everyone named in either your
NAMES or NETLOG files.  The result is potentially serious stress on Bitnet
and on your local spool system, and possibly a few system crashes here and
there as the number of reader files soars and exceeds the maximum.  The
Christmas tree isn't all that pretty, and the joke is pretty mean.
 
A word to the wise.  Your postmaster will thank you. Michael Sperberg-McQueen

------------------------------

From: davy@intrepid.ecn.purdue.edu (Dave Curry)
Subject: IBM invaded by a Christmas virus
Date: Sat, 12 Dec 87 10:02:24 EST

  (From the Lafayette (Indiana) Journal & Courier, December 12, 1987.  Quoted
  without permission.)

  IBM Woes -- Computerized grinch jams the mail

     BINGHAMTON, N.Y.- A computerized Grinch invaded IBM's electronic
  mail Friday.
     An illegal software-style so-called Christmas card sent through
  IBM's electronic mail jammed desk-top computer terminals, spokesman
  Joseph E. Dahm said.
     The so-called virus program forced plant officials to turn off
  internal links between computer terminals and mainframe systems to
  purge the message, Dahm said.
     IBM sources say the link was off from 45 minutes to 90 minutes
  depending on the location.
     The program is known as a virus because it enters computer programs
  and replicates itself automatically.
     Curious employees who read the message titles "Christmas" in the
  morning electronic mail discovered an illustration of a Christmas tree
  with "Holiday Greetings" superimposed on it.  A caption advised "Don't
  browse it, it's more fun to run it."
     "That was the hook," an IBM source said.  "A lot of people thought
  they could take a peek and then kill the message, but once opened, it
  was too late."
     The program automatically entered a security log listing contacts
  made from the individual computer terminal, duplicated and mailed
  itself to new victims.
     Like a Pandora's Box, once opened, the program rarely accepted
  commands to stop, sources said.  Operators who turned off their
  terminals to stop the Christmas message lost electronic mail or
  unfinished reports not filed in the computer.

This article seems to have a lot of things in it that the reporter didn't
understand.  I assume that the "terminals" in question are really PC's
connected to the mainframes; for one thing.  Plus, I presume the "Don't
browse it" refers to the VM/CMS "BROWSE" command used for looking through
files, and not just to the regular English word.

Does anyone have any more info from a source which understands all the
big words?
                                  --Dave Curry, Purdue University

------------------------------

Date: Mon, 14 Dec 87 09:38:55 est
From: Franklin Davis <fad@Think.COM>
Subject: IBM invaded by a Christmas virus

    This article seems to have a lot of things in it that the reporter didn't
    understand.  I assume that the "terminals" in question are really PC's
    connected to the mainframes; for one thing.

Probably the users were connected by 3270 type terminals (or
emulations on a PC) which use a half-duplex block mode protocol.  If
you turn off such a terminal your session is aborted, and you lose
current edits.  It is also very difficult to interrupt an executing
program, since it "owns" the line.  There is a "system-attention" key,
but a busy system may take literally minutes to respond.  (I'm glad I
don't have to use an IBM mainframe any more!! :-)

--Franklin Davis         Thinking Machines Corp.         fad@think.com     

------------------------------

Subject: IBM Xmas Prank
Date: Fri, 18 Dec 87 10:03:57 -0500
From: Fred Baube <fbaube@note.nsf.gov>

From Friday's Washington Post, excerpted without permission.

"The message popped onto desktop screens in IBM offices around
the country and even crossed the Atlantic and Pacific oceans,
showing up in IBM outposts in West Germany, Italy and Japan."

[as pictured                X
 in the article]           X X
                          X X X
                         X X X X
                        X X X X X
                       X X X X X X
                      X X X X X X X
                            X
                            X
                            X

A very happy Christmas and my best wishes for the next year.
             Let this run and enjoy yourself.
Browsing this file is no fun at all.  Just type Christmas.
________

"The message that bedeviled IBM was a comparatively benevolent
one and did not, as computer tricksters' creations sometimes do,
destroy other material in the system .. [although] rapidly
producing electronic gridlock."

"The culprit is unknown .. but preliminary investigation suggests
that the message originated outside the company.  IBM's mail
system is attached to those of several other institutions."

"From start to finish, the message survived only hours .."

"Does the world's biggest and most advanced computer company feel
embarassed about its Christmas chain ?  'We didn't want it to
happen, but we anticipated something like this might be attempted
and we were prepared to deal with it.'"

Questions:
(1) An incoming message can contain an executable program,
    that can easily be run ?
(2) Such a message can be remailed under its contained program's
    control, presumably with the name of the last victim in the
    "From:" field ?
(3) Can IBM trace it to an originator, or was anonymity possible ?
(4) How/where can readers of RISKS submit something similar ?
    (strictly for professional testing purposes)
(5) Is the Internet similarly vulnerable ?

The prank seems to be benign, and therefore beneficial.
IBM seems to have dealt with it effectively (or have they ?).

Browsing this message is no fun at all.  Just type Christmas ..

          [Bay Area folks can read a long front-page article by John 
          Markoff on viruses in today's SF Chronicle-Examiner.  PGN]

------------------------------

Date:         Mon, 21 Dec 87 15:22:26 EST
From: Ross Patterson <A024012%RUTVM1.BITNET@CUNYVM.CUNY.EDU>
Subject:      Re: IBM Christmas Virus

    There  have  been  several  messages to  RISKS  lately  about  the
CHRISTMAs EXEC virus  on IBM's network.  This was an  extension of the
same problem  on BITNET and  its European counterpart, EARN.   Since I
raised the general alarm about it, I'd like to answer a few questions.

    The virus used two standard CMS files, called NAMES and NETLOG, to
help it infect other users.  The NAMES file contains a list of userids
and system names that you  correspond with frequently, allowing you to
abbreviate them  to a mnemonic  nickname when sending mail,  files, or
interactive messages.   I composed  this mail  by sending  to "RISKS",
which my NAMES file lists as user RISKS on system KL.SRI.COM.  You can
also list  phone numbers, paper  addresses, etc.  There is  a commonly
available program that  will print off a personal  phonebook from your
NAMES file ("Traveling  Sidekick" from the days BB  - Before Borland).
The  NETLOG file  lists all  users you've  sent mail  or files  to, or
received them from.   It's a very nice audit trail  when you're trying
to remember where you got that copy of Space Wars.

    After  typing  the Christmas  Tree  on  your terminal,  the  virus
proceeded to  read both  the NAMES and  NETLOG files to  get a  set of
target addresses.  It then sent a copy  of itself to each of them, and
finally deleted itself.

>I assume that the "terminals" in question are really PC's
>connected to the mainframes; for one thing.

    The terminals  mentioned are generally  IBM 3270's, and  PC's with
IRMA-type cards.  The virus ran on the host system, not on the PC.

>Plus, I presume the "Don't
>browse it" refers to the VM/CMS "BROWSE" command used for looking through
>files, and not just to the regular English word.

    Both, actually.  The intent was  obviously to stop the reader from
going  further down  into  the file,  where the  real  purpose of  the
program was quite obvious.  The  language used (IBM's REXX) is usually
interpreted,  so the  program was  sent  in source  form.  Anyone  who
bothered to read below the second screen-full (like all of us paranoid
Systems  Programmers)  began to  see  the  trouble.  It  was  slightly
cloudy, as all the variable names  were in German, but seeing was fair
to good.

>The culprit is unknown

    That is  no longer the case.   The culprit has been  tracked down,
and barred from  access to his/her system.  A note  to that effect was
broadcast to  a number of  mailing lists  by the General  Secretary of
EARN.  The source system had recently been attached to the West German
section of EARN, and the user who started it all only intended to send
a greeting  to a  few friends.   To quote a  TV commerical,  "...  and
they'll tell two friends, and so on, and so on, ...".

>                        .. but preliminary investigation suggests
>that the message originated outside the company.  IBM's mail
>system is attached to those of several other institutions."

    Quite so.  No  one seems quite sure which of  the gateways between
BITNET/EARN and IBM's internal network, VNET, passed the first copy of
the  virus.   It  matters  very   little,  since  it  found  the  VNET
environment  even more  conducive  to  reproduction than  BITNET/EARN.
VNET'ers apparently keep much larger  NAMES files than BITNET'ers.  It
wasn't long before  the links were carrying more  CHRISTMA EXEC's than
anything else.

>"From start to finish, the message survived only hours .."

    Per copy, perhaps.   The first known instance of  infection was at
about  1300  GMT on  Wednesday,  December  9.  Within BITNET,  it  was
generally stamped out by the  following Monday, December 14.  On VNET,
it  didn't show  up until  a day  later, and  was mostly  killed in  a
massive network shutdown on Friday.

>(1) An incoming message can contain an executable program,
>    that can easily be run ?

    Yes.  Please  remember that the  Internet is not the  only network
style in the world.  In BITNET and  VNET, mail is just another case of
file  transfer.  File  transfer is  performed by  the sender,  not the
receiver.   These are  store-and-forward  networks, so  the path  from
system  A to  system B  need not  be intact  for the  duration of  the
transfer.  The viral program was transferred  as a normal file, not as
mail.

>(2) Such a message can be remailed under its contained program's
>    control, presumably with the name of the last victim in the
>    "From:" field ?

    It wasn't  mailed.  Thus, there  wasn't any From: field,  etc.  It
did carry  the system name and  userid of the most  recent victim, but
not any trace-back information.

>(3) Can IBM trace it to an originator, or was anonymity possible ?

    A task force of BITNET and EARN systems programmers traced it back
to its source, by the usual disease-control procedures:

   Doctor: "Miss  X, you've got a  nasty case of viral  <Y>.  Who have
            you had  contact with recently?".

   Miss X: "Just a moment, I'll check my notebook."

    A byproduct of the tool used to  transmit the virus is an entry in
the NETLOG  file listing the userid  and system name of  anyone it was
sent to, making it easier than usual  for Miss X to remember.  In some
cases, the  user had suppressed the  NETLOG facility, but that  is the
exception, not the rule.

>(4) How/where can readers of RISKS submit something similar ?
>    (strictly for professional testing purposes)

    Noplace safely.  Please  don't try it on anything  but an isolated
network, and then coldstart your spool afterwards.

>(5) Is the Internet similarly vulnerable ?

    Not to  this one.  It  plays on  several things that  the Internet
doesn't have:

   1) A  large number of IBM  VM/CMS systems.  The program  would only
      run in a CMS environment.  There is no reason one couldn't write
      something similar in any other language, though.

   2) A  suitable file transfer  system.  FTP doesn't apply.   It must
      provide a  way for a user  to receive an unsolicited  file, in a
      runnable form.

   3) A good method of determining  targets.  The CMS NAMES and NETLOG
      files provided an excellent source of information.  I suppose in
      a Unix environment, ".alias" and "/etc/aliases" would be ok, but
      .alias  is  comparatively rare,  while  NAMES  files are  almost
      universal in CMS.

>The prank seems to be benign, and therefore beneficial.

    That is being debated in several  circles.  I, for one, agree with
you.

>IBM seems to have dealt with it effectively (or have they ?).

    Yes, they have.

>Browsing this message is no fun at all.  Just type Christmas ..

    The lesson of  this one is the  same as for PC  viruses: Never run
something you don't recognize.  When the virus first appeared, several
people suggested that  it was the work of students,  and that it might
be used negatively in an ongoing argument over whether students belong
on BITNET.   When we heard  that "professionals" inside IBM  were also
running  programs they  didn't recognize,  that particular  suggestion
vanished.

    This virus  was quite  sly, in  that by  sending itself  to people
listed in  your NAMES and  NETLOG files, those people  would recognize
the source (you) as a friend, and be generally less inquisitive, until
things  got  nasty.   Lesson  #2: Even  your  friends  sometimes  make
mistakes.
                                    Ross Patterson, Rutgers University

    [RISKS received an unusually large number of messages on this subject --
    from Fred Baube, John Owens (2), Allan Pratt, Anne Louise Gockel, and 
    Bruce O'Neel.  I started trying to edit them down, but rapidly gave
    up that strategy -- inordinate overlap.  So, I will take a new tack,
    which is to put out Ross' message -- which was the most comprehensive --
    and then give Fred, John, Allan, Anne and Bruce first priority if THEY
    wish to comment marginally or additionally thereupon.  Please be terse
    -- and avoid replicating ALL of the foregoing text in your messages,
    as some of you have been doing.  (One of the joys of mailers?)  PGN]
    
------------------------------

Organization: The MITRE Corp., Washington, D.C.
Subject: The Christmas Card Caper, (hopefully) concluded
Date: Mon, 21 Dec 87 11:45:03 EST
From: Joe Morris (jcmorris@mitre.arpa) <jcmorris@mitre.arpa>

The following item was posted on the VMSHARE bulletin board.  It describes
the origin of the CHRISTMAS EXEC file, and makes valid points about the
inability of computer systems to automatically recognize some types of
ill-behaved programs quickly enough to prevent damage to a network.

(VMSHARE is a closed bulletin board operated for the use of VM installations
who are members of SHARE, the large IBM mainframe user group.  Shadow copies
of the VMSHARE traffic are distributed to many other nets, including VNET
and BITNET.)                            
                                               Joe Morris (jcmorris@mitre)

  Append on 12/19/87 at 20:10 by Melinda Varian <BITNET: MAINT@PUCC>:
   
  The following statement, from a member of the EARN Board, answers the
  queries about the origin of the CHRISTMA EXEC.  Clausthal-Zellerfeld
  is quite a new VM installation.  When Heinz Haunhorst, of their staff,
  was notified that the first appearances of the virus on the networks
  originated at his node, he pursued the matter vigorously and skillfully.
  Helmut Woehlbier, of the Technical University of Braunschweig, also did
  an excellent job in helping to determine the originating node.
   
  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>
   
  Date:         Wed, 16 Dec 87 18:33:58 GMT
  Sender:       EARN Technical Group <EARNTECH@EB0UB011>
  From:         Michael Hebgen <$02@DHDURZ1>
  Comments: To: EARN Executive <EARNEXEC@IRLEARN>,
                EARN Board of Directors <EARN-BOD@IRLEARN>
  Comments: cc: German EARN Executive <DEARNEX@DHDURZ1>,
                German EARN node administrators <DEARNADM@DEARN>,
                Heinz Haunhorst <HENRY@DCZTU1>,
                "Dr. Gerald Lange" <LANGE@DCZTU1>,
                Otto Bernd Kirchner <KIRCHNER@DS0IBM1>
  To:           Melinda Varian <MAINT@PUCC>
  Subject:      CHRISTMAS EXEC
   
  Dear colleagues,
   
  after some very sophisticated detective work  it is clear that the origin
  of the CHRISTMAS EXEC is the EARN  node DCZTU1. A student there has writ-
  ten this EXEC  to send christmas greetings to his  colleagues and another
  student has  used it  without knowing what  he is doing  (as many  of our
  network users) and started the explosion.
   
  The node  DCZTU1 has already  blocked the Userid  of the author  and done
  all necessary steps.  Every node in the network can  be the next starting
  point  of a  similar explosion  and distribute  virus programms  or other
  bad things.
   
  As far as  I know the EDP-systems  there is no way to  prevent users from
  their own  mistakes. The only  solution I can think  of for this  type of
  behaviour is to observe "EDP-hygiene":
   
     If you receive an executable  file (EXEC, CLIST, program) from another
     might be  unknown user  do NOT execute  without control  because it
     can result in gross missdemanour and serious damage.
   
     Check all EXECs/CLISTs,  what they are doing, before  you execute them
     and  check all  executable programs,  where  they come  from and  what
     they do.
   
     As in normal life uncontrolled behaviour may result in serious
     consequences  (I am  not going  to mention  AIDS). You  as a  user are
     responsable for all what you are doing.
   
  I propose to include such statements (in better english formulation) into
  the CODE OF CONDUCT and to  start an "enlightenment" process for the end-
  users
   
  Best regards, merry christmas (without tree) and a happy new year
   
  Michael Hebgen
   
  EARN director of Germany and
  General secretary of EARN
   
  *** APPENDED 12/19/87 20:10:47 BY PU/MELINDA ***
  
ADDED NOTE FROM JOE MORRIS:

Did any contributor suggest how the message jumped from EARN (or BITNET) into
VNET?  Supposedly the gateways (one at Yorktown, I believe)  are monitored
closely so that the ability of a message to cross without supervision
is quite limited.  I'm told that a few years ago there  was something of a
major flap when a meeting of relatively high IBM brass was shown a message
Melinda Varian (the BITNET source of the EARN message I forwarded) had sent
to an IBM'er via VNET (WITH the permission of IBM...upper management in IBM
just hadn't been aware of the arrangement).  My guess would be that it came
through an account on a customer machine but assigned to an IBM'er who could
pass mail into the IBM network.

Thought for the week: was this supposed to be a demonstration of a computerized
Christmas distribution TREE?

Second thought on the word "tree" (swiped from an undergraduate thesis at 
MIT from the 60's):

  Problems are posed by fools like me,
  but only heuristics can search a tree.

Joe Morris

\f


From:	Will Martin __ AMXAL_RI <wmartin@almsa_1.arpa>  4-MAR-1988 18:47
To:	Clement Taylor <CGTAYLO%erenj.bitnet@rutgers.edu>
Subj:	[40970] Re:  BITNET Security

	[Moderator note: Part 2 of 2.   _H*]

From: Una Smith <0402909%pucc.bitnet@RUTGERS.EDU>
Subject:      The Virus of Christmas Past (Re: RISKS-5.80)
To: comp-risks@RUTGERS.EDU

Re the discussion of receiving run-able mail files (sometimes viruses)
via BITNET.

A few years ago I received 2 pieces of mail, an XMAS EXEC written in
EXEC2 and a compiled module of some sort.  The module was hard to break
into, so no one I knew then knew how to tell what it did without running
it.   Well, it was a very nice, benign bug:

First, it imitated all the usual system messages one gets when logging off,
up to the full-screen VM370 logo.  Then, slowly, the logo disintegrated
into a night time scene of a cottage on a snowy hillside under some pine
trees, smoke floating out of the chimney (the "smoke" was made up of
phrases; "s..m..o..k..e" and "M..e..r..r..y...C..h..r..i..s..t..m..a..s",
etc.), and snow flakes "*" falling from the sky.  Elapsed time:  about
5 minutes.  Then it quit, abruptly leaving you sitting in front of a
terminal in some dingy office or terminal room, just as you were before.

The clue to this so-called Christmas card's origin was that the usual
machine name in the lower right was replaced with, if I remember
correctly, PSUVM.  Has anyone on the net now got an old copy of that
somewhere?  I didn't keep mine.

------------------------------

From: Skip Montanaro <steinmetz!montnaro@uunet.UU.NET>
To: risks@csl.sri.com
Subject: Re: IBM Christmas Virus (RISKS 5.80)

>(5) Is the Internet similarly vulnerable ?
>>Not to this one.  It plays on several things that the Internet doesn't have:

The quasi-equivalent of this problem in UNIX systems (and most of the
Internet, because of the large number of UNIX systems it contains) is the
ubiquitous shar file, an ASCII packaging machanism used to transfer code and
other ASCII files via mail and/or Usenet news transfer.  The problem lies in
the way users unpack shar files: they execute them.  Needless to say,
inspection of shar files before execution/extraction is highly recommended.

There's nothing to prevent me from writing a shar file that purports to be a
Christmas card. Execution of it might display the card, check out the contents
of various mail-related files, (like ~/.mailrc and ~/mbox) looking for likely
candidates to send the shar file, then recursively send it.

In fact, the same scheme would work for most operating systems with a
command language that could be executed from a file. UNIX systems are
especially vulnerable, however, because of their large numbers.

Skip (montanaro@ge-crd.arpa, uunet!steinmetz!sprite!montanaro)

------------------------------

From: msb@sq.com (Mark Brader)
To: risks@csl.sri.com
Subject: Another article on the Christmas Virus [just in time for Xmas]

    [In the spirit of the season, I am including this now rather old-hat
    and somewhat ill-informed note for a few more background details.  It 
    is interesting perhaps more for what the press can do to an incident
    than for the incident itself.  Happy holidays to all.  RISKS will take
    some vacation -- unless something really startling happens.  PGN]

I have been handed a clipping from the (Toronto) Globe and Mail's "Report
on Business" section.  I don't have the date, but Texaco Canada Inc. closed
at $31, up $4.50, on the other side of the page.

The clipping is of the Quidnunc column by Bud Jorgenson.
My !'s in square brackets.

  Merry Christmas, Big Blue.  The internal system of the world's
  biggest computer company was disrupted for almost 72 hours by an
  electronic Christmas card.  IBM's public relations department
  played down the seriousness of the incident, but according to
  our mole at IBM, "it crippled us".
  
  The computer equivalent of a nuclear meltdown [!] began at a
  university in West Germany when someone tapped into [!] IBM's
  Prof (PRofessional OFfice) System with a graphics-laden
  Christmas message.  Whether it was deliberate or a coding error
  was not clear [!], but the card quickly became a hit and was passed
  on to various routing systems.
  
  As every computer buff knows, graphics use large bites of memory
  and this one gobbled up an ever expanding chunk of the Prof
  System as it multiplied its way through IBM offices.  This was
  a week ago Friday, just before quitting time in Europe and
  during the first half of the workday on this side of the water.
  
  When the system goes down, IBM simply cannot work because just
  about everything is dependent on the [!] computer, right down
  to daily diaries with meeting schedules.  By early Monday,
  the system in Canada was partly restored so that employees
  could tap into the data base to read files.
  
  But they couldn't use printers or communicate with other offices
  until the all-clear was sounded, which was after 10 am Eastern
  time.  An IBM spokesman said the impact on operations varied
  from country to country.
  
  Police work to track down the culprit was turned over to Bitnet
  and Earn, a pair of computer networks that link universities in
  North America and Europe.  The list of suspects has been
  narrowed to two at the Technical University of Clausthal,
  a small town south of Hanover.

Forwarded by Mark Brader, SoftQuad Inc., Toronto, utzoo!sq!msb

------------------------------

From: Eric Skinner <ERS2F%UOTTAWA.BITNET@CUNYVM.CUNY.EDU>
Subject:      Christmas Exec AGAIN!
To: RISKS@csl.sri.com

An interesting point that has not been mentioned so far is that, at least in
the version that reached BITNET sites in Canada, there was a major bug in the
code of the program.  It parsed the NAMES file in a very inflexible way causing
it to have a success rate of about 5% at coming up with valid forwarding
addresses.

If the programmer had been more careful, we might have been in an even bigger
mess.

So there are fewer risks when a program has bugs? :-)

Eric Skinner, Computing Centre, University of Ottawa

------------------------------

From: minow%thundr.DEC@decwrl.dec.com  (Martin Minow)
To: risks@csl.sri.com
Subject: The Christmas Virus          [end of the season?]

The same comments on the virus from a slightly different (vms) point of view.  
The only new info is the description of the anti-viral software.  Martin
          [Pardon a little initial redundancy.  I did not want to edit.  PGN]

Newsgroups: comp.os.vms
Path: decwrl!ucbvax!QUCDNSUR.BITNET!PYM
Subject: CHRISTMA comes but once a year, a virus may be forever.
 
     By now,  many of you will have heard of the (infamous) CHRISTMA EXEC
"virus" which infected BITNET/EARN/NETNORTH and virtually paralyzed IBM's
internal  network  for a day  or two.   For those who  haven't  seen  the
various postings on the BITNET LINKFAIL list, RISKS-FORUM Digest, etc., I
will summarize  (no flames for the oversimplifications in the interest of
brevity, please).  Originating as a "prank" on a German end-node on EARN,
this EXEC (i.e.  similar to a .COM file - and written in REXX, a DCL-like
language)  displayed,  when executed  on  an IBM  VM system,  a primitive
christmas tree on the terminal and then mailed itself to everyone on that
poor user's NAMES file (i.e.  personal mailing name list) before deleting
itself.   Of  course,  some  users  had network distribution lists  (e.g.
JNET-L,  MEDINF-L,  etc.)  defined  in  their  NAMES  file . . .       [I
personally received six copies of this EXEC from different sources - this
is probably not unusual.]
 
     While this was a significant problem on  BITNET/EARN/NETNORTH with a
fair number of VM/CMS nodes, the virus clearly could not infect VAXinated
nodes,  of  which  there  are  a  larger  number.   Also,  many  (usually
undergraduate) students on VM/CMS systems are denied network access, thus
limiting  the rate of  spread  of  the virus  beyond an  infected system.
However,  once the virus entered VNET,  IBM's internal  network of VM/CMS
systems,  things really took  off (all VM/CMS systems;   users with large
NAMES  files;   all  with  network access)  and  allegedly brought  their
network to a standstill.
 
     Initially,  the  problem  required  manual  intervention  by  system
managers to purge CHRISTMA  EXECs  from users'  readers -  but this could
only give a temporary remission in the disease.   Fortunately, a CHRISTMA
eradicator was written (by Eric Thomas, author of the LISTSERV software),
and  also  an ingenious  virus  was developed  (by  Hank ?,  sorry,  I've
forgotten)  to follow and destroy the original  CHRISTMA  virus  and then
self-destruct  in  mid-January.   So now  it's  eradicated like smallpox:
hmmm .  .  .  I expect that there may be another minor epidemic when some
users return from vacation.
 
     So,  what should we do?  Laugh at IBM?  Say "It can't happen to me."
Look  at  all  those experienced,  computer-wise  IBMers who ran CHRISTMA
EXEC.  Oh yes, there will be flames . . .    platitudes about NEVER using
any software which  you  haven't  written  yourself  -  or is  written by
someone  you  TRUST  ABSOLUTELY  :-) . . .   flames  about  chain letters
and viruses on the network . . .    their authors should be boiled in oil
/ set in RA81 air filter glue / sentenced to do 10 years of RSX SYSGENs /
locked  in  a room  with  only an IBM  PC  /  (substitute  your favourite
nightmare here).  Let's just think a little before flaming.
 
     Could a "harmless"  CHRISTMA-like virus attack a VAX/VMS system?   A
recent network posting (RISKS?, LINKFAIL?) mentioned the possibility of a
virus  hidden in SHAR files which are _executed_ as .COM  files to unpack
them.   SHAR files  are,  after  all,  an excellent method for _reliable_
software distribution over  gateways.   (This  is  not  meant  to reflect
negatively  on  Michael  Bednarek  in  any  way  -   VMSHAR  is  a  great
contribution and we all have used it or will use it.) But .  .  .  nobody
unpacks one of these distributions with  PRIVs turned on,  do we?   Could
such a virus, like CHRISTMA EXEC, replicate from a non-privileged account
(apart from doing a SET PROC/PRIV=ALL quietly in the middle of the file)?
Certainly,  VMS  Mail won't allow  wildcard SEND (and JNET won't allow  a
wildcard  SEND/FILE),  but,  for example,  a .COM  file could  do  a SHOW
LOGICAL/OUTPUT=CRACKER.TMP,   look  for  logicals  with  syntax  "jnet%",
"BITNET%",  "IN%",  etc.  and try mailing itself to these addresses.  (No
flames about  giving state secrets  to the enemy,  please.   Blind Freddy
could have seen that one.)
 
     We may not be able to read  a SHAR file in its entirety (looking for
a virus  in  a few thousand blocks  of code),  but I for one am certainly
going to "quarantine" it as far as possible, SEARCHing it for more than a
few key words before unpacking it  from a non-privileged (either  default
or authorized)  account.  Further suggestions from the more devious minds
on the list would be welcome,  please.  Ignorance may be bliss, but it is
definitely NOT SAFE.
 
     Most if not all  of us have public  domain  software running on  our
systems   -   or  programs  written  by   students   and  our  colleagues
(trustworthy,  of course :-} ).  How many VAX/VMS systems do _not_ use at
least  one piece of  DECUS  software?   This  PD  software,  even if  not
essential,  makes  life easier  and/or  saves hours  of  work.   Software
exchange isn't going to stop now,  nor should it.   We  must be vigilant,
both for our  own  safety,  and as a responsibility to colleagues on  the
network.   We must make  all reasonable efforts to check before executing
software ourselves or posting it to the net -  or making it available for
FTP or putting it  on a BITNET LISTSERV.   CHRISTMA EXEC comes but once a
year, but a virus can be forever.
 
     Comments from the Info-VAX gurus would be appreciated.  What are the
guidelines for "safe  software exchange"?   What are  the best methods of
checking software for viral  contamination,  granted that we are going to
continue to exchange it?
 
John Pym
 
------------------------------

Date: Mon, 4 Jan 88 07:51 EDT
From: "guthery%asc@sdr.slb.com" <GUTHERY%ASC%sdr.slb.com@RELAY.CS.NET>
Subject: Source Code is Counter to Viruses & Trojan Horses
To: risks@csl.sri.com

As a little bit of reflection about the fact that almost all computers have
clocks in them will show, there is no protection in trying programs out with 
write-only harddisks or with privileges turned off.  Doing this only sets
the hook deeper.  In fact, anytime you run a program whose complete 
workings you do not and cannot understand you are at the mercy of the author
of the program and you are at risk.

One very good way to counter viruses and trojan horses is to insist on getting
the source code of any program you run.  This is summarized in the following 
pocketsize adage:

		     IF YOU CAN'T READ IT, DON'T RUN IT

There are NO good reasons why software vendors shouldn't give you the source
code of any program they sell you.  The reason they don't currently is because
you could see what a mess the program really is.  In 999 cases out of 1,000
they don't know everything the program does and they certainly don't want you
looking over the code and telling them.

For a moment stop and think of all the execute only software you run on
your system.  Think of all the companies from whom you purchased this
software.  Think of all the pressure you put on them for bug fixes, new
features, and lower prices.  Think about the translation of these pressures
into pressures on programmers.  Suppose one of these programmers decides to
get just a little even ...  an occassional bad number, a lost record once a 
month, a couple pennies moved from here to there just for fun, a scrambled
directory entry once in a blue moon.  If the program does what it purports 
to do, where is the check?  The project leader?  The manager?  The president?
The venture capitalist?  You?  And who is responsible?  You!  And what can 
you do with a bunch of object code?  Turn off the harddisk?  Scan the program
for strings?  Deny privileges?  Piece of cake!

We are marginally able to answer the question "Does this piece of software
do what I want it to do?" but we are absolutely incapable of answering
the much more important question "Does this piece of software NOT do what 
I don't want it to do?"  Through this gaping hole in our capabilities enter 
viruses and trojan horses.  It is historically interesting that I can get a 
handle on the first question without the source code but I can get nowhere 
on the second without it.  As long as we willing to accept programs from 
software suppliers without the source code we, irresponsibly in my view, 
accept undue risk and invite disaster.

------------------------------

From: bryce%hoser.Berkeley.EDU@ucbvax.Berkeley.EDU (Bryce Nesbitt)
Subject: Viral VAXination? (Re: RISKS-6.1)
Date: 4 Jan 88 07:52:09 GMT

>Could a "harmless"  CHRISTMA-like virus attack a VAX/VMS system?   A
>recent network posting (RISKS?, LINKFAIL?) mentioned the possibility of a
>virus  hidden in SHAR files which are _executed_ as .COM  files to unpack.

I'm surprised nobody has mentioned this:  Around here we don't "execute"
shar files to unpack them.  Instead there is a handly little utility called
"unshar".  I use a version on both Unix and my Amiga microcomputer.  It
internally handles all of the "legitimate" commands that a simple file packing
shar might contain (echo, wc, cat, if, test, #, exit, etc.).

It is much less vulnerable to attack.  To use the example of the poster, unshar
would simple report "unknow command" if a "SET PROC/PRIV=ALL" was quietly 
inserted in the middle of the file.

The comp.sources.unix and comp.sources.misc archives undoubtably have C
source code for the taking.

bryce@hoser.berkeley.EDU -or- ucbvax!hoser!bryce (or try "cogsci")

------------------------------

Date:         Tue, 05 Jan 88 08:44:54 EDT
From: Jeffrey R Kell <JEFF%UTCVM.BITNET@CUNYVM.CUNY.EDU>
Subject:      Christmas virus plus

The problem is compounded on IBM VM/CMS systems (where CHRISTMAs EXEC took
its toll) by an often overlooked "feature" of the standard IBM "receive"
command.  Files such as EXECs are usually sent in a special encoded form
called NETDATA format.  The "receive" command is smart enough to determine
the format of the file and decode it appropriately, as is the "peek" command
used to browse a file before receiving it.  BUT... the NETDATA encoding also
allows for multiple files to be combined into one NETDATA stream.  The file
appears with only the attributes of the first file in the stream, and only
the first file appears when "peeked".  When the unsuspecting victim performs
the "receive", the remaining files are ALSO received with REPLACE IMPLIED!

Building such a "nested" NETDATA deck is not common knowledge, but can be
done using the undocumented internal module used by sendfile/receive.  The
now infamous CHRISTMA EXEC could just as easily contained a PROFILE EXEC
behind it that would format your A-disk the next time you logged on.  Thus
even if you did read the source code for CHRISTMAs and trashed it upon
discovery of its function, your next logon would result in erasure of your
entire A-disk (and also any evidence of what caused it to occur).

There is a semi-public-domain overlay for RECEIVE available on any Bitnet
NETSERV server which detects multiple datasets in a NETDATA stream.  Any
concerned IBM CMS user out there should investigate this utility.

------------------------------

From: ahh@j.cc.purdue.edu (Brent L. Woods)
Date: Tue, 5 Jan 88 9:14:35 EST
Subject: Unshar program (was: Viral VAXination [Risks 6.2])

>I'm surprised nobody has mentioned this:  Around here we don't "execute"
>shar files to unpack them...

     This probably should have been mentioned earlier, as I'm sure it's
of interest to quite a few people.  I can't speak for either the
comp.sources.unix or comp.sources.misc archives (though, as a side note,
I couldn't find any unshar programs in the comp.sources.unix archive
that is maintained here at Purdue), but there *is* an unshar program in
the comp.sources.amiga archives.  I'm not absolutely certain, but I
believe that the version we have is the one that Bryce was writing about
above.

     If anyone might want a copy of this program source code (in C),
it's available via anonymous ftp from j.cc.purdue.edu in the amiga
source archives (the directory it's in is news/comp/sources/amiga/volume1,
and the filename is unshar.c.Z).  It's written with portability in mind,
so it should compile and run under a variety of systems, but we've only
tested it under UNIX and on the Amiga so far.  Also, the file in the
archives is compressed (UNIX "compress" utility), so ftp should be set
to "binary" mode to insure a correct transfer.

Brent Woods, Co-Moderator, comp.{sources,binaries}.amiga

USENET:   ...!j.cc.purdue.edu!ahh       ARPANET:  ahh@j.cc.purdue.edu
BITNET:   PODUM@PURCCVM

------------------------------
***End of Included Messages***