IBM SECURITY ADVISORY
First Issued: Wed Aug 23 09:01:23 CDT 2017 |Updated: Mon Nov 13 14:29:35 CST 2017 |Update 2: Updated the APAR section to reflect that the relevant APARs are | shipping in 6100-09-11, 7100-04-06, 7200-00-06, and 7200-01-04. | Corrected the impacted upper level filesets for 6100-09, 7100-04, | 7200-00, and 7200-01. Clarified that VIOS is impacted as well. | The following VRMFs are vulnerable: | AIX 6.1.9: bos.net.tcp.client up to and including 22.214.171.1240 | AIX 7.1.4: bos.net.tcp.client up to and including 126.96.36.199 | AIX 7.2.0: bos.net.tcp.client_core up to and including 188.8.131.52 | AIX 7.2.1: bos.net.tcp.client_core up to and including 184.108.40.206 | New iFixes provided for AIX 6100-09-10, 7100-04-05, 7200-00-05, and | 7200-01-03, and iFix provided for VIOS 220.127.116.11.
The most recent version of this document is available here:
http://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc ftp://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc
Security Bulletin: Vulnerabilities in BIND impact AIX (CVE-2017-3142 and CVE-2017-3143)
There are vulnerabilities in BIND that impact AIX.
CVEID: CVE-2017-3142 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142 DESCRIPTION: ISC BIND could allow a remote attacker to bypass security restrictions, caused by an error when an attacker can send and receive messages to an authoritative DNS server and has knowledge of a valid TSIG key name. By sending a specially crafted request packet, an attacker could exploit this vulnerability to bypass TSIG authentication on AXFR requests and transfer the target zone. CVSS Base Score: 5.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/127901 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) CVEID: CVE-2017-3143 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143 DESCRIPTION: ISC BIND could allow a remote attacker to bypass security restrictions, caused by an error when an attacker can send and receive messages to an authoritative DNS server and has knowledge of a valid TSIG key name. By sending specially crafted data, an attacker could exploit this vulnerability to bypass TSIG authentication and manipulate BIND into accepting an unauthorized dynamic update. CVSS Base Score: 7.5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/127902 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) AFFECTED PRODUCTS AND VERSIONS: AIX 5.3, 6.1, 7.1, 7.2
| VIOS 2.2
The following fileset levels are vulnerable: key_fileset = aix Fileset Lower Level Upper Level KEY ------------------------------------------------------------ bos.net.tcp.client 18.104.22.168 22.214.171.124 key_w_fs
| bos.net.tcp.client 126.96.36.199 188.8.131.520 key_w_fs bos.net.tcp.client 184.108.40.206 220.127.116.11 key_w_fs | bos.net.tcp.client 18.104.22.168 22.214.171.124 key_w_fs | bos.net.tcp.client_core 126.96.36.199 188.8.131.52 key_w_fs | bos.net.tcp.client_core 184.108.40.206 220.127.116.11 key_w_fs
Note: To find out whether the affected filesets are installed on your systems, refer to the lslpp command found in AIX user's guide. Example: lslpp -L | grep -i bos.net.tcp.client REMEDIATION: A. APARS IBM has assigned the following APARs to this problem: AIX Level APAR Availability SP KEY ------------------------------------------------ 5.3.12 IV98825 ** N/A key_w_apar
| 6.1.9 IV98826 SP11 key_w_apar 7.1.3 IV98827 N/A key_w_apar | 7.1.4 IV98828 SP6 key_w_apar | 7.2.0 IV98829 SP6 key_w_apar | 7.2.1 IV98830 ** SP4 key_w_apar
** Please refer to AIX support lifecycle information page for availability of Service Packs: http://www-01.ibm.com/support/docview.wss?uid=isg3T1012517 Subscribe to the APARs here: http://www.ibm.com/support/docview.wss?uid=isg1IV98826 http://www.ibm.com/support/docview.wss?uid=isg1IV98827 http://www.ibm.com/support/docview.wss?uid=isg1IV98828 http://www.ibm.com/support/docview.wss?uid=isg1IV98829 http://www.ibm.com/support/docview.wss?uid=isg1IV98830 https://www.ibm.com/support/docview.wss?uid=isg1IV98826 https://www.ibm.com/support/docview.wss?uid=isg1IV98827 https://www.ibm.com/support/docview.wss?uid=isg1IV98828 https://www.ibm.com/support/docview.wss?uid=isg1IV98829 https://www.ibm.com/support/docview.wss?uid=isg1IV98830 By subscribing, you will receive periodic email alerting you to the status of the APAR, and a link to download the fix once it becomes available. B. FIXES Fixes are available. The fixes can be downloaded via ftp or http from: ftp://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar http://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar The links above are to a tar file containing this signed advisory, fix packages, and OpenSSL signatures for each package. The fixes below include prerequisite checking. This will enforce the correct mapping between the fixes and AIX Technology Levels. AIX Level Interim Fix (*.Z) KEY ---------------------------------------------- 18.104.22.168 IV98825m9a.170830.epkg.Z key_w_fix 22.214.171.124 IV98826m9a.170809.epkg.Z key_w_fix 126.96.36.199 IV98826m9a.170809.epkg.Z key_w_fix 188.8.131.52 IV98826m9a.170809.epkg.Z key_w_fix
| 184.108.40.206 IV98826m0a.171105.epkg.Z key_w_fix 220.127.116.11 IV98827m3a.170808.epkg.Z key_w_fix 18.104.22.168 IV98827m3a.170808.epkg.Z key_w_fix 22.214.171.124 IV98827m3a.170808.epkg.Z key_w_fix 126.96.36.199 IV98828m4a.170808.epkg.Z key_w_fix 188.8.131.52 IV98828m4a.170808.epkg.Z key_w_fix 184.108.40.206 IV98828m4a.170808.epkg.Z key_w_fix | 220.127.116.11 IV98828m5b.171110.epkg.Z key_w_fix 18.104.22.168 IV98829m0a.170809.epkg.Z key_w_fix 22.214.171.124 IV98829m0a.170809.epkg.Z key_w_fix 126.96.36.199 IV98829m0a.170809.epkg.Z key_w_fix | 188.8.131.52 IV98829m0b.171106.epkg.Z key_w_fix 184.108.40.206 IV98830m1a.170809.epkg.Z key_w_fix 220.127.116.11 IV98830m1a.170809.epkg.Z key_w_fix 18.104.22.168 IV98830m1a.170809.epkg.Z key_w_fix | 22.214.171.124 IV98830m1b.171106.epkg.Z key_w_fix
| VIOS Level Interim Fix (*.Z) KEY | ----------------------------------------------- | 126.96.36.199 IV98826m0a.171105.epkg.Z key_w_fix
Please note that the above table refers to AIX TL/SP level as opposed to fileset level, i.e., 188.8.131.52 is AIX 7100-03-07. The above fixes are cumulative and address previously issued AIX BIND security bulletins with respect to SP and TL. To extract the fixes from the tar file: tar xvf bind_fix16.tar cd bind_fix16 Verify you have retrieved the fixes intact: The checksums below were generated using the "openssl dgst -sha256 [filename]" command as the following: openssl dgst -sha256 filename KEY ----------------------------------------------------------------------------------------------------- 28b9adcdee9562fa0d04fa8d9689305f4be5670455a8191e9383e7a961259814 IV98825m9a.170830.epkg.Z key_w_csum 5c483daf9725efd11d1c46a8b81fcd3f33cd5fe97a7b8723384d4ab76b68c249 IV98826m9a.170809.epkg.Z key_w_csum
| 3f6115181d53724414c23a8af636d0e04c84a687f06c4796224eefe44e8720bf IV98826m0a.171105.epkg.Z key_w_csum 81ae02a234b85bcd1c60bb9e5f710ff44a90246444686fbf1c127bee17cc9b5d IV98827m3a.170808.epkg.Z key_w_csum 05037edcdb0db761be005550c216efd21d9787c9f2e3da2872f245b5bbd96673 IV98828m4a.170808.epkg.Z key_w_csum | f95f352d762c0daffff87053771f38b804684ca5be24857b38a5327e186b8c44 IV98828m5b.171110.epkg.Z key_w_csum 4e5273dea44179e3c46f617d6295492620eddce58675030a46e2531db263ccef IV98829m0a.170809.epkg.Z key_w_csum | 5cf4366ed68c335fdf38a4cdade7d7e7d1f6fbb047c0256ad026a010616dadea IV98829m0b.171106.epkg.Z key_w_csum 462f4c61f196ce49f99878447f975e748a51f4e3627ea93e6fa381f0ea6c3542 IV98830m1a.170809.epkg.Z key_w_csum | 1b95f895e6fedb661a7a707eb3f65ea0ac450dcc428e97dc8f08080e0961e369 IV98830m1b.171106.epkg.Z key_w_csum
These sums should match exactly. The OpenSSL signatures in the tar file and on this advisory can also be used to verify the integrity of the fixes. If the sums or signatures cannot be confirmed, contact IBM Support at http://ibm.com/support/ and describe the discrepancy. openssl dgst -sha1 -verify [pubkey_file] -signature [advisory_file].sig [advisory_file] openssl dgst -sha1 -verify [pubkey_file] -signature [ifix_file].sig [ifix_file] Published advisory OpenSSL signature file location: http://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc.sig https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc.sig ftp://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc.sig C. FIX AND INTERIM FIX INSTALLATION IMPORTANT: If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding. To preview a fix installation: installp -a -d fix_name -p all # where fix_name is the name of the # fix package being previewed. To install a fix package: installp -a -d fix_name -X all # where fix_name is the name of the # fix package being installed. Interim fixes have had limited functional and regression testing but not the full regression testing that takes place for Service Packs; however, IBM does fully support them. Interim fix management documentation can be found at: http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html https://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html To preview an interim fix installation: emgr -e epkg_name -p # where epkg_name is the name of the # interim fix package being previewed. To install an interim fix package: emgr -e epkg_name -X # where epkg_name is the name of the # interim fix package being installed. WORKAROUNDS AND MITIGATIONS: None.
Note: Keywords labeled as KEY in this document are used for parsing purposes. If you would like to receive AIX Security Advisories via email, please visit "My Notifications": http://www.ibm.com/support/mynotifications https://www.ibm.com/support/mynotifications To view previously issued advisories, please visit: http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq Contact IBM Support for questions related to this announcement: http://ibm.com/support/ https://ibm.com/support/ To obtain the OpenSSL public key that can be used to verify the signed advisories and ifixes: Download the key from our web page: http://www.ibm.com/systems/resources/systems_p_os_aix_security_pubkey.txt https://www.ibm.com/systems/resources/systems_p_os_aix_security_pubkey.txt To obtain the PGP public key that can be used to communicate securely with the AIX Security Team via email@example.com you can either: A. Download the key from our web page:
B. Download the key from a PGP Public Key Server. The key ID is: 0x28BFAA12 Please contact your local IBM AIX support center for any assistance.
Complete CVSS v3 Guide: http://www.first.org/cvss/user-guide https://www.first.org/cvss/user-guide On-line Calculator v3: http://www.first.org/cvss/calculator/3.0 https://www.first.org/cvss/calculator/3.0
First Issued: Wed Aug 23 09:01:23 CDT 2017 Updated: Wed Sep 13 08:17:47 CDT 2017 Update 1: Added AIX 5.3, 7.1.4, 7.2.0, and 7.2.1 as impacted. Impacted fileset information added for AIX 5.3, 7.1.4, 7.2.0, and 7.2.1. iFixes added for AIX 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124.
| Updated: Mon Nov 13 14:29:35 CST 2017 | Update 2: Updated the APAR section to reflect that the relevant APARs are | shipping in 6100-09-11, 7100-04-06, 7200-00-06, and 7200-01-04. | Corrected the impacted upper level filesets for 6100-09, 7100-04, | 7200-00, and 7200-01. Clarified that VIOS is impacted as well. | The following VRMFs are vulnerable: | AIX 6.1.9: bos.net.tcp.client up to and including 126.96.36.1990 | AIX 7.1.4: bos.net.tcp.client up to and including 188.8.131.52 | AIX 7.2.0: bos.net.tcp.client_core up to and including 184.108.40.206 | AIX 7.2.1: bos.net.tcp.client_core up to and including 220.127.116.11 | New iFixes provided for AIX 6100-09-10, 7100-04-05, 7200-00-05, and | 7200-01-03.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.