Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:10074
HistoryOct 31, 2005 - 12:00 a.m.

[Full-disclosure] SCOSA-2005.43 OpenServer 6.0.0 : RPCBind Remote Denial of Service Vulnerability

2005-10-3100:00:00
vulners.com
17

EPSS

0.001

Percentile

44.0%

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                    SCO Security Advisory

Subject: OpenServer 6.0.0 : RPCBind Remote Denial of Service Vulnerability
Advisory number: SCOSA-2005.43
Issue date: 2005 October 27
Cross reference: sr895067 erg712957 fz533036 CAN-2005-2132


  1. Problem Description

     When the RPC portmapper (rpcbind) receives an invalid portmap
     request from a remote (or local) host, it falls into a denial
     of service state and cannot respond. As a result, the RPC
     services will not operate normally.
    
     The Common Vulnerabilities and Exposures project (cve.mitre.org)
     has assigned the name CAN-2005-2132 to this issue.
    
  2. Vulnerable Supported Versions

     System                          Binaries
     ----------------------------------------------------------------------
     OpenServer 6.0.0                /usr/lib/libnsl.so.1
    
  3. Solution

     The proper solution is to install the latest packages.
    
  4. OpenServer 6.0.0

     4.1 Location of Fixed Binaries
    
     ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.43
    
    
     4.2 Verification
    
     MD5 (VOL.000.000) = 5086254532a3d202f526de0b6d343e66
    
     md5 is available for download from
             ftp://ftp.sco.com/pub/security/tools
    
    
     4.3 Installing Fixed Binaries
    
     Upgrade the affected binaries with the following sequence:
    
     1) Download the VOL* files to a directory
    
     2) Run the custom command, specify an install from media
     images, and specify the directory as the location of the
     images.
    
  5. References

     Specific references for this advisory:
             http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2132
    
     SCO security resources:
             http://www.sco.com/support/security/index.html
     SCO security advisories via email
             http://www.sco.com/support/forums/security.html
    
     This security fix closes SCO incidents sr895067 erg712957 fz533036.
    
  6. Disclaimer

     SCO is not responsible for the misuse of any of the information
     we provide on this website and/or through our security
     advisories. Our advisories are a service to our customers
     intended to promote secure installation and use of SCO
     products.
    
  7. Acknowledgments

     The SCO Group would like to thank Yun Jonglim for his work
     in discovering and describing this defect so well.
    

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAkNhPPkACgkQaqoBO7ipriEu+wCaAhGGLIVq7OtpTuUBQ4RxMOP7
gHQAniSVhsDnsSldI/t3oynFPXUOVhFi
=sm7f
-----END PGP SIGNATURE-----


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

EPSS

0.001

Percentile

44.0%

Related for SECURITYVULNS:DOC:10074