[Full-disclosure] SCOSA-2005.43 OpenServer 6.0.0 : RPCBind Remote Denial of Service Vulnerability

2005-10-31T00:00:00
ID SECURITYVULNS:DOC:10074
Type securityvulns
Reporter Securityvulns
Modified 2005-10-31T00:00:00

Description

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


                    SCO Security Advisory

Subject: OpenServer 6.0.0 : RPCBind Remote Denial of Service Vulnerability Advisory number: SCOSA-2005.43 Issue date: 2005 October 27 Cross reference: sr895067 erg712957 fz533036 CAN-2005-2132


  1. Problem Description

    When the RPC portmapper (rpcbind) receives an invalid portmap
    request from a remote (or local) host, it falls into a denial
    of service state and cannot respond. As a result, the RPC
    services will not operate normally.
    
    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CAN-2005-2132 to this issue.
    
  2. Vulnerable Supported Versions

    System                          Binaries
    ----------------------------------------------------------------------
    OpenServer 6.0.0                /usr/lib/libnsl.so.1
    
  3. Solution

    The proper solution is to install the latest packages.
    
  4. OpenServer 6.0.0

    4.1 Location of Fixed Binaries
    
    ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.43
    
    4.2 Verification
    
    MD5 (VOL.000.000) = 5086254532a3d202f526de0b6d343e66
    
    md5 is available for download from
            ftp://ftp.sco.com/pub/security/tools
    
    4.3 Installing Fixed Binaries
    
    Upgrade the affected binaries with the following sequence:
    
    1) Download the VOL* files to a directory
    
    2) Run the custom command, specify an install from media
    images, and specify the directory as the location of the
    images.
    
  5. References

    Specific references for this advisory:
            http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2132
    
    SCO security resources:
            http://www.sco.com/support/security/index.html
    SCO security advisories via email
            http://www.sco.com/support/forums/security.html
    
    This security fix closes SCO incidents sr895067 erg712957 fz533036.
    
  6. Disclaimer

    SCO is not responsible for the misuse of any of the information
    we provide on this website and/or through our security
    advisories. Our advisories are a service to our customers
    intended to promote secure installation and use of SCO
    products.
    
  7. Acknowledgments

    The SCO Group would like to thank Yun Jonglim for his work
    in discovering and describing this defect so well.
    

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (SCO_SV) Comment: For info see http://www.gnupg.org

iEYEARECAAYFAkNhPPkACgkQaqoBO7ipriEu+wCaAhGGLIVq7OtpTuUBQ4RxMOP7 gHQAniSVhsDnsSldI/t3oynFPXUOVhFi =sm7f -----END PGP SIGNATURE----- ___________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/