|
|
V40_SSRT0636U Security Vulnerabilities in BIND on Tru64 UNIX V4.0D - V4.0F Multiple Security Vulnerabilities in BIND V40_SSRT0636U Security Vulnerabilities in BIND on Tru64 UNIX V4.0D - V4.0F Multiple Security Vulnerabilities in BIND TITLE: V40_SSRT0636U Security Vulnerabilities in BIND on Tru64 UNIX V4.0D - V4.0F TITLE: Multiple Security Vulnerabilities in BIND V40_SSRT0636U Security Vulnerabilities in BIND on Tru64 UNIX V4.0D - V4.0F Multiple Security Vulnerabilities in BIND V40_SSRT0636U Security Vulnerabilities in BIND on Tru64 UNIX V4.0D - V4.0F TITLE: Multiple Security Vulnerabilities in BIND TITLE: V40_SSRT0636U Security Vulnerabilities in BIND on Tru64 UNIX V4.0D - V4.0F TITLE: Multiple Security Vulnerabilities in BIND TITLE: V40_SSRT0636U Security Vulnerabilities in BIND on Tru64 UNIX V4.0D - V4.0F TITLE: Multiple Security Vulnerabilities in BIND
|
Multiple Security Vulnerabilities in BIND
TITLE: V40_SSRT0636U Security Vulnerabilities in BIND on Tru64 UNIX V4.0D - V4.0F
Copyright (c) COMPAQ Computer Corporation 2000. All rights reserved.
Modification Date: 14-MAR-2000
Modification Type: Updated Security Patch
DATE: Mar. 14, 2000
TITLE: Multiple Security Vulnerabilities in BIND
X-REF: SSRT0636U, CERT Advisory CA-99.14, ISC Advisory
dated Nov 8, 1999
PATCH IDENTIFIER: V40_SSRT0636U.tar
SOURCE: Compaq Computer Corporation
Software Security Response Team
"Compaq is broadly distributing this Security Advisory in order
to bring to the attention of users of Compaq products the
important security information contained in this Advisory.
Compaq recommends that all users determine the applicability of
this information to their individual situations and take
appropriate action.
Compaq does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently,
Compaq will not be responsible for any damages resulting from
user's use or disregard of the information provided in this
Advisory."
-------------------------------------------------------------------------
IMPACT:
Versions Affected: Compaq's Tru64 UNIX V4.0D, V4.0E, V4.0F
This patch resolves the potential reported vulnerability with the
'maxdname' bug (problem #6 in the list below) for Tru64 UNIX V4.0D
through V4.0F.
*** TCP/IP installations for Compaq's OpenVMS Alpha and OpenVMS VAX
are not Vulnerable to these reported problems.
Issues/Problem & Severity Impacts
(See Attachement for details) Tru64 UNIX V4.0D- Tru64 UNIX V5.0
V4.0F
1."nxt bug"(critical) No No
2."solinger bug"(serious) No Yes
3."fdmax bug"(serious) No Yes
4."sig bug"(serious) No No
5."naptr bug" (minor) No Yes
6."maxdname bug" (minor) Yes Yes
-------------------------------------------------------------------------
RESOLUTION:
A patch is available for Tru64 UNIX V4.0D through V4.0F with a minimum
of DUpatchkit BL13 installed. See the attachment for a list of all of the
reported Tru64 UNIX Bind issues described in the advisory postings
and Compaq's solution or workarounds.
Note: The solution provided in this kit will be included in a future
distributed DUpatchkit and future release of Compaq's Tru64 UNIX
accordingly.
This patch kit may be obtained from the World Wide Web at the
following FTP address:
http://www.service.digital.com/patches
Patch file name: V40_SSRT0636U.tar
Use the FTP access option, select DIGITAL_UNIX directory
then choose the appropriate version directory and
download the patch accordingly.
Note: The README file with this patch is included
as part of the V40_SSRT0636U.tar file.
INSTALLATION INSTRUCTIONS
These installation instructions apply to all versions of V4.0X Tru64 Unix.
Notice this patch includes two named objects and specific instructions for
installing each of them.
Assume the patch files are in the directory /patches.
A kernel rebuild is not required but a system reboot is recommended.
Stop named process.
As root,
# cd /sbin
# mv named named.orig
# cp /patches/v40x_named ./named
# chown bin:bin named
# chmod 755 named
# cd /usr/sbin
# mv named named.orig
# cp /patches/v40x_usr_named ./named
# chown bin:bin named
# chmod 755 named
Reboot system or restart named.
Additional Considerations:
If you need further information, please contact your normal
Compaq Services support channel.
Compaq appreciates your cooperation and patience. We regret any
inconvenience applying this information may cause.
As always, Compaq urges you to periodically review your system
management and security procedures.
Compaq will continue to review and enhance the security
features of its products and work with customers to maintain and
improve the security and integrity of their systems.
-------------------------------------------------------------------------
Compaq shall not be liable for technical or editorial errors or omissions
contained herein. The information in this document is subject to change
without notice. Copyright Compaq Computer Corporation, 2000.
Unpublished Rights Reserved Under the Copyright Laws of the United States.
-------------------------------------------------------------------------
ATTACHMENT:
*NOTE: This information only applies to currently supported versions.
The following are all of the reported Bind issues described in
the recent postings, how it affects Compaq Tru64 Unix, and any
possible workarounds.
TCP/IP installations for Compaq's OpenVMS Alpha and OpenVMS VAX
are not Vulnerable to these reported problems.
#1_______________
Name: "nxt bug"
Severity: CRITICAL
Attack type: remote access
Compaq Tru64 UNIX products are not vulnerable to this attack.
#2_______________
Name: "solinger bug"
Severity: SERIOUS
Attack type: Denial of service
Compaq Tru64 Unix 5.0 is vulnerable to this attack. At this
time no acceptable workaround is available, but Compaq is working on
a patch.
#3_______________
Name: "fdmax bug"
Severity: SERIOUS
Attack type: Denial of service
Compaq Tru64 Unix 5.0 is vulnerable to this attack. Compaq is
currently working on a patch. In the mean time, a workaround is
available:
-- add the following statement to the "options" section in named.conf
{ files #; } where # is less then 4096 (for V5.0 systems)
#4_______________
Name: "sig bug"
Severity: SERIOUS
Attack type: Denial of service
Compaq Tru64 UNIX products are not vulnerable to this attack.
#5_______________
Name: "naptr bug"
Severity: MINOR
Attack type: Denial of service
Compaq Tru64 Unix 5.0 is vulnerable to this attack and Compaq is
currently working on a patch. In the mean time a workaround is
available:
-- Make sure that permission level required to modify zone files is
the same or higher then that of a DNS server.
Note: Typical permissions on zone files should be 0444 (owner read,
group read, all read) and owned by the same user who owns 'named'
executable.
#6_______________
Name: "maxdname bug"
Severity: MINOR
Attack type: Denial of service
Compaq Tru64 Unix products are vulnerable to this attack.
Compaq has provided a patch SSRT0636U.tar for Tru64 UNIX
V4.0D through V4.0F
Files on this server are as follows:
|
»v40_ssrt0636u.README
»v40_ssrt0636u.CHKSUM
»v40_ssrt0636u.tar
|