SEARCH CONTACT US SUPPORT SERVICES PRODUCTS STORE
United States    
COMPAQ STORE | PRODUCTS | SERVICES | SUPPORT | CONTACT US | SEARCH
gears
compaq support options
support home
software & drivers
ask Compaq
reference library
support forum
frequently asked questions
support tools
warranty information
service centers
contact support
product resources
parts for your system
give us feedback
associated links
.
} what's new
.
} contract access
.
} browse patch tree
.
} search patches
.
} join mailing list
.
} feedback
.
patches by topic
.
} DOS
.
} OpenVMS
.
} Security
.
} Tru64 Unix
.
} Ultrix 32
.
} Windows
.
} Windows NT
.
connection tools
.
} nameserver lookup
.
} traceroute
.
} ping
V40_SSRT0636U Security Vulnerabilities in BIND on Tru64 UNIX V4.0D - V4.0F Multiple Security Vulnerabilities in BIND

TITLE: V40_SSRT0636U Security Vulnerabilities in BIND on Tru64 UNIX V4.0D - V4.0F Copyright (c) COMPAQ Computer Corporation 2000. All rights reserved. Modification Date: 14-MAR-2000 Modification Type: Updated Security Patch DATE: Mar. 14, 2000 TITLE: Multiple Security Vulnerabilities in BIND X-REF: SSRT0636U, CERT Advisory CA-99.14, ISC Advisory dated Nov 8, 1999 PATCH IDENTIFIER: V40_SSRT0636U.tar SOURCE: Compaq Computer Corporation Software Security Response Team "Compaq is broadly distributing this Security Advisory in order to bring to the attention of users of Compaq products the important security information contained in this Advisory. Compaq recommends that all users determine the applicability of this information to their individual situations and take appropriate action. Compaq does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, Compaq will not be responsible for any damages resulting from user's use or disregard of the information provided in this Advisory." ------------------------------------------------------------------------- IMPACT: Versions Affected: Compaq's Tru64 UNIX V4.0D, V4.0E, V4.0F This patch resolves the potential reported vulnerability with the 'maxdname' bug (problem #6 in the list below) for Tru64 UNIX V4.0D through V4.0F. *** TCP/IP installations for Compaq's OpenVMS Alpha and OpenVMS VAX are not Vulnerable to these reported problems. Issues/Problem & Severity Impacts (See Attachement for details) Tru64 UNIX V4.0D- Tru64 UNIX V5.0 V4.0F 1."nxt bug"(critical) No No 2."solinger bug"(serious) No Yes 3."fdmax bug"(serious) No Yes 4."sig bug"(serious) No No 5."naptr bug" (minor) No Yes 6."maxdname bug" (minor) Yes Yes ------------------------------------------------------------------------- RESOLUTION: A patch is available for Tru64 UNIX V4.0D through V4.0F with a minimum of DUpatchkit BL13 installed. See the attachment for a list of all of the reported Tru64 UNIX Bind issues described in the advisory postings and Compaq's solution or workarounds. Note: The solution provided in this kit will be included in a future distributed DUpatchkit and future release of Compaq's Tru64 UNIX accordingly. This patch kit may be obtained from the World Wide Web at the following FTP address: http://www.service.digital.com/patches Patch file name: V40_SSRT0636U.tar Use the FTP access option, select DIGITAL_UNIX directory then choose the appropriate version directory and download the patch accordingly. Note: The README file with this patch is included as part of the V40_SSRT0636U.tar file. INSTALLATION INSTRUCTIONS These installation instructions apply to all versions of V4.0X Tru64 Unix. Notice this patch includes two named objects and specific instructions for installing each of them. Assume the patch files are in the directory /patches. A kernel rebuild is not required but a system reboot is recommended. Stop named process. As root, # cd /sbin # mv named named.orig # cp /patches/v40x_named ./named # chown bin:bin named # chmod 755 named # cd /usr/sbin # mv named named.orig # cp /patches/v40x_usr_named ./named # chown bin:bin named # chmod 755 named Reboot system or restart named. Additional Considerations: If you need further information, please contact your normal Compaq Services support channel. Compaq appreciates your cooperation and patience. We regret any inconvenience applying this information may cause. As always, Compaq urges you to periodically review your system management and security procedures. Compaq will continue to review and enhance the security features of its products and work with customers to maintain and improve the security and integrity of their systems. ------------------------------------------------------------------------- Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is subject to change without notice. Copyright Compaq Computer Corporation, 2000. Unpublished Rights Reserved Under the Copyright Laws of the United States. ------------------------------------------------------------------------- ATTACHMENT: *NOTE: This information only applies to currently supported versions. The following are all of the reported Bind issues described in the recent postings, how it affects Compaq Tru64 Unix, and any possible workarounds. TCP/IP installations for Compaq's OpenVMS Alpha and OpenVMS VAX are not Vulnerable to these reported problems. #1_______________ Name: "nxt bug" Severity: CRITICAL Attack type: remote access Compaq Tru64 UNIX products are not vulnerable to this attack. #2_______________ Name: "solinger bug" Severity: SERIOUS Attack type: Denial of service Compaq Tru64 Unix 5.0 is vulnerable to this attack. At this time no acceptable workaround is available, but Compaq is working on a patch. #3_______________ Name: "fdmax bug" Severity: SERIOUS Attack type: Denial of service Compaq Tru64 Unix 5.0 is vulnerable to this attack. Compaq is currently working on a patch. In the mean time, a workaround is available: -- add the following statement to the "options" section in named.conf { files #; } where # is less then 4096 (for V5.0 systems) #4_______________ Name: "sig bug" Severity: SERIOUS Attack type: Denial of service Compaq Tru64 UNIX products are not vulnerable to this attack. #5_______________ Name: "naptr bug" Severity: MINOR Attack type: Denial of service Compaq Tru64 Unix 5.0 is vulnerable to this attack and Compaq is currently working on a patch. In the mean time a workaround is available: -- Make sure that permission level required to modify zone files is the same or higher then that of a DNS server. Note: Typical permissions on zone files should be 0444 (owner read, group read, all read) and owned by the same user who owns 'named' executable. #6_______________ Name: "maxdname bug" Severity: MINOR Attack type: Denial of service Compaq Tru64 Unix products are vulnerable to this attack. Compaq has provided a patch SSRT0636U.tar for Tru64 UNIX V4.0D through V4.0F



This patch can be found at any of these sites:

Colorado Site
Georgia Site



Files on this server are as follows:

v40_ssrt0636u.README
v40_ssrt0636u.CHKSUM
v40_ssrt0636u.tar

privacy and legal statement