TITLE: SSRT2266 HP Tru64 UNIX IGMP Potential DoS Security Vulnerability New Kit Date: 13-NOV-2002 Modification Date: Not Applicable Modification Type: NEW KIT Copyright (c) Hewlett-Packard Company 2002. All rights reserved. PRODUCT: Tru64 UNIX [R] 4.0F SOURCE: Hewlett-Packard Company ECO INFORMATION: ECO Name: DUV40FB18-C0084500-15850-ES-20021030 ECO Kit Approximate Size: 2MB Kit Applies To: Tru64 UNIX 4.0F PK7 (BL18) ECO Kit CHECKSUMS: /usr/bin/sum results: 22234 1930 /usr/bin/cksum results: 4238422825 1976320 MD5 results: 81015904316f04469888f3104dc644e1 SHA1 results: fd26757afef78f9fa0876628495167ae85db8a2f ECO KIT SUMMARY: A dupatch-based, Early Release Patch kit exists for Tru64 UNIX 4.0F that contains solutions to the following problem(s): A potential security vulnerability has been identified in the HP Tru64 UNIX operating system that may result in a Denial of Service (DoS). This potential vulnerability may be in the form of local and remote security domain risks. The following potential vulnerability has been corrected: o SSRT2266 IGMP (Severity - High) IGMP = Internet Group Management Protocol The Patch Kit Installation Instructions and the Patch Summary and Release Notes documents provide patch kit installation and removal instructions and a summary of each patch. Please read these documents prior to installing patches on your system. The SSRT2266 patch will also be available in Tru64 UNIX 4.0F Patch Kit 8. INSTALLATION NOTES: Install this kit with the dupatch utility that is included in the patch kit. You may need to baseline your system if you have manually changed system files on your system. The dupatch utility provides the baselining capability. INSTALLATION PREREQUISITES: You must have installed Tru64 UNIX 4.0F PK7 (BL18) prior to installing this Early Release Patch Kit. SUPERSEDED PATCH LIST: This patch kit supersedes the following Tru64 UNIX patch kit: 1) SSRT-547 Tru64 UNIX Potential Security Vulnerabilities TPC/IP, FTPD, ARP 4.0F C672.01 delivered in: DUV40FB18-C0067201-15265-ES-20020827.tar The patch in the SSRT226 ERP kit is built so it will install over the patch the SSRT-547 patch. However, installation will be blocked if any other patches have been installed that affect the file(s) delivered in SSRT2266 or SSRT-547 patches. KNOWN PROBLEMS WITH THE PATCH KIT: None. RELEASE NOTES FOR DUV40FB18-C0084500-15850-ES-20021030: 1 Release Notes This Early Release Patch Kit Distribution contains: - fixes that resolve the problem(s) reported in: o 117-2-547 94433 SSRT2266 * for Digital UNIX V4.0F DUV40FB18AS0007-20020102.tar (BL18) The patches in this kit are being released early for general customer use. Refer to the Release Notes for a summary of each patch and installation prerequisites. Patches in this kit are installed by running dupatch from the directory in which the kit was untarred. For example, as root on the target system: > mkdir -p /tmp/CSPkit1 > cd /tmp/CSPkit1 > > tar -xpvf DUV40D13-C0044900-1285-20000328.tar > cd patch_kit > ./dupatch 2 Special Instructions There are no special instructions for Digital UNIX V4.0F Patch C845.00 3 Summary of CSPatches contained in this kit Digital UNIX V4.0F PatchId Summary Of Fix ---------------------------------------- C845.00 Fix for SSRT2266, IGMP, SSRT-547, Network Security 4 Additional information from Engineering None 5 Affected system files This patch delivers the following files: Digital UNIX V4.0F Patch C845.00 ./sys/BINARY/inet.mod CHECKSUM: 48588 299 SUBSET: OSFBIN440 ./usr/sbin/ftpd CHECKSUM: 62304 128 SUBSET: OSFCLINET440 [R] UNIX is a registered trademark in the United States and other countries licensed exclusively through X/Open Company Limited. Copyright Hewlett-Packard Company 2002. All Rights reserved. This software is proprietary to and embodies the confidential technology of Hewlett-Packard Company. Possession, use, or copying of this software and media is authorized only pursuant to a valid written license from Hewlett-Packard or an authorized sublicensor. This ECO has not been through an exhaustive field test process. Due to the experimental stage of this ECO/workaround, Hewlett-Packard makes no representations regarding its use or performance. The customer shall have the sole responsibility for adequate protection and back-up data used in conjunction with this ECO/workaround.