TITLE: (SSRT-541) Potential Security Vulnerability CDE, NIS and NFS New Kit Date: 22-MAY-2002 Modification Date: Not Applicable Modification Type: Updated Kit Supersedes T64V50AB17-C0018301-13396-ES-20020226 Copyright (c) Compaq Computer Corporation 2002. All rights reserved. PRODUCT: Tru64 UNIX [R] 5.0A SOURCE: Compaq Computer Corporation ECO INFORMATION: ECO Name: T64V50AB17-C0018303-14330-ES-20020516.tar ECO Kit Approximate Size: 11MB Kit Applies To: Tru64 UNIX 5.0A PK3 (BL17) ECO Kit CHECKSUMS: /usr/bin/sum results: 09976 11130 /usr/bin/cksum results: 884928318 11397120 MD5 results: 9e59ef8aa3422019bfb0042d0b186055 SHA1 results: 8e99f50ccc48e80cf094732ab839aad8837945fc ECO KIT SUMMARY: A dupatch-based, Early Release Patch kit exists for Tru64 UNIX 5.0A that contains solutions for several CDE, NFS and NIS related potential security vulnerabilities. A number of potential security vulnerabilities have recently been discovered for CDE, libc, NIS and NFS released with Tru64 UNIX 5.0A, where under certain circumstances, system integrity may be compromised. Compaq has corrected the following potential security vulnerabilities: - CDE o dtaction potential buffer overflow (SSRT0752U) o ttsession potential buffer overflow (SSRT0753U) o dtprintinfo potential buffer overflow (SSRT0757U) CERT Vulnerability Note #860296 summarizes this potential vulnerability: http://www.kb.cert.org/vuls/id/860296 o dtprintinfo potential corefile write problem (SSRT0788U) CERT Vulnerability Note #860296 summarizes this potential vulnerability: http://www.kb.cert.org/vuls/id/860296 o dtspcd potential buffer overflow (SSRT0782U) Compaq has not been able to reproduce the problem identified in the CERT advisory for any Compaq OS. However with the information available, we are including a code change for TRU64 UNIX that will further reduce any potential overflow vulnerability. CERT Advisory CA-2001-31 and CA-2002-01 summarizes this potential vulnerability: http://www.cert.org/advisories/CA-2001-31.html http://www.cert.org/advisories/CA-2002-01.html - Environment Variable LANG and LOCPATH o libc potential environment variable corruption with LANG and LOCPATH, may cause buffer overflow (SSRT0771U) - NIS o ypbind may core during nmap portscan (SSRT0781U) - NFS o Potential packet flood denial of service (DoS) (SSRT1-26) The following customer-readable Compaq Service Advisory is also available: - Compaq Advisory: (SSRT-541) Tru64 UNIX CDE, NFS and NIS related Potential Security Vulnerabilities http://ftp.support.compaq.com/patches/.new/security.shtml The Patch Kit Installation Instructions and the Patch Summary and Release Notes documents provide patch kit installation and removal instructions and a summary of each patch. Please read these documents prior to installing patches on your system. The patches in this ERP kit will also be available in the next mainstream patch kit - Tru64 UNIX 5.0A Patch Kit 4. INSTALLATION NOTES: Install this kit with the dupatch utility that is included in the patch kit. You may need to baseline your system if you have manually changed system files on your system. The dupatch utility provides the baselining capability. INSTALLATION PREREQUISITES: You must have installed Tru64 UNIX 5.0A PK3 (BL17) prior to installing this Early Release Patch Kit. KNOWN PROBLEMS WITH THE PATCH KIT: None. RELEASE NOTES FOR T64V50AB17-C0018303-14330-ES-20020516.tar: 1 Release Notes This Early Release Patch Kit Distribution contains: - fixes that resolve the problem(s) reported in: o SSRT-541 SSRT0752U SSRT0753U SSRT0757U SSRT0771U SSRT0781U SSRT0782U SSRT0788U SSRT1-26 * for Tru64 UNIX V5.0A T64V50AAS0003-20010523.tar (BL17) The patches in this kit are being released early for general customer use. Refer to the Release Notes for a summary of each patch and installation prerequisites. Patches in this kit are installed by running dupatch from the directory in which the kit was untarred. For example, as root on the target system: > mkdir -p /tmp/CSPkit1 > cd /tmp/CSPkit1 > > tar -xpvf DUV40D13-C0044900-1285-20000328.tar > cd patch_kit > ./dupatch 2 Special Instructions SPECIAL INSTRUCTIONS for Tru64 UNIX V5.0A Patch C183.03 - The patches in this kit REQUIRE installation of: Tru64 UNIX 5.0A Patch Kit 3 (T64V50AAS0003-20010523.tar). - Select all patches in this kit for installation. - The patches in this kit deliver files for mandatory and optional install Operating System subsets. The following patches from this ERP kit will install on all 5.0A systems when the mandatory-install OS subsets are installed AND the requisite 5.0A PK3 patches are installed: --------------------------------------------------------------------- Patch ID MANDATORY OS Subsets --------------------------------------------------------------------- C 183.03 OSFCDEMIN C 184.03 OSFBASE OSFCMPLRS OSFCLINET C 185.03 OSFX11 The following patches from this ERP kit will install when the optionally-installed subsets AND requisite 5.0A PK3 patches are installed: --------------------------------------------------------------------- Patch ID OPTIONAL OS Subsets --------------------------------------------------------------------- C 202.01 OSFCDEDEV CDE Software Development and Programming Examples(Software Development) C 203.01 OSFX11A X Window and X/Motif Static Libraries C 204.00 OSFCDEDT CDE Desktop Environment (Windowing Environment) C 205.00 OSFCDEMAIL CDE Mail Interface (Mail Applications) There are no special instructions for Tru64 UNIX V5.0A Patch C184.03 There are no special instructions for Tru64 UNIX V5.0A Patch C185.03 There are no special instructions for Tru64 UNIX V5.0A Patch C202.01 There are no special instructions for Tru64 UNIX V5.0A Patch C203.01 There are no special instructions for Tru64 UNIX V5.0A Patch C204.00 There are no special instructions for Tru64 UNIX V5.0A Patch C205.00 3 Summary of CSPatches contained in this kit Tru64 UNIX V5.0A PatchId Summary Of Fix ---------------------------------------- C183.03 Fixes for SSRT0752, SSRT0753, SSRT0757, SSRT0782, SSRT0788 C184.03 Fixes for SSRT0771U, SSRT0781U, SSRT0788U, and SSRT1-26. C185.03 Fixes for SSRT0752U and SSRT0753U. C202.01 Fixes for SSRT0752, SSRT0753, SSRT0757, SSRT0782, SSRT0788 C203.01 Fixes for SSRT0752U and SSRT0753U. C204.00 Fixes for SSRT0752U & SSRT0753U. C205.00 Fixes for SSRT0752U & SSRT0753U. 4 Additional information from Engineering None 5 Affected system files This patch delivers the following files: Tru64 UNIX V5.0A Patch C183.03 ./usr/dt/lib/libDtSvc.so CHECKSUM: 08340 625 SUBSET: OSFCDEMIN505 ./usr/dt/lib/libtt.so CHECKSUM: 39840 1351 SUBSET: OSFCDEMIN505 ./usr/dt/lib/nls/msg/C/dt.cat CHECKSUM: 49805 8 SUBSET: OSFCDEMIN505 Patch C184.03 ./shlib/.upd..libc.so CHECKSUM: 29223 1842 SUBSET: OSFBASE505 ./shlib/.upd..libc_r.so CHECKSUM: 29223 1842 SUBSET: OSFBASE505 ./usr/ccs/lib/libc.a CHECKSUM: 64175 2300 SUBSET: OSFCMPLRS505 ./usr/ccs/lib/libc_r.a CHECKSUM: 64175 2300 SUBSET: OSFCMPLRS505 ./usr/sbin/ypbind CHECKSUM: 11712 532 SUBSET: OSFCLINET505 Patch C185.03 ./usr/shlib/libXm.so CHECKSUM: 58613 2187 SUBSET: OSFX11505 Patch C202.01 ./usr/dt/lib/libDtSvc.a CHECKSUM: 39387 760 SUBSET: OSFCDEDEV505 ./usr/dt/lib/libtt.a CHECKSUM: 01471 1476 SUBSET: OSFCDEDEV505 Patch C203.01 ./usr/lib/libXm.a CHECKSUM: 10292 2341 SUBSET: OSFXLIBA505 Patch C204.00 ./usr/dt/bin/dtcalc CHECKSUM: 16106 325 SUBSET: OSFCDEDT505 ./usr/dt/bin/dtcreate CHECKSUM: 53515 231 SUBSET: OSFCDEDT505 ./usr/dt/bin/dtsession CHECKSUM: 08623 205 SUBSET: OSFCDEDT505 Patch C205.00 ./usr/dt/bin/dtmail CHECKSUM: 08333 1411 SUBSET: OSFCDEMAIL505 [R] UNIX is a registered trademark in the United States and other countries licensed exclusively through X/Open Company Limited. Copyright Compaq Computer Corporation 2002. All Rights reserved. This software is proprietary to and embodies the confidential technology of Compaq Computer Corporation. Possession, use, or copying of this software and media is authorized only pursuant to a valid written license from Compaq or an authorized sublicensor. This ECO has not been through an exhaustive field test process. Due to the experimental stage of this ECO/workaround, Compaq makes no representations regarding its use or performance. The customer shall have the sole responsibility for adequate protection and back-up data used in conjunction with this ECO/workaround.