The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


IBM MSS Outside Advisory Redistribution: IBM AIX: Buffer Overflow Vulnerability in (x)ntp


<< Previous INDEX Search src / Print Next >>
Date: Wed, 18 Apr 2001 06:59:09 -0400
From: IBM MSS Advisory Service <advisory@US.IBM.COM.>
To: [email protected]
Subject: IBM MSS Outside Advisory Redistribution: IBM AIX: Buffer Overflow Vulnerability in (x)ntp

                            IBM Global Services
                         Managed Security Services
                      Outside Advisory Redistribution


----------- Forwarded Information Starts Here.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

IBM SECURITY ADVISORY

Tue Apr 10 11:15:04 CDT 2001

VULNERABILITY SUMMARY VULNERABILITY: Buffer Overflow Vulnerability in (x)ntp PLATFORMS: IBM AIX 4.3.x and 5.1 SOLUTION: Apply the emergency-fixes described below. THREAT: Malicious user could obtain root privileges, or cause a denial of service (DoS). CERT Advisory: Pending.
DETAILED INFORMATION I. Description The Network Time Protocol daemon, (x)ntp, shipped with AIX contains a buffer overflow vulnerability that allows a malicious user, local or remote, to gain root privileges. Gaining root privileges by exploiting this vulnerability appears to be somewhat difficult in practice, as knowledge of the hardware- dependent stack registers/addresses is required for different architectures. Also, there does not exist much "working room" in the size of the stack overflow that can be accomplished, requiring an especially well-crafted exploit code. An exploit has been written and made public; it is intended for use on Intel architectures to gain root access. However, it causes ntp daemon problems when run as is. A result is likely to be a denial of service (DoS). The exploit code would need to be modified for full exploitation on the RISC6000 architecture. Nonetheless, IBM has found that a vulnerability in the daemon source code does exist, and has fixed this problem. II. Impact A malicious local or remote user can use a well-crafted exploit code to gain root privileges on the attacked system, compromising the integrity of the system and its attached local network. If the malicious user is unable to gain root access, he or she could still cause a system crash (DoS) via this vulnerability. III. Solutions A. Official fix IBM is working on the following fixes which will be available soon: AIX 4.3.x and 5.1: APAR assignment pending. NOTE: Fix will not be provided for versions prior to 4.3 as these are no longer supported by IBM. Affected customers are urged to upgrade to 4.3.3 at the latest maintenance level, or to 5.1, when it becomes available. B. How to minimize the vulnerability Temporary fixes for AIX 4.3.x and 5.1 systems are available. The temporary fixes can be downloaded via ftp from: ftp://aix.software.ibm.com/aix/efixes/security/xntpd_efix.tar.Z The efix tarball consists of two patched xntpd binaries, one for AIX 4.3.x systems (xntpd.43) and one for AIX 5.1 (scheduled for release soon; binary is xntpd.51). A copy of this Advisory is also included. These temporary fixes have not been fully regression tested; thus, IBM does not warrant the fully correct functioning of the efix. Customers install the efix and operate the modified version of AIX at their own risk. To proceed with efix installation: First, verify the MD5 cryptographic hash sums of each efix files you obtain from unpacking the efix tarball with those given below. These should match exactly; if they do not, double check the hash results and the download site address. If OK, contact IBM AIX Security at [email protected] and describe the discrepancy. Filename sum md5
xntpd.43 15698 254 66f9e21a02267eaead6f7f020f16ce8c xntpd.51 56685 267 6a2c7260a45c3849752f976f12c1881c Efix Installation Instructions: -------------------------------
1. Become root, if not already done. 2. In a scratch or tmp directory, uncompress and untar the efix: a. uncompress xntpd_efix.tar.Z b. tar -xvf xntpd_efix.tar 3. If you are running an AIX 4.3.x system, copy the xntpd.43 file to /usr/sbin. Do the same if you have AIX 5.1 running, except copy the xntpd.51 file. 4. Stop the ntp daemon if it is currently running: a. stopsrc -s xntpd 5. Make a backup copy of the existing xntpd binary package in case something goes wrong with the installation of the efix: a. cp /usr/sbin/xntpd /usr/sbin/xntpd.original 6. Now copy the efix binary to take the place of the original xntpd: a. cp /usr/sbin/xntpd.43 (or xntpd.51, as appropriate) /usr/sbin/xntpd. 7. Check to be certain that the new xntpd is executable by root and is assigned proper permissions otherwise. 8. Restart the ntp daemon: a. startsrc -s xntpd IV. Obtaining Fixes IBM AIX APARs may be ordered using Electronic Fix Distribution (via the FixDist program), or from the IBM Support Center. For more information on FixDist, and to obtain fixes via the Internet, please reference http://techsupport.services.ibm.com/rs6k/fixes.html or send email to "[email protected]" with the word "FixDist" in the "Subject:" line. To facilitate ease of ordering all security related APARs for each AIX release, security fixes are periodically bundled into a cumulative APAR. For more information on these cumulative APARs including last update and list of individual fixes, send email to "[email protected]" with the word "subscribe Security_APARs" in the "Subject:" line. V. Acknowledgements Many thanks to Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL.> for discovering this vulnerability, and to the CERT/CC and SecurityFocus' BUGTRAQ for posting notices of this security problem. VI. Contact Information Comments regarding the content of this announcement can be directed to: [email protected] To request the PGP public key that can be used to encrypt new AIX security vulnerabilities, send email to [email protected] with a subject of "get key". If you would like to subscribe to the AIX security newsletter, send a note to [email protected] with a subject of "subscribe Security". To cancel your subscription, use a subject of "unsubscribe Security". To see a list of other available subscriptions, use a subject of "help". IBM and AIX are a registered trademark of International Business Machines Corporation. All other trademarks are property of their respective holders. -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3 iQA/AwUBOtWVhcXrSKQHhgFwEQKJ4gCgtmhQJ6WouopVi0pPcnlnu/Z67NcAoLiD 2wvKo+hjNY3MqAWw+QjUEOuA =9nPJ -----END PGP SIGNATURE----- ----------- Forwarded Information Ends Here.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру