search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Multiple Sun RPC-based libc implementations fails to provide time-out mechanism when reading data from TCP connections

Vulnerability Note VU#266817

Original Release Date: 2002-11-04 | Last Revised: 2003-04-09

Overview

A denial-of-service vulnerability exists in multiple vendor Sun RPC-based libc implementations.

Description

Multiple vendor Sun RPC-based libc implementations fail to properly read data from TCP connections. As a result, a remote attacker can deny service to system daemons.

Impact

A remote attacker can connect to a vulnerable service and cause the service to hang.

Solution

Apply a vendor patch when available.

Vendor Information

266817
 

Apple Computer Inc. Affected

Notified:  October 07, 2002 Updated: November 18, 2002

Status

Affected

Vendor Statement

Affected systems: Mac OS X 10.0 to 10.2.1 & Mac OS X Server 10.0 to 10.2.1

This is fixed in Mac OS X 10.2.2 and Mac OS X Server 10.2.2.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

GNU glibc Affected

Updated:  November 04, 2002

Status

Affected

Vendor Statement

glibc 2.3.1 and previous releases are vulnerable. No fix is available yet.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

IBM Affected

Notified:  October 07, 2002 Updated: January 15, 2003

Status

Affected

Vendor Statement

The AIX operating system is vulnerable to the SUN RPC libc DOS attack, as mentioned above, in releases 4.3.3, 5.1.0 and 5.2.0.

The following APARs will be available for this fix:

APAR number for AIX 4.3.3: IY36463 (available approx. 11/27/2002)
APAR number for AIX 5.1.0: IY36507 (available approx. 4/28/2003)
APAR number for AIX 5.2.0: IY36854 (available approx. 4/28/2003)

The APARs can be downloaded using the link below and then following the links for your release level.

http://techsupport.services.ibm.com/rs6k/fixes.html

An efix is available for this issue and is available from the following URL:

ftp://ftp.software.ibm.com/aix/efixes/security/rpc_efix.tar.Z

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

SGI Affected

Updated:  November 08, 2002

Status

Affected

Vendor Statement

-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________
                         SGI Security Advisory

Title    : Potential Denial of Service Vulnerability in RPC-based libc
Number   : 20021103-01-P
Date     : November 7, 2002
Reference: CERT VU#266817
Reference: CVE CAN-2002-1265
Reference: SGI BUGS 852333 and 871325
Fixed in : IRIX 6.5.18
Fixed in : SGI PATCHES 4838, 4839, 4842, 4843, 4840, 4845, 4841, and 4846
______________________________________________________________________________

- -----------------------
- --- Issue Specifics ---
- -----------------------

It's been reported that SGI IRIX's Sun RPC-based libc implementation fails
to provide an adequate time-out mechanism when reading data from TCP
connections.  As a result, a remote attacker can deny service to system
daemons.

See http://www.kb.cert.org/vuls/id/266817 for additional details.

This vulnerability has been assigned the following CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1265

SGI has investigated the issue and recommends the following steps for
neutralizing the exposure.  It is HIGHLY RECOMMENDED that these measures be
implemented on ALL vulnerable SGI systems.

These issues have been corrected with patches and in IRIX 6.5.18.


- --------------
- --- Impact ---
- --------------

The libc library is installed by default on IRIX 6.5 systems as part of
eoe.sw.base.

To determine the version of IRIX you are running, execute the following
command:

  # /bin/uname -R

That will return a result similar to the following:

  # 6.5 6.5.16f

The first number ("6.5") is the release name, the second ("6.5.16f" in this
case) is the extended release name.  The extended release name is the
"version" we refer to throughout this document.


- ----------------------------
- --- Temporary Workaround ---
- ----------------------------

Apart from not running Sun RPC services, there is no effective workaround
available for this vulnerability.  SGI recommends either upgrading to IRIX
6.5.18 or later, or installing the appropriate patch from the listing below.


- ----------------
- --- Solution ---
- ----------------

SGI has provided a series of patches for these vulnerabilities. Our
recommendation is to upgrade to IRIX 6.5.18 or later, or install the
appropriate patch.

   OS Version     Vulnerable?     Patch #      Other Actions
  ----------     -----------     -------      -------------
  IRIX 3.x        unknown                     Note 1
  IRIX 4.x        unknown                     Note 1
  IRIX 5.x        unknown                     Note 1
  IRIX 6.0.x      unknown                     Note 1
  IRIX 6.1        unknown                     Note 1
  IRIX 6.2        unknown                     Note 1
  IRIX 6.3        unknown                     Note 1
  IRIX 6.4        unknown                     Note 1
  IRIX 6.5          yes                       Notes 2 & 3
  IRIX 6.5.1        yes                       Notes 2 & 3
  IRIX 6.5.2        yes                       Notes 2 & 3
  IRIX 6.5.3        yes                       Notes 2 & 3
  IRIX 6.5.4        yes                       Notes 2 & 3
  IRIX 6.5.5        yes                       Notes 2 & 3
  IRIX 6.5.6        yes                       Notes 2 & 3
  IRIX 6.5.7        yes                       Notes 2 & 3
  IRIX 6.5.8        yes                       Notes 2 & 3
  IRIX 6.5.9        yes                       Notes 2 & 3
  IRIX 6.5.10       yes                       Notes 2 & 3
  IRIX 6.5.11       yes                       Notes 2 & 3
  IRIX 6.5.12       yes                       Notes 2 & 3
  IRIX 6.5.13       yes                       Notes 2 & 3
  IRIX 6.5.14m      yes            4838       Notes 2 & 3
  IRIX 6.5.14f      yes            4839       Notes 2 & 3
  IRIX 6.5.15m      yes            4842       Notes 2 & 3
  IRIX 6.5.15f      yes            4843       Notes 2 & 3
  IRIX 6.5.16m      yes            4840       Notes 2 & 3
  IRIX 6.5.16f      yes            4845       Notes 2 & 3
  IRIX 6.5.17m      yes            4841       Notes 2 & 3
  IRIX 6.5.17f      yes            4846       Notes 2 & 3
  IRIX 6.5.18        no


   NOTES

     1) This version of the IRIX operating has been retired. Upgrade to an
       actively supported IRIX operating system.  See
       
http://support.sgi.com/irix/news/index.html#policy for more
       information.

     2) If you have not received an IRIX 6.5.X CD for IRIX 6.5, contact your
       SGI Support Provider or URL:
http://support.sgi.com/irix/swupdates/
       IRIX Maintenance releases can be downloaded from:
       
http://support.sgi.com/colls/patches/tools/relstream/index.html

     3) Upgrade to IRIX 6.5.18 or later.

                ##### Patch File Checksums ####

The actual patch will be a tar file containing the following files:
Filename:                 README.patch.4838
Algorithm #1 (sum -r):    19885 9 README.patch.4838
Algorithm #2 (sum):       13097 9 README.patch.4838
MD5 checksum:             7078E8BE364B66AD17884D5945DC4CB9

Filename:                 patchSG0004838
Algorithm #1 (sum -r):    24098 8 patchSG0004838
Algorithm #2 (sum):       6796 8 patchSG0004838
MD5 checksum:             6F0A4437FA7FEDCB9FBA2F71BF809241

Filename:                 patchSG0004838.dev_sw
Algorithm #1 (sum -r):    17117 2818 patchSG0004838.dev_sw
Algorithm #2 (sum):       18437 2818 patchSG0004838.dev_sw
MD5 checksum:             FED63E719498CA1B3AD8615A9568CC2D

Filename:                 patchSG0004838.eoe_sw
Algorithm #1 (sum -r):    30194 14114 patchSG0004838.eoe_sw
Algorithm #2 (sum):       41513 14114 patchSG0004838.eoe_sw
MD5 checksum:             98573E1526D6C9675ED8108769D4F385

Filename:                 patchSG0004838.eoe_sw64
Algorithm #1 (sum -r):    43406 5399 patchSG0004838.eoe_sw64
Algorithm #2 (sum):       32065 5399 patchSG0004838.eoe_sw64
MD5 checksum:             DA06569D206C45411DEF7E0C5818204E

Filename:                 patchSG0004838.idb
Algorithm #1 (sum -r):    51210 9 patchSG0004838.idb
Algorithm #2 (sum):       24509 9 patchSG0004838.idb
MD5 checksum:             99F8DFD00B6093E6B13D3101522B162A

Filename:                 patchSG0004838.nfs_sw
Algorithm #1 (sum -r):    12748 116 patchSG0004838.nfs_sw
Algorithm #2 (sum):       12251 116 patchSG0004838.nfs_sw
MD5 checksum:             D1230952ADBB05C53AF20138EFF3690A


Filename:                 README.patch.4839
Algorithm #1 (sum -r):    14005 9 README.patch.4839
Algorithm #2 (sum):       13201 9 README.patch.4839
MD5 checksum:             46A8E945CBCC8BCA46FF7FD9D1EA6910

Filename:                 patchSG0004839
Algorithm #1 (sum -r):    34628 8 patchSG0004839
Algorithm #2 (sum):       10416 8 patchSG0004839
MD5 checksum:             5977417007A971698B094DF1B817FB6F

Filename:                 patchSG0004839.dev_sw
Algorithm #1 (sum -r):    41960 2875 patchSG0004839.dev_sw
Algorithm #2 (sum):       39191 2875 patchSG0004839.dev_sw
MD5 checksum:             2A67C5A6F62548AFFEFA8589DD64AF27

Filename:                 patchSG0004839.eoe_sw
Algorithm #1 (sum -r):    42870 14337 patchSG0004839.eoe_sw
Algorithm #2 (sum):       61013 14337 patchSG0004839.eoe_sw
MD5 checksum:             348F4806AB2030B734354E9DBB7A7416

Filename:                 patchSG0004839.eoe_sw64
Algorithm #1 (sum -r):    27069 5458 patchSG0004839.eoe_sw64
Algorithm #2 (sum):       53826 5458 patchSG0004839.eoe_sw64
MD5 checksum:             D5C1FB6A8B3FE06DEC02E884DA92FB50

Filename:                 patchSG0004839.idb
Algorithm #1 (sum -r):    25993 10 patchSG0004839.idb
Algorithm #2 (sum):       48707 10 patchSG0004839.idb
MD5 checksum:             A02EA03F18092C44F80DD4BCA8B96A34

Filename:                 patchSG0004839.nfs_sw
Algorithm #1 (sum -r):    07622 116 patchSG0004839.nfs_sw
Algorithm #2 (sum):       17748 116 patchSG0004839.nfs_sw
MD5 checksum:             8708378B609033A8341B717CC5008BD1


Filename:                 README.patch.4840
Algorithm #1 (sum -r):    20515 9 README.patch.4840
Algorithm #2 (sum):       58541 9 README.patch.4840
MD5 checksum:             3D64AB943625700D8A7D17DA984EE552

Filename:                 patchSG0004840
Algorithm #1 (sum -r):    33589 7 patchSG0004840
Algorithm #2 (sum):       8028 7 patchSG0004840
MD5 checksum:             17DF232BE1999A657450C4AE6425E53D

Filename:                 patchSG0004840.dev_sw
Algorithm #1 (sum -r):    58282 2826 patchSG0004840.dev_sw
Algorithm #2 (sum):       36641 2826 patchSG0004840.dev_sw
MD5 checksum:             0BD37AE226BE29536481AB41A5B01C7D

Filename:                 patchSG0004840.eoe_sw
Algorithm #1 (sum -r):    61024 13972 patchSG0004840.eoe_sw
Algorithm #2 (sum):       63438 13972 patchSG0004840.eoe_sw
MD5 checksum:             8DE1DBF47D8B30A8C85BFAF4441E193E

Filename:                 patchSG0004840.eoe_sw64
Algorithm #1 (sum -r):    44518 5364 patchSG0004840.eoe_sw64
Algorithm #2 (sum):       13550 5364 patchSG0004840.eoe_sw64
MD5 checksum:             404D699F3D639A4B27F9CD203202DE96

Filename:                 patchSG0004840.idb
Algorithm #1 (sum -r):    44412 9 patchSG0004840.idb
Algorithm #2 (sum):       24146 9 patchSG0004840.idb
MD5 checksum:             04D9723849742C3247EC2C1794887C95

Filename:                 patchSG0004840.nfs_sw
Algorithm #1 (sum -r):    52254 115 patchSG0004840.nfs_sw
Algorithm #2 (sum):       57763 115 patchSG0004840.nfs_sw
MD5 checksum:             AFE6A163705946DD64FBC771402672BE


Filename:                 README.patch.4841
Algorithm #1 (sum -r):    39516 8 README.patch.4841
Algorithm #2 (sum):       51942 8 README.patch.4841
MD5 checksum:             0DF3A6DD4089A091107B85F1C452B4FD

Filename:                 patchSG0004841
Algorithm #1 (sum -r):    21644 7 patchSG0004841
Algorithm #2 (sum):       26440 7 patchSG0004841
MD5 checksum:             170C62A295C551DDAF9F1B2AFCB5CC6F

Filename:                 patchSG0004841.dev_sw
Algorithm #1 (sum -r):    55759 2871 patchSG0004841.dev_sw
Algorithm #2 (sum):       18216 2871 patchSG0004841.dev_sw
MD5 checksum:             35CD9FC24D8B6C5336AD2E92491D7CB1

Filename:                 patchSG0004841.eoe_sw
Algorithm #1 (sum -r):    55359 14385 patchSG0004841.eoe_sw
Algorithm #2 (sum):       13255 14385 patchSG0004841.eoe_sw
MD5 checksum:             D78BD738AC236A1E365C951C694E7DBF

Filename:                 patchSG0004841.eoe_sw64
Algorithm #1 (sum -r):    11901 5507 patchSG0004841.eoe_sw64
Algorithm #2 (sum):       1227 5507 patchSG0004841.eoe_sw64
MD5 checksum:             0ABBC1280C1C575E26703F99E2B95679

Filename:                 patchSG0004841.idb
Algorithm #1 (sum -r):    35148 9 patchSG0004841.idb
Algorithm #2 (sum):       24716 9 patchSG0004841.idb
MD5 checksum:             72DF4286A116FE33989B57C73CA8491A

Filename:                 patchSG0004841.nfs_sw
Algorithm #1 (sum -r):    01746 115 patchSG0004841.nfs_sw
Algorithm #2 (sum):       45471 115 patchSG0004841.nfs_sw
MD5 checksum:             2E4FACCCF7FBFD8C4BE97CFB9B04964E


Filename:                 README.patch.4842
Algorithm #1 (sum -r):    14274 9 README.patch.4842
Algorithm #2 (sum):       163 9 README.patch.4842
MD5 checksum:             EA36BFA20213B334DA8629D63776A58A

Filename:                 patch4842.chksums.only
Algorithm #1 (sum -r):    21612 1 patch4842.chksums.only
Algorithm #2 (sum):       12946 1 patch4842.chksums.only
MD5 checksum:             90D3A42670B02F2694AF9D81606EB121

Filename:                 patch4842.pgp.and.chksums
Algorithm #1 (sum -r):    10982 1 patch4842.pgp.and.chksums
Algorithm #2 (sum):       36306 1 patch4842.pgp.and.chksums
MD5 checksum:             7B754813CC95136AB0BABD79D0A6DD98

Filename:                 patchSG0004842
Algorithm #1 (sum -r):    33358 8 patchSG0004842
Algorithm #2 (sum):       56140 8 patchSG0004842
MD5 checksum:             2CF724DB759B31426CC6449C4B482643

Filename:                 patchSG0004842.dev_sw
Algorithm #1 (sum -r):    64975 2819 patchSG0004842.dev_sw
Algorithm #2 (sum):       54094 2819 patchSG0004842.dev_sw
MD5 checksum:             EFCDC46B2D915E443987E76FD558BBCE

Filename:                 patchSG0004842.eoe_sw
Algorithm #1 (sum -r):    04239 13999 patchSG0004842.eoe_sw
Algorithm #2 (sum):       5063 13999 patchSG0004842.eoe_sw
MD5 checksum:             42BA5415EDBF8BF87BF1CEF940297176

Filename:                 patchSG0004842.eoe_sw64
Algorithm #1 (sum -r):    62079 5370 patchSG0004842.eoe_sw64
Algorithm #2 (sum):       15526 5370 patchSG0004842.eoe_sw64
MD5 checksum:             C05E2C12ABD1A8B4186B4D1D04227AE9

Filename:                 patchSG0004842.idb
Algorithm #1 (sum -r):    56186 9 patchSG0004842.idb
Algorithm #2 (sum):       36284 9 patchSG0004842.idb
MD5 checksum:             DFD4AE06B37ABCE5DC8B1E7D0E4D593C


Filename:                 README.patch.4843
Algorithm #1 (sum -r):    24801 9 README.patch.4843
Algorithm #2 (sum):       184 9 README.patch.4843
MD5 checksum:             B8FF9691288E65F9E0F3E0D033BA03B9

Filename:                 patchSG0004843
Algorithm #1 (sum -r):    38630 8 patchSG0004843
Algorithm #2 (sum):       45967 8 patchSG0004843
MD5 checksum:             E9F5395B41BB98DA493F95B6740A40C0

Filename:                 patchSG0004843.dev_sw
Algorithm #1 (sum -r):    57071 2875 patchSG0004843.dev_sw
Algorithm #2 (sum):       47966 2875 patchSG0004843.dev_sw
MD5 checksum:             2352B26245F960BD74EE560A32BD09AC

Filename:                 patchSG0004843.eoe_sw
Algorithm #1 (sum -r):    54319 14237 patchSG0004843.eoe_sw
Algorithm #2 (sum):       9088 14237 patchSG0004843.eoe_sw
MD5 checksum:             03D46304F9D281FE3EBB4269129ED71A

Filename:                 patchSG0004843.eoe_sw64
Algorithm #1 (sum -r):    53290 5426 patchSG0004843.eoe_sw64
Algorithm #2 (sum):       45901 5426 patchSG0004843.eoe_sw64
MD5 checksum:             455F0E5F967003BF5C193728AC027324

Filename:                 patchSG0004843.idb
Algorithm #1 (sum -r):    25411 9 patchSG0004843.idb
Algorithm #2 (sum):       36397 9 patchSG0004843.idb
MD5 checksum:             E9F6235ADFA442C7A8388785D7AE984A

Filename:                 patchSG0004843.nfs_sw
Algorithm #1 (sum -r):    07004 115 patchSG0004843.nfs_sw
Algorithm #2 (sum):       7005 115 patchSG0004843.nfs_sw
MD5 checksum:             8355903908696CF88F6C8474B1441E5F


Filename:                 README.patch.4845
Algorithm #1 (sum -r):    19621 9 README.patch.4845
Algorithm #2 (sum):       63174 9 README.patch.4845
MD5 checksum:             5D7D0872F054F678FC73ADD9A7927A0B

Filename:                 patchSG0004845
Algorithm #1 (sum -r):    60677 7 patchSG0004845
Algorithm #2 (sum):       13336 7 patchSG0004845
MD5 checksum:             7F3ED1EC3C69BAA0F684CE257ABAA9DE

Filename:                 patchSG0004845.dev_sw
Algorithm #1 (sum -r):    64467 2870 patchSG0004845.dev_sw
Algorithm #2 (sum):       36886 2870 patchSG0004845.dev_sw
MD5 checksum:             DF9B3BE33373A9B5F310C771DA9919FC

Filename:                 patchSG0004845.eoe_sw
Algorithm #1 (sum -r):    14438 14238 patchSG0004845.eoe_sw
Algorithm #2 (sum):       52196 14238 patchSG0004845.eoe_sw
MD5 checksum:             0752B61F0C5F78165B0864A143F12F5D

Filename:                 patchSG0004845.eoe_sw64
Algorithm #1 (sum -r):    61870 5427 patchSG0004845.eoe_sw64
Algorithm #2 (sum):       63001 5427 patchSG0004845.eoe_sw64
MD5 checksum:             1FD7650F3A0CA53984F55C97422B6FA5

Filename:                 patchSG0004845.idb
Algorithm #1 (sum -r):    17076 9 patchSG0004845.idb
Algorithm #2 (sum):       24881 9 patchSG0004845.idb
MD5 checksum:             E78AB9246B89958F691F3F7F3C177D2C

Filename:                 patchSG0004845.nfs_sw
Algorithm #1 (sum -r):    29287 115 patchSG0004845.nfs_sw
Algorithm #2 (sum):       59944 115 patchSG0004845.nfs_sw
MD5 checksum:             FA80429C42EA051F4F03173C27605BC6


Filename:                 README.patch.4846
Algorithm #1 (sum -r):    11014 8 README.patch.4846
Algorithm #2 (sum):       53086 8 README.patch.4846
MD5 checksum:             2C079AD39C98F6D6EE41F37674FD894A

Filename:                 patchSG0004846
Algorithm #1 (sum -r):    62823 7 patchSG0004846
Algorithm #2 (sum):       15205 7 patchSG0004846
MD5 checksum:             3FD1F15E1049B60567936DD178615052

Filename:                 patchSG0004846.dev_sw
Algorithm #1 (sum -r):    54372 2915 patchSG0004846.dev_sw
Algorithm #2 (sum):       26322 2915 patchSG0004846.dev_sw
MD5 checksum:             81EB7CA9497F9A3B9F517E0AAC513C2C

Filename:                 patchSG0004846.eoe_sw
Algorithm #1 (sum -r):    57605 14590 patchSG0004846.eoe_sw
Algorithm #2 (sum):       20324 14590 patchSG0004846.eoe_sw
MD5 checksum:             7C8C11F425B9AFA3306A64CFD1C456DE

Filename:                 patchSG0004846.eoe_sw64
Algorithm #1 (sum -r):    47150 5597 patchSG0004846.eoe_sw64
Algorithm #2 (sum):       46479 5597 patchSG0004846.eoe_sw64
MD5 checksum:             D9D3B4B3FEEC03E66A26C28F62873050

Filename:                 patchSG0004846.idb
Algorithm #1 (sum -r):    55346 9 patchSG0004846.idb
Algorithm #2 (sum):       24828 9 patchSG0004846.idb
MD5 checksum:             5CB936EAE37711BC192D278A6673D9FE

Filename:                 patchSG0004846.nfs_sw
Algorithm #1 (sum -r):    19473 115 patchSG0004846.nfs_sw
Algorithm #2 (sum):       45973 115 patchSG0004846.nfs_sw
MD5 checksum:             048B53C03E380E4A1370BC573078FBA2


- ------------------------
- --- Acknowledgments ----
- ------------------------

SGI wishes to thank CERT and the users of the Internet Community at large
for their assistance in this matter.

- -------------
- --- Links ---
- -------------

SGI Security Advisories can be found at:
http://www.sgi.com/support/security/ and
ftp://patches.sgi.com/support/free/security/advisories/

SGI Security Patches can be found at:
http://www.sgi.com/support/security/ and
ftp://patches.sgi.com/support/free/security/patches/

SGI patches for IRIX can be found at the following patch servers:
http://support.sgi.com/irix/ and ftp://patches.sgi.com/

SGI freeware updates for IRIX can be found at:
http://freeware.sgi.com/

SGI fixes for SGI open sourced code can be found on:
http://oss.sgi.com/projects/

SGI patches and RPMs for Linux can be found at:
http://support.sgi.com/linux/ or
http://oss.sgi.com/projects/sgilinux-combined/download/security-fixes/

SGI patches for Windows NT or 2000 can be found at:
http://support.sgi.com/nt/

IRIX 5.2-6.4 Recommended/Required Patch Sets can be found at:
http://support.sgi.com/irix/ and ftp://patches.sgi.com/support/patchset/

IRIX 6.5 Maintenance Release Streams can be found at:
http://support.sgi.com/colls/patches/tools/relstream/index.html

IRIX 6.5 Software Update CDs can be obtained from:
http://support.sgi.com/irix/swupdates/

The primary SGI anonymous FTP site for security advisories and patches is
patches.sgi.com (216.32.174.211).  Security advisories and patches are
located under the URL
ftp://patches.sgi.com/support/free/security/

For security and patch management reasons, ftp.sgi.com (mirrors
patches.sgi.com security FTP repository) lags behind and does not do a
real-time update.


- -----------------------------------------
- --- SGI Security Information/Contacts ---
- -----------------------------------------

If there are questions about this document, email can be sent to
security-info@sgi.com.

                      ------oOo------

SGI provides security information and patches for use by the entire SGI
community.  This information is freely available to any person needing the
information and is available via anonymous FTP and the Web.

The primary SGI anonymous FTP site for security advisories and patches is
patches.sgi.com (216.32.174.211).  Security advisories and patches are
located under the URL
ftp://patches.sgi.com/support/free/security/

The SGI Security Headquarters Web page is accessible at the URL:
http://www.sgi.com/support/security/

For issues with the patches on the FTP sites, email can be sent to
security-info@sgi.com.

For assistance obtaining or working with security patches, please
contact your SGI support provider.

                      ------oOo------

SGI provides a free security mailing list service called wiretap and
encourages interested parties to self-subscribe to receive (via email) all
SGI Security Advisories when they are released. Subscribing to the mailing
list can be done via the Web
(
http://www.sgi.com/support/security/wiretap.html) or by sending email to
SGI as outlined below.

% mail wiretap-request@sgi.com
subscribe wiretap <YourEmailAddress such as aaanalyst@sgi.com >
end
^d

In the example above, <YourEmailAddress> is the email address that you wish
the mailing list information sent to.  The word end must be on a separate
line to indicate the end of the body of the message. The control-d (^d) is
used to indicate to the mail program that you are finished composing the
mail message.


                      ------oOo------

SGI provides a comprehensive customer World Wide Web site. This site is
located at
http://www.sgi.com/support/security/ .

                      ------oOo------

If there are general security questions on SGI systems, email can be sent to
security-info@sgi.com.

For reporting *NEW* SGI security issues, email can be sent to
security-alert@sgi.com or contact your SGI support provider.  A support
contract is not required for submitting a security report.

______________________________________________________________________________
     This information is provided freely to all interested parties
     and may be redistributed provided that it is not altered in any
     way, SGI is appropriately credited and the document retains and
     includes its valid PGP signature.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBPcr58bQ4cFApAP75AQH6TAP8CJWPoJCSaAaqmsQ8pm7A+hekQoW62HQs
YtKImdiqCWmNQRZll6p5kMVYusnRl84UAgwkJM68Hu3kSVL7PyMtWbjE+L/eHfWC
7X+bgN3Id9x8ExLtmt0Qta/OmjuMzg8oigfI9PikAWrTjTArlR8SzHyOBGtA27eB
HTnj+yKw+OY=
=7lr/
-----END PGP SIGNATURE-----

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Sun Microsystems Inc. Affected

Notified:  October 07, 2002 Updated: January 28, 2003

Status

Affected

Vendor Statement

Sun confirms that this denial-of-service vulnerability does affect the following supported versions of Solaris:

Solaris 2.6 and 7

Solaris 8 and 9 are not affected by this issue.

Patches are available for Solaris 2.6 and 7 and are listed in a Sun Alert soon to be available from:

http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fsalert/50391

Sun patches are available from:

http://sunsolve.sun.com/securitypatch

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

BSDI Unknown

Notified:  October 07, 2002 Updated: October 08, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Conectiva Unknown

Notified:  October 07, 2002 Updated: October 07, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Cray Inc. Unknown

Notified:  October 07, 2002 Updated: October 30, 2002

Status

Unknown

Vendor Statement

Cray, Inc. may be vulnerable and has opened sprs 723750 and 723751 to track this issue.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Data General Unknown

Notified:  October 07, 2002 Updated: October 07, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Debian Unknown

Notified:  October 07, 2002 Updated: October 14, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Engarde Unknown

Notified:  October 07, 2002 Updated: October 08, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

FreeBSD Unknown

Notified:  October 07, 2002 Updated: October 08, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Fujitsu Unknown

Notified:  October 07, 2002 Updated: October 08, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Hewlett-Packard Company Unknown

Notified:  October 07, 2002 Updated: October 14, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

MandrakeSoft Unknown

Notified:  October 07, 2002 Updated: October 08, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

MontaVista Software Unknown

Notified:  October 07, 2002 Updated: October 07, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

NEC Corporation Unknown

Notified:  October 07, 2002 Updated: October 07, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

NetBSD Unknown

Notified:  October 07, 2002 Updated: October 14, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

OpenBSD Unknown

Notified:  October 07, 2002 Updated: October 07, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Openwall GNU/*/Linux Unknown

Notified:  October 07, 2002 Updated: October 08, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Red Hat Inc. Unknown

Notified:  October 07, 2002 Updated: October 08, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Sequent Unknown

Notified:  October 07, 2002 Updated: October 07, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Sony Corporation Unknown

Notified:  October 07, 2002 Updated: October 08, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

SuSE Inc. Unknown

Notified:  October 07, 2002 Updated: October 07, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

The SCO Group (SCO Linux) Unknown

Notified:  October 07, 2002 Updated: October 07, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

The SCO Group (SCO UnixWare) Unknown

Notified:  October 07, 2002 Updated: October 07, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Unisys Unknown

Notified:  October 07, 2002 Updated: October 14, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Wind River Systems Inc. Unknown

Notified:  October 07, 2002 Updated: October 07, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Wirex Unknown

Notified:  October 07, 2002 Updated: October 14, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

View all 29 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2002-1265
Severity Metric: 10.31
Date Public: 2002-11-04
Date First Published: 2002-11-04
Date Last Updated: 2003-04-09 19:10 UTC
Document Revision: 22

Sponsored by CISA.