Date: 01 March 2001
References: ESB-2000.343 ESB-2001.037 ESB-2001.038 ESB-2001.039 ESB-2001.044
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2001.088 -- COMPAQ SSRT1-38U/66U/68U/69U Security Advisory
Multiple Issues with BIND
1 March 2001
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: BIND
Vendor: ISC
Operating System: Tru64 UNIX V4.0d
Tru64 UNIX V4.0f
Tru64 UNIX V4.0g
Tru64 UNIX V5.0
Tru64 UNIX V5.0a
Tru64 UNIX V5.1
Impact: Denial of Service
Execute Arbitrary Code/Commands
User Access
Access Required: Remote
Ref: AA-2001.01
ESB-2001.044
ESB-2001.039
ESB-2001.038
ESB-2001.037
ESB-2000.343
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
** NO RESTRICTIONS FOR DISTRIBUTION **
==================================================
SOURCE: Compaq Computer Corporation
Software Security Response Team
CASE ID: SSRT1-38U, SSRT1-66U,SSRT1-68U, SSRT1-69U
TITLE: Multiple Potential Security Issues in BIND
(X-REF: CERT CA-2000-20 & CERT CA-2001-02 )
Date: 26-FEB-2001
"Compaq is broadly distributing this Security Advisory in order
to bring to the attention of users of Compaq products the
important security information contained in this Advisory.
Compaq recommends that all users determine the applicability of
this information to their individual situations and take
appropriate action.
Compaq does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently,
Compaq will not be responsible for any damages resulting from
user's use or disregard of the information provided in this
Advisory."
IMPACT:
Versions Affected: Compaq's Tru64 UNIX V4.0d, V4.0f, V4.0g,
V5.0, V5.0a, V5.1
Versions Not Affected: TCP/IP Services for Compaq OpenVMS
A number of potential security vulnerabilities have recently been
discovered for BIND released with Tru64 UNIX, where under certain
circumstances, system integrity may be compromised.
This advisory provides solution information for 6 (six) issues
spanning multiple versions of BIND 8.* and BIND 4.*
SEVERITY: HIGH
PROBLEM STATEMENT:
Several security problems were recently found in the BIND
software used by Compaq Tru64 UNIX. Specific details have been
published by a number of groups to the internet. Technical details
of these vulnerabilities are publicized by the ISC at:
http://www.isc.org/products/BIND/bind-security.html
The advisory information is not duplicated here. The purpose of
this advisory is to provide notice of remedial solutions for the
problems as it impacts Compaq Tru64 UNIX.
SOLUTION:
Compaq Tru64 UNIX engineering has provided a solutions for the
potential problems, details are included below.
NOTE: The solutions will be included in future releases of
Tru64 UNIX aggregate patch kits. Until that has happened
the kits identified should be reinstalled accordingly after an
upgrade to any affected version listed.
The patches identified are available from the Compaq FTP site
http://ftp1.support.compaq.com/public/dunix/ then choose the
version directory needed and search for the patch by name.
......................................................................
CERT VU#325431 INFOLEAK - servers may disclose
environment variables
X-REF: SSRT1-66U,SSRT1-68U,SSRT1-69U
......................................................................
Compaq Tru64 UNIX V5.1 -
patch: SSRT1-66U_v5_1.tar
Compaq Tru64 UNIX V5.0 & V5.0a -
V5.0 patch: SSRT1-68U_v5_0.tar
V5.0a patch: SSRT1-68U_v5_0a.tar
Compaq Tru64 UNIX V4.0D/F/G -
V4.0d patch: SSRT1-69U_v4_0d.tar
V4.0f patch: SSRT1-69U_v4_0f.tar
V4.0g patch: SSRT1-69U_v4_0g.tar
TCP/IP Services for Compaq OpenVMS - Not Vulnerable
......................................................................
CERT VU#572183 - BIND 4 Buffer overflow in
nslookupComplain()
X-REF: SSRT1-69U
CERT VU#868916 - BIND 4 Input validation
error in nslookupComplain()
X-REF: SSRT1-69U
......................................................................
Compaq Tru64 UNIX V5.0, V5.0a, V5.1 - Not Vulnerable
Compaq Tru64 UNIX V4.0D/F/G -
V4.0d patch: SSRT1-69U_v4_0d.tar
V4.0f patch: SSRT1-69U_v4_0f.tar
V4.0g patch: SSRT1-69U_v4_0g.tar
TCP/IP Services for Compaq OpenVMS - Not Vulnerable
......................................................................
CERT VU#196945- BIND 8 contains buffer
overflow in transaction signature handling code
X-REF: SSRT1-66U, SSRT1-68U
......................................................................
Compaq Tru64 UNIX V5.1 -
patch: SSRT1-66U_v5_1.tar
Compaq Tru64 UNIX V5.0 & V5.0a -
V5.0 patch: SSRT1-68U_v5_0.tar
V5.0a patch: SSRT1-68U_v5_0a.tar
Compaq Tru64 UNIX V4.0D/F/G - Not Vulnerable
TCP/IP Services for Compaq OpenVMS - Not Vulnerable
......................................................................
CERT CA-2000-20 - BIND 8 The "zxfr bug"
X-REF: SSRT1-38U
......................................................................
Compaq Tru64 UNIX V5.1 -
patch: SSRT1-66U_v5_1.tar
Compaq Tru64 UNIX V5.0 & V5.0a -
V5.0 patch: SSRT1-68U_v5_0.tar
V5.0a patch: SSRT1-68U_v5_0a.tar
Compaq Tru64 UNIX V4.0D/F/G - Not Vulnerable
TCP/IP Services for Compaq OpenVMS - Not Vulnerable
......................................................................
CERT CA-2000-20 - BIND 8 The "srv bug"
X-REF: SSRT1-38U
......................................................................
Compaq Tru64 UNIX V5.1 -
patch: SSRT1-66U_v5.1_tar
Compaq Tru64 UNIX V5.0 & V5.0a -
V5.0 patch: SSRT1-68U_v5_0.tar
V5.0a patch: SSRT1-68U_v5_0a.tar
Compaq Tru64 UNIX V4.0D/F/G - Not Vulnerable
TCP/IP Services for Compaq OpenVMS - Not Vulnerable
NOTE: For Compaq Tru64 UNIX V4.0e please contact your normal
Compaq Services channel.
To subscribe to automatically receive future NEW Security
Advisories from the Software Security Response Team at
Compaq via electronic mail,
Use your browser to get to the
http://www.support.compaq.com/patches/mailing-list.shtml
and sign up. Select "Security and Individual Notices" for
immediate dispatch notifications.
If you need further information, please contact your normal Compaq
Services support channel.
Compaq appreciates your cooperation and patience. We regret any
inconvenience applying this information may cause.
As always, Compaq urges you to periodically review your system
management and security procedures. Compaq will continue to
review and enhance the security features of its products and work
with customers to maintain and improve the security and integrity
of their systems.
(c) Copyright 2001 Compaq Computer Corporation. All rights reserved
- -----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>
iQA/AwUBOpvCUqgxZJFjvD74EQI4CQCdFAVJWK1Ye6k4NZpToGhMxPCFH2QAnRVz
V/wStBTQ02MAG+JtzA8N7W5G
=AqRC
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/Information/advisories.html
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
iQCVAwUBOp4ruyh9+71yA2DNAQFArwP/ahGvnB8k3OuE6czeEsWR55FBEz6DxrZh
mscIxi4LQ85fQXeBMIB7xTdRwNjy1OSk2J4+wQyNHli9NPiZ/LIMTG/ihhuWncNv
+bBbNDQDJT+Lkg7GL6OR5KJ/Of/Grt1xHJ7EihmpeAgaMnLCjBR3LLWLgxr6Y/HO
6pe86GTpaXo=
=vyYy
-----END PGP SIGNATURE-----
|