Date: 20 December 2007
References: ESB-2007.0866
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2007.1026 -- [AIX]
AIX Perl buffer overflow vulnerability
20 December 2007
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: perl
Publisher: IBM
Operating System: AIX 6.1, 5.3 and 5.2
Impact: Execute Arbitrary Code/Commands
Access: Remote/Unauthenticated
CVE Names: CVE-2007-5116
Ref: ESB-2007.0866
Revision History: December 20 2007: Patch file updated
December 19 2007: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
IBM SECURITY ADVISORY
First Issued: Tue Dec 18 11:33:00 CST 2007
| Updated: Wed Dec 19 13:45:27 CST 2007
| Added perl PTF for APARs IY98394 and IY98395 to ifix tar file
===============================================================================
VULNERABILITY SUMMARY
VULNERABILITY: AIX Perl buffer overflow vulnerability
PLATFORMS: AIX 5.2, 5.3, 6.1
SOLUTION: Apply the APAR, interim fix or workaround as
described below.
THREAT: A remote attacker may run arbitrary code.
CERT VU Number: n/a
CVE Number: CVE-2007-5116
===============================================================================
DETAILED INFORMATION
I. OVERVIEW
Perl is a free software scripting language interpreter providing a
rich set of features provided as part of the base AIX Operating
System environment.
II. DESCRIPTION
A buffer overflow vulnerability exists in the 'perl.rte' fileset.
A remote attacker may execute arbitrary code if a Perl script
executing on the system is listening on a network port. If
exploited the attacker can execute arbitrary code with the same
privileges as the script.
For more details please visit:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116
III. IMPACT
The successful exploitation of this vulnerability allows a remote
attacker to execute arbitrary code.
IV. PLATFORM VULNERABILITY ASSESSMENT
To determine if your system is vulnerable, run the following
command:
# lslpp -l perl.rte
The following fileset levels are vulnerable:
AIX Fileset AIX Level Lower Level Upper Level
----------------------------------------------------------------
perl.rte 5.2.0 5.8.0.0 5.8.0.106
perl.rte 5.3.0 5.8.2.0 5.8.2.70
perl.rte 6.1.0 5.8.2.70 5.8.2.70
NOTE: Affected customers are urged to upgrade to the latest
applicable Technology Level and Service Pack.
V. SOLUTIONS
A. APARS
IBM provides the following fixes:
AIX Level APAR number Availability
---------------------------------------------------
5.2 IZ10220 05/14/2008
5.3 through TL06 IZ10244 02/06/2008
5.3 TL07 IZ10244 02/06/2008
6.1 IZ10244 02/20/2008
Subscribe to the APARs here:
http://www.ibm.com/support/docview.wss?uid=isg1IZ10220
http://www.ibm.com/support/docview.wss?uid=isg1IZ10244
By subscribing, you will receive periodic email alerting you
to the status of the APAR, and a link to download the fix once
it becomes available.
AIX Version 5 APARs can be downloaded from:
http://www.ibm.com/servers/eserver/support/unixservers/aixfixes.html
NOTE: Affected customers are urged to upgrade to the latest
applicable Technology Level and Service Pack.
B. INTERIM FIXES
Interim fixes are available. The interim fix can be
downloaded via ftp from:
ftp://aix.software.ibm.com/aix/efixes/security/perl_ifix.tar
| The latest perl interim fixes do not include all of the files
| affected by the previous perl security vulnerability, fixed by
| APARs IY98394 (52) and IY98395 (53). If you have the previous
| ifix for IY98394 or IY98395 installed, please remove the
| previous ifix, install the appropriate PTF
| (perl.rte.5.8.0.106.U or perl.rte.5.8.2.61.U), and then
| install the latest ifix with the procedure below. The PTFs
| have been added to the updated interim fix tar file. Please
| note that the latest ifix itself has not changed with this
| update, we have only added the PTFs to the tar file.
The link above is to a tar file containing this signed
advisory, interim fix packages, and PGP signatures for each
package. The interim fixes below include prerequisite
checking. This will enforce the correct mapping between the
fixes and AIX Technology Levels.
AIX Fileset AIX Release and Interim fix
Technology Level
-----------------------------------------------------------------
perl.rte 5200-08 IZ10220.071206.epkg.Z
perl.rte 5200-09 IZ10220.071206.epkg.Z
perl.rte 5200-10 IZ10220.071206.epkg.Z
perl.rte 5300-05 IZ10244.071206.epkg.Z
perl.rte 5300-06 IZ10244.071206.epkg.Z
perl.rte 5300-07 IZ10244.071206.epkg.Z
perl.rte 6100-00 (same as 53) IZ10244.071206.epkg.Z
IMPORTANT: If possible, it is recommended that a mksysb backup
of the system be created. Verify it is both bootable and
readable before proceeding.
These interim fixes have not been fully regression tested;
thus, IBM does not warrant the fully correct functionality of
the interim fix.
Verify you have retrieved the fixes intact:
The checksums below were generated using the "sum", "cksum",
"csum -h MD5" (md5sum), and "csum -h SHA1" (sha1sum) commands
and are as follows:
sum filename
------------------------------------
21674 5683 IZ10220.071206.epkg.Z
43658 5880 IZ10244.071206.epkg.Z
| 60869 23239 perl.rte.5.8.0.106.U
| 61317 22846 perl.rte.5.8.2.61.U
cksum filename
------------------------------------------
3383682558 5819246 IZ10220.071206.epkg.Z
4001149063 6020447 IZ10244.071206.epkg.Z
| 2242377008 23796736 perl.rte.5.8.0.106.U
| 3794525633 23394304 perl.rte.5.8.2.61.U
csum -h MD5 (md5sum) filename
----------------------------------------------------------
208b132ee3ff67d7ac4641e1ef9b5c6b IZ10220.071206.epkg.Z
42e6ae761b9ec36ad653a3fa294fd184 IZ10244.071206.epkg.Z
| 418dda5cb0f895205ab489bc2f0c0baa perl.rte.5.8.0.106.U
| 4e6cad28ba5cf25512b0ce22f9dff54b perl.rte.5.8.2.61.U
csum -h SHA1 (sha1sum) filename
------------------------------------------------------------------
aea47a5acc29ad3b5eee23de3cee47d53706e79a IZ10220.071206.epkg.Z
21db9fa9b433a2fc62d7897dab2c1a62e55a6a9e IZ10244.071206.epkg.Z
| 4d57b03a8a558b154abfb75da6bac716b0cf3911 perl.rte.5.8.0.106.U
| 0d331754e38c4fb6458219a91a2f6703b511eaba perl.rte.5.8.2.61.U
To verify the sums, use the text of this advisory as input to
csum, md5sum, or sha1sum. For example:
csum -h SHA1 -i Advisory.asc
md5sum -c Advisory.asc
sha1sum -c Advisory.asc
These sums should match exactly. The PGP signatures in the
compressed tarball and on this advisory can also be used to
verify the integrity of the various files they correspond to.
If the sums or signatures cannot be confirmed, double check
the command results and the download site address. If those
are OK, contact IBM AIX Security at
security-alert@austin.ibm.com and describe the discrepancy.
C. INTERIM FIX INSTALLATION
These packages use the new Interim Fix Management Solution to
install and manage interim fixes. More information can be
found at:
http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html
To preview an epkg interim fix installation execute the
following command:
# emgr -e ipkg_name -p # where ipkg_name is the name of the
# interim fix package being previewed.
To install an epkg interim fix package, execute the following
command:
# emgr -e ipkg_name -X # where ipkg_name is the name of the
# interim fix package being installed.
The "X" flag will expand any filesystems if required.
VI. WORKAROUNDS
If you are running perl network services there are no known
workarounds. If the perl services are not needed and are running,
shut them down.
VII. OBTAINING FIXES
AIX Version 5 APARs can be downloaded from:
| http://www.ibm.com/eserver/support/fixes/fixcentral/main/pseries/aix
Security related Interim Fixes can be downloaded from:
ftp://aix.software.ibm.com/aix/efixes/security
VIII. CONTACT INFORMATION
If you would like to receive AIX Security Advisories via email,
please visit:
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd
Comments regarding the content of this announcement can be
directed to:
security-alert@austin.ibm.com
To request the PGP public key that can be used to communicate
securely with the AIX Security Team you can either:
A. Send an email with "get key" in the subject line to:
security-alert@austin.ibm.com
B. Download the key from a PGP Public Key Server. The key ID is:
0xA6A36CCC
Please contact your local IBM AIX support center for any
assistance.
eServer is a trademark of International Business Machines
Corporation. IBM, AIX and pSeries are registered trademarks of
International Business Machines Corporation. All other trademarks
are property of their respective holders.
IX. ACKNOWLEDGMENTS
Tavis Ormandy and Will Drewry are credited with the discovery of
this issue.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (AIX)
iD8DBQFHaX+h8lficKajbMwRApLOAKC9UpctHcSOCCj1LqHuaf0jS0FgMwCfV1YR
T4IwzXGrsQwJjHUx98e5+4A=
=fSED
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBR2nTpCh9+71yA2DNAQKWJAP/fR/NJck7n15p+MR1BFmpZnEAHk7UrLEV
YH77w2q+r8XkS9jnp7biiDllF/tbuq7lb3gse0jrTfMgaY4xduxCG2ZZX/t95CI2
wah7Xt7fQGpyROxOt8+08+ok+HjqdjA5srNzy8MEwqit1KcDbr7i5hD/i8wK1sY7
ZWFUrFnmCSA=
=t4m0
-----END PGP SIGNATURE-----
|