SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   SNMP Daemon Vendors:   [Multiple Authors/Vendors]
(Caldera Issues Fix for OpenServer) Many Simple Network Management Protocol (SNMP) Implementations Allow Remote Users to Deny Service or Obtain Access to the System
SecurityTracker Alert ID:  1004512
SecurityTracker URL:  http://securitytracker.com/id/1004512
CVE Reference:   CAN-2002-0012, CAN-2002-0013   (Links to External Site)
Date:  Jun 11 2002
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   CERT reported that the University of Oulu (Finland) has discovered vulnerabilities in many vendor implementations of the Simple Network Management Protocol (SNMP) version 1.

The Oulu University Secure Programming Group (OUSPG, http://www.ee.oulu.fi/research/ouspg/) reports that there are numerous vulnerabilities in SNMPv1 implementations from many different vendors. A remote user can reportedly cause denial of service attacks.

For OpenServer, many of the OUSPG tests caused the OpenServer snmp daemon to consume available memory on the server, leading to denial of service conditions.

Impact:   A remote user may be able to cause denial of service conditions.
Solution:   Caldera has released a fix for OpenServer.

OpenServer 5.0.5:

Location of Fixed Binaries:

ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.25

Verification:

MD5 (VOL.000.000) = 5cd988029bb6da765d2e4040759dbd33

Installing Fixed Binaries:

Upgrade the affected binaries with the following commands:

1) Download the VOL* file to the /tmp directory

Run the custom command, specify an install from media images, and specify the /tmp directory as the location of the images.


OpenServer 5.0.6:

Location of Fixed Binaries:

ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.25

Verification:

MD5 (VOL.000.000) = 5cd988029bb6da765d2e4040759dbd33

Installing Fixed Binaries:

Upgrade the affected binaries with the following commands:

1) Download the VOL* file to the /tmp directory

Run the custom command, specify an install from media images, and specify the /tmp directory as the location of the images.

Vendor URL:  www.calderasystems.com/support/security/ (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:   UNIX (Open UNIX-SCO)

Message History:   This archive entry is a follow-up to the message listed below.
Feb 12 2002 Many Simple Network Management Protocol (SNMP) Implementations Allow Remote Users to Deny Service or Obtain Access to the System



 Source Message Contents

Date:  Mon, 10 Jun 2002 16:50:01 -0700
Subject:  Security Update: [CSSA-2002-SCO.25] OpenServer 5.0.5 OpenServer 5.0.6 : snmpd denial-of-service vulnerabilities.


--ftEhullJWpWg/VHq
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline


To: bugtraq@securityfocus.com announce@lists.caldera.com scoannmod@xenitec.on.ca

______________________________________________________________________________

		Caldera International, Inc.  Security Advisory

Subject:		OpenServer 5.0.5 OpenServer 5.0.6 : snmpd denial-of-service vulnerabilities.
Advisory number: 	CSSA-2002-SCO.25
Issue date: 		2002 June 10
Cross reference:
______________________________________________________________________________


1. Problem Description

	The University of Oulu (Finland) wrote approximately 53000
	tests for snmpd error conditions. For OpenServer, many of
	the tests caused the snmp daemon to grow in size. This could
	lead to denial-of-service attacks.


2. Vulnerable Supported Versions

	System				Binaries
	----------------------------------------------------------------------
	OpenServer 5.0.5 		/usr/lib/libsnmp.so.1.Z
	OpenServer 5.0.6		/usr/lib/libsnmp.so.1.Z


3. Solution

	The proper solution is to install the latest packages.


4. OpenServer 5.0.5

	4.1 Location of Fixed Binaries

	ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.25


	4.2 Verification

	MD5 (VOL.000.000) = 5cd988029bb6da765d2e4040759dbd33

	md5 is available for download from
		ftp://ftp.caldera.com/pub/security/tools


	4.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following commands:

	1) Download the VOL* file to the /tmp directory

	Run the custom command, specify an install from media images,
	and specify the /tmp directory as the location of the images.


5. OpenServer 5.0.6

	5.1 Location of Fixed Binaries

	ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.25


	5.2 Verification

	MD5 (VOL.000.000) = 5cd988029bb6da765d2e4040759dbd33

	md5 is available for download from
		ftp://ftp.caldera.com/pub/security/tools


	5.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following commands:

	1) Download the VOL* file to the /tmp directory

	Run the custom command, specify an install from media images,
	and specify the /tmp directory as the location of the images.


6. References

	Specific references for this advisory:
		http://www.cert.org/advisories/CA-2002-03.html

	Caldera security resources:
		http://www.caldera.com/support/security/index.html

	This security fix closes Caldera incidents sr858202,SCO-559-1345
	and erg711930.


7. Disclaimer

	Caldera International, Inc. is not responsible for the
	misuse of any of the information we provide on this website
	and/or through our security advisories. Our advisories are
	a service to our customers intended to promote secure
	installation and use of Caldera products.


8. Acknowledgements

	This vulnerability was discovered and researched by the
	University of Oulu (oulu.fi).

______________________________________________________________________________

--ftEhullJWpWg/VHq
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAj0FOykACgkQaqoBO7ipriH0rwCfc0B5F5D8t6oQntx/Cr0KoAjg
h80AnAhLSnjr/iuTlY2YIBbBXg9xyLBk
=W6C6
-----END PGP SIGNATURE-----

--ftEhullJWpWg/VHq--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC