News March 1998
Most of the links lead to the corresponding files at CERT or
other organisations. So changes take place immediately,
especially which patches should be installed or which changes in
the configuration should be made to avoid this vulnerability.
Most of the files are transferred by ftp.
By the way: If we're not publishing well-known risks
inheritant in any widely used platform or program that doesn't
mean this particular platform or program is safe to use!
HP-UX 9.x, 10.x | Denial-of-Service by inetd:
Hewlett-Packard Security Bulletin #000077,
ESB-98.049,
I-039,
ERS-027 Using HP9000 Series 7/800 and the mentioned systems improperly coded routines in the inetd may result in susceptability to denial of service attacks. This vulnerability may allow networking to be disabled. It's recommended to install the patches mentioned in the advisory. |
MacOS | Possible loss of the whole system by De-Installation
of Microsoft Office 98: MacFixIt,
Microsoft If the new Microsoft Office for Macintosh is de-installed manually it may happen that the whole system-folder is moved to the wastebasket. If this is emptied by the user the whole system will be lost! A bugfix is not available yet. |
IRIX 5.3 - 6.3 | Vulnerability by pset: SGI-19970506,
ERS-026,
ESB-98.048 This vulnerability had been published last year. SGI has published new patches and workarounds. How to install them is pointed out in the advisory. |
IRIX 5.3 - 6.4 | Vulnerabilities by (old) Netscape Navigator:
SGI-19980303,
ERS-025,
ESB-98.047,
I-040 Some security holes have been found in some versions of the Navigator (e.g. "Tracker Bug" and "Bell Labs Privacy Bug"). SGI strongly recommends to use Netscape Navigator V. 3.04. It can be downloaded from SGI or Netscape. |
Solaris 2.3 - 2.5.1 | Vulnerability in NIS+: SNI-027,
ERS-024,
ESB-98.044 The Network Information Server Plus (NIS+) is a network directory service that provides management and resource location support (including authentication and name resolution) to heterogenous distributed systems. Due to implementation problems, the programs supporting NIS+ can be exploited by an attacker to recover various pieces of system status information. These problems can be worked around using packet filters to block UDP traffic to the NIS+ server. Blocking UDP to the NIS+ server from valid NIS+ clients will cause the NIS+ system to fail, so between these no blocking should be done. Sun Microsystems is working on a fix. Additional information can be found at Sun's site in Canada. |
Ascend OS 5.0Ap42 (MAX) and 5.0A (Pipeline) | Denial-of-Service by dicard and
problems with SNMP defaults: SNI-026,
I-038,
ERS-023,
ESB-98.043 In order to locate Ascend routers by "Ascend Java Configurator", the Configurator broadcasts a specially formatted UDP packet to the "discard" port (port 9). Ascend routers listen for these packets and respond with another UDP packet that contains the symbolic name of the router. In this manner, the Configurator can build a list of all Ascend routers on the local network. By sending a specially formatted (but malformed) probe packet to the discard port of an Ascend router, an attacker can cause an Ascend router to lock up. Attackers can easily discover Ascend routers to crash by sending probe packets to the discard port of arbitrary ranges of addresses; only Ascend routers will respond to them. It's recommended to block port 9/UDP. Another problem is caused by the default-installation of SNMP. It's possible to get the MIB-variables by SNMP-read, it's even possible to set them by SNMP-Write. This is reasoned by the weak protection through (well known) community-strings. They should be changed to non-default. |
all | Advisory about cookies: I-034,
ESB-98.041 In this advisory, issued by CIAC, the problems about cookies are discussed. There is normally no danger for data or systems, but the user may be controlled by cookies. |
perl for Red Hat Linux | Vulnerability in perl symlinks:
ESB-98.034 All versions of perl for Red Hat Linux have /tmp symlink attacks. New packages are available for Red Hat 4.2 and Red Hat 5.0 which fix these problems. All users of Red Hat Linux are encouraged to upgrade to the new perl releases immediately. |
IRIX 5.3 - 6.4 | Vulnerabilities in startmidi/stopmidi,
datman/cdman, cdplayer:
SGI-19980301,
ERS-022,
I-035,
ESB-98.040,
S-98-15 Buffer Overflows may allow any user to gain root-access to the vulnerable machine. It's strongly recommended to install the referring patches pointed out in the advisory. |
most FreeBSD | Patches against vulnerability in mmap:
SA-98:02,
ERS-021,
I-037,
ESB-98.039,
S-98-14,
NEW: ESB-98.042 As reported last month, there is a vulnerability in mmap. Now patches have been released. How to install them is described in the advisory. |
most FreeBSD | Patches against land.c: SA-98:01,
ERS-020,
I-036,
ESB-98.038,
S-98-13,
NEW: ESB-98.042 For most versions of FreeBSD patches against this Denial-of-Service attack have been released and should be installed immediately. How to install them is described in the advisory. |
Solaris 2.3 - 2.5.1 (Sparc and x86), SunOS 4.1.x | Vulnerability in rpc.cmsd: SUN
Security Bulletin #00166,
I-033,
ESB-98.037,
ERS-019 The rpc.cmsd is a small database manager for appointment and resource-scheduling data. Its primary client is Calendar Manager in Openwindows, and Calendar in CDE. This vulnerability, if exploited, allows attackers to overwrite arbitrary files and gain root access. It's strongly recommended to install the patches published by Sun Microsystems. |
Solaris 2.6 (Sparc and x86) | Vulnerability in ndd: SUN Security
Bulletin #00165,
S-98-11,
I-033,
ESB-98.036,
ERS-018 TCP/IP kernel parameters can be set using the ndd command. A vulnerability has been discovered which, if exploited, would permit attackers to set parameters to cause a denial of service. It's strongly recommended to install the patches published by Sun Microsystems. |
all | New CERT Summary: CS-98.03,
ERS-017,
ESB-98.035 Trends in incidents reported to CERT: 1. Root Compromises and Network Sniffers 2. Large-Scale Scanning and Attacks (IMAP, rpc.statd) 3. Denial-of-Service Attacks (More Denial-of-Service Attacks Targeting Windows 95/NT Machines) More important information about these and other topics can be found in the document linked above. |
Microsoft Windows NT and 95 | Denial-of-Service by NewTear and other
programs: Microsoft,
CS-98.02,
I-031a,
ESB-98.031,
S-98-08,
ESB-98.032,
ERS-014,
ESB-98.033 The attacks involve sending a pair of malformed IP fragments which are reassembled into an invalid UDP datagram. The invalid UDP datagram causes the target machine to go into an unstable state. Once in an unstable state, the target machine either halts or crashes. We have received reports that some machines crashed with a blue screen while others rebooted. The solution to protect Windows 95 and NT machines from this attack is to apply the appropriate Microsoft patch: Intel: Windows NT 4.0, Windows NT 3.51, Windows 95 (Update to Winsock 2.0) Alpha: Windows NT 4.0, Windows NT 3.51 |
Solaris 2.4 - 2.6 | Vulnerability by dtaction: SUN
Security Bulletin #00164,
ESB-98.030,
S-98-10,
I-032,
ERS-016 The dtaction utility allows applications or shell scripts, which are otherwise not connected into the CDE development environment, to invoke action requests. Due to insufficient bounds checking on arguments supplied to dtaction, it is possible to overwrite the internal stack space of dtaction. As dtaction is setuid root, this vulnerability may be exploited to gain root access. It's strongly recommended to install the patches published by Sun Microsystems. |
Solaris 2.3 - 2.6, SunOS 4.1.x | Vulnerability by vacation: SUN
Security Bulletin #00163,
ESB-98.029,
S-98-09,
I-032,
ERS-015 The vacation program automatically replies to incoming email on behalf of the recipient and notifies senders that the recipient is not currently reading the email. A vulnerability has been discovered which, if exploited, may allow attackers access to the account of the user running the vacation program. It's strongly recommended to install the patches published by Sun Microsystems. |
OpenBSD 2.2, FreeBSD 2.2.5 | Vulnerability by sysctl / IP Source Routing
Problem: OpenBSD,
ESB-98.028 Due to implementation problems, the system configuration control for "do source route" does not prevent source routed packets from being accepted by 4.4BSD kernels. Additionally, if source routing is enabled, the "forward IP packets" control does not prevent source routed packets from being forwarded. It's strongly recommended to install the patches from OpenBSD. |
Back to the News
© 1998 Dr. Matthias Leu, EDV Beratung fuer Internet/Intranet, last Update: Mai 04, 1998, 23:02 +0200