[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.SGI.4.51.0302121038560.80786@einstein.csd.sgi.com>
From: agent99 at sgi.com (SGI Security Coordinator)
Subject: IRIX IP denial-of-service fixes and tunings
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SGI Security Advisory
Title : IP denial-of-service fixes and tunings
Number : 20030201-01-P
Date : February 12, 2003
Reference: CERT CA-2001-09
Reference: CVE-1999-0077 CAN-2001-0328
Reference: SGI BUGS 836110 866901 822734 829671 860748 862151 864775
Fixed in : IRIX 6.5.19 or patches 4765-4770, 4859-4862
______________________________________________________________________________
- -----------------------
- --- Issue Specifics ---
- -----------------------
It's been reported that there are multiple networking related
vulnerabilities in certain versions of IRIX:
o Statistical Weaknesses in TCP/IP Initial Sequence Numbers
http://www.cert.org/advisories/CA-2001-09.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0328
o Denial of Service attack involving clients sending packets with very
small MSS values
http://www.securityfocus.com/archive/1/195457
o IGMP report suppression Denial of Service
http://www.cs.ucsb.edu/~krishna/igmp_dos/
o Non-root users could influence interface settings that they shouldn't
be able to change.
o We added two new systune variables to disable additional types
of broadcast probes.
Non-security related fixes included with these patches,
o Always immediately ACK packets with PSH flag set to improve performance
with GigE networking.
o Permit the use of select() with sockets using the STP protocol in
the IRIX m-stream
SGI has investigated the issue and recommends the following steps for
neutralizing the exposure. It is HIGHLY RECOMMENDED that these measures be
implemented on ALL vulnerable SGI systems.
These issues have been corrected in patches and in IRIX 6.5.19.
- --------------
- --- Impact ---
- --------------
The above vulnerabilities are kernel-level, and naturally the kernel is
installed by default on IRIX 6.5 systems as part of eoe.sw.base.
To determine the version of IRIX you are running, execute the following
command:
# /bin/uname -R
That will return a result similar to the following:
# 6.5 6.5.16f
The first number ("6.5") is the release name, the second ("6.5.16f" in this
case) is the extended release name. The extended release name is the
"version" we refer to throughout this document.
- ----------------------------
- --- Temporary Workaround ---
- ----------------------------
There is no effective workaround available for these problems. SGI
recommends either upgrading to IRIX 6.5.19, or installing the appropriate
patch from the listing below.
- ----------------
- --- Solution ---
- ----------------
SGI has provided a series of patches for these vulnerabilities. Our
recommendation is to upgrade to IRIX 6.5.19 when available, or install the
appropriate patch.
OS Version Vulnerable? Patch # Other Actions
---------- ----------- ------- -------------
IRIX 3.x unknown Note 1
IRIX 4.x unknown Note 1
IRIX 5.x unknown Note 1
IRIX 6.0.x unknown Note 1
IRIX 6.1 unknown Note 1
IRIX 6.2 unknown Note 1
IRIX 6.3 unknown Note 1
IRIX 6.4 unknown Note 1
IRIX 6.5 yes Notes 2 & 3
IRIX 6.5.1 yes Notes 2 & 3
IRIX 6.5.2 yes Notes 2 & 3
IRIX 6.5.3 yes Notes 2 & 3
IRIX 6.5.4 yes Notes 2 & 3
IRIX 6.5.5 yes Notes 2 & 3
IRIX 6.5.6 yes Notes 2 & 3
IRIX 6.5.7 yes Notes 2 & 3
IRIX 6.5.8 yes Notes 2 & 3
IRIX 6.5.9 yes Notes 2 & 3
IRIX 6.5.10 yes Notes 2 & 3
IRIX 6.5.11 yes Notes 2 & 3
IRIX 6.5.12 yes Notes 2 & 3
IRIX 6.5.13 yes Notes 2 & 3
IRIX 6.5.14m yes 4765 Notes 2,4 & 5
IRIX 6.5.14f yes 4766 Notes 2,4 & 5
IRIX 6.5.15m yes 4767 Notes 2,4 & 5
IRIX 6.5.15f yes 4768 Notes 2,4 & 5
IRIX 6.5.16m yes 4769 Notes 2,4 & 5
IRIX 6.5.16f yes 4770 Notes 2,4 & 5
IRIX 6.5.17m yes 4859 Notes 2,4 & 5
IRIX 6.5.17f yes 4860 Notes 2,4 & 5
IRIX 6.5.18m yes 4861 Notes 2,4 & 5
IRIX 6.5.18f yes 4862 Notes 2,4 & 5
IRIX 6.5.19 no
NOTES
1) This version of the IRIX operating has been retired. Upgrade to an
actively supported IRIX operating system. See
http://support.sgi.com/irix/news/index.html#policy for more
information.
2) If you have not received an IRIX 6.5.X CD for IRIX 6.5, contact your
SGI Support Provider or URL: http://support.sgi.com/irix/swupdates/
3) Upgrade to IRIX 6.5.19
4) Install the appropriate patch or upgrade to IRIX 6.5.19
5) Note that for several of these fixes, you have to systune variables to
non-default settings to provide the added protection. Documentation
on how to use the new systunes is in the file /var/sysgen/mtune/bsd.
- ------------------------
- --- Acknowledgments ----
- ------------------------
SGI wishes to thank Michal Zalewski, Krishna Ramachandran, Darren Reed,
Rob Warnock, FIRST, UCSB, and the users of the Internet Community at
large for their assistance in this matter.
##### Patch File Checksums ####
The actual patch will be a tar file containing the following files:
Filename: README.patch.4765
Algorithm #1 (sum -r): 00851 8 README.patch.4765
Algorithm #2 (sum): 50531 8 README.patch.4765
MD5 checksum: EEF9775971EB60E31FF3EE99C3F48D05
Filename: patchSG0004765
Algorithm #1 (sum -r): 61582 2 patchSG0004765
Algorithm #2 (sum): 37142 2 patchSG0004765
MD5 checksum: 79F0A0E99AC82540FB447D147C68DF23
Filename: patchSG0004765.eoe_sw
Algorithm #1 (sum -r): 49197 8682 patchSG0004765.eoe_sw
Algorithm #2 (sum): 52920 8682 patchSG0004765.eoe_sw
MD5 checksum: AA3ABF4FB89EC7214D3F812EF8266F58
Filename: patchSG0004765.idb
Algorithm #1 (sum -r): 33635 8 patchSG0004765.idb
Algorithm #2 (sum): 28804 8 patchSG0004765.idb
MD5 checksum: 48ADB895BB57E67339D8E4C03EDF7071
Filename: README.patch.4766
Algorithm #1 (sum -r): 46520 8 README.patch.4766
Algorithm #2 (sum): 45333 8 README.patch.4766
MD5 checksum: 391B328808E4F94A27305D92634EAAE6
Filename: patchSG0004766
Algorithm #1 (sum -r): 40678 2 patchSG0004766
Algorithm #2 (sum): 37866 2 patchSG0004766
MD5 checksum: 8589BD3E333441A8F051E8BDAAB1F461
Filename: patchSG0004766.eoe_sw
Algorithm #1 (sum -r): 27708 8719 patchSG0004766.eoe_sw
Algorithm #2 (sum): 43291 8719 patchSG0004766.eoe_sw
MD5 checksum: 8619F9B9BABC2240723593F886C6E9DA
Filename: patchSG0004766.idb
Algorithm #1 (sum -r): 42539 8 patchSG0004766.idb
Algorithm #2 (sum): 28701 8 patchSG0004766.idb
MD5 checksum: EBFD5C60C84081AAB256F62A7D515991
Filename: README.patch.4767
Algorithm #1 (sum -r): 17974 8 README.patch.4767
Algorithm #2 (sum): 50521 8 README.patch.4767
MD5 checksum: 695AAF2AC022DF5548F6A08BABB8C19C
Filename: patchSG0004767
Algorithm #1 (sum -r): 50741 2 patchSG0004767
Algorithm #2 (sum): 36840 2 patchSG0004767
MD5 checksum: D40046A218262CE6C4525315574D7A93
Filename: patchSG0004767.eoe_sw
Algorithm #1 (sum -r): 06411 8634 patchSG0004767.eoe_sw
Algorithm #2 (sum): 65220 8634 patchSG0004767.eoe_sw
MD5 checksum: F311806DECAFCBE257C847BA3B90E234
Filename: patchSG0004767.idb
Algorithm #1 (sum -r): 23118 8 patchSG0004767.idb
Algorithm #2 (sum): 28772 8 patchSG0004767.idb
MD5 checksum: 59C5EDC63D888EBCD9678AA094E4AE36
Filename: README.patch.4768
Algorithm #1 (sum -r): 07449 8 README.patch.4768
Algorithm #2 (sum): 45329 8 README.patch.4768
MD5 checksum: 574EF632903897A79F2EC30EBDB749BD
Filename: patchSG0004768
Algorithm #1 (sum -r): 12854 2 patchSG0004768
Algorithm #2 (sum): 37926 2 patchSG0004768
MD5 checksum: 300D477270517404F21EBBC4EC1F9AF1
Filename: patchSG0004768.eoe_sw
Algorithm #1 (sum -r): 19153 8695 patchSG0004768.eoe_sw
Algorithm #2 (sum): 56318 8695 patchSG0004768.eoe_sw
MD5 checksum: 0F31ACA7E678DEFFC62B4470D286C168
Filename: patchSG0004768.idb
Algorithm #1 (sum -r): 10022 8 patchSG0004768.idb
Algorithm #2 (sum): 28960 8 patchSG0004768.idb
MD5 checksum: 001968D21CDAA04CF8F00929F56993D2
Filename: README.patch.4769
Algorithm #1 (sum -r): 31126 8 README.patch.4769
Algorithm #2 (sum): 50564 8 README.patch.4769
MD5 checksum: 82E480DAC43FCEED64BC15B8D9D57DEA
Filename: patchSG0004769
Algorithm #1 (sum -r): 03843 2 patchSG0004769
Algorithm #2 (sum): 36640 2 patchSG0004769
MD5 checksum: FB989211A29CF7D7ED37B20859CDC749
Filename: patchSG0004769.eoe_sw
Algorithm #1 (sum -r): 06936 8684 patchSG0004769.eoe_sw
Algorithm #2 (sum): 19463 8684 patchSG0004769.eoe_sw
MD5 checksum: 0DBAEF3ABE22AF89768A36BEBE7DB6B0
Filename: patchSG0004769.idb
Algorithm #1 (sum -r): 52255 8 patchSG0004769.idb
Algorithm #2 (sum): 28982 8 patchSG0004769.idb
MD5 checksum: CD7BDCADDC43DFCF70718701F2CB31DB
Filename: README.patch.4770
Algorithm #1 (sum -r): 47848 8 README.patch.4770
Algorithm #2 (sum): 45283 8 README.patch.4770
MD5 checksum: 62420BDB0901E3508DC24357A753F808
Filename: patchSG0004770
Algorithm #1 (sum -r): 37174 2 patchSG0004770
Algorithm #2 (sum): 37555 2 patchSG0004770
MD5 checksum: 9BEC0D64A1A37ADC457F5899B59C4924
Filename: patchSG0004770.eoe_sw
Algorithm #1 (sum -r): 39864 8731 patchSG0004770.eoe_sw
Algorithm #2 (sum): 60323 8731 patchSG0004770.eoe_sw
MD5 checksum: 8EF0379361DF58C8D1A7F1EF90BF8957
Filename: patchSG0004770.idb
Algorithm #1 (sum -r): 11481 8 patchSG0004770.idb
Algorithm #2 (sum): 28643 8 patchSG0004770.idb
MD5 checksum: 70C4D90A919D2FDC543923004923956F
Filename: README.patch.4859
Algorithm #1 (sum -r): 00935 8 README.patch.4859
Algorithm #2 (sum): 45233 8 README.patch.4859
MD5 checksum: FB019BC6CF6D404FF65C1961C5916D34
Filename: patchSG0004859
Algorithm #1 (sum -r): 48316 2 patchSG0004859
Algorithm #2 (sum): 37273 2 patchSG0004859
MD5 checksum: A4F76A969A96443ECE4EF81F03E42929
Filename: patchSG0004859.eoe_sw
Algorithm #1 (sum -r): 05200 8682 patchSG0004859.eoe_sw
Algorithm #2 (sum): 24603 8682 patchSG0004859.eoe_sw
MD5 checksum: B4E67351627AF9BD2518E130403E1F5C
Filename: patchSG0004859.idb
Algorithm #1 (sum -r): 12558 8 patchSG0004859.idb
Algorithm #2 (sum): 28929 8 patchSG0004859.idb
MD5 checksum: 2EBD54044AD96AF6E3130F7E4A831F83
Filename: README.patch.4860
Algorithm #1 (sum -r): 08551 8 README.patch.4860
Algorithm #2 (sum): 40311 8 README.patch.4860
MD5 checksum: A083EF36545E7806C503ECDC4205B30C
Filename: patchSG0004860
Algorithm #1 (sum -r): 38690 2 patchSG0004860
Algorithm #2 (sum): 37973 2 patchSG0004860
MD5 checksum: EF53D09FE2F5920C4A2FE48498F526F3
Filename: patchSG0004860.eoe_sw
Algorithm #1 (sum -r): 18758 8729 patchSG0004860.eoe_sw
Algorithm #2 (sum): 50084 8729 patchSG0004860.eoe_sw
MD5 checksum: 49663754DA52A65D1F3955EC3F61D200
Filename: patchSG0004860.idb
Algorithm #1 (sum -r): 00608 8 patchSG0004860.idb
Algorithm #2 (sum): 28685 8 patchSG0004860.idb
MD5 checksum: 89FDF54A20EBDB47F159B5B372098699
Filename: README.patch.4861
Algorithm #1 (sum -r): 55419 8 README.patch.4861
Algorithm #2 (sum): 34686 8 README.patch.4861
MD5 checksum: F67AB6C309E5CB6C14AD328FA5DAFAF9
Filename: patchSG0004861
Algorithm #1 (sum -r): 33127 2 patchSG0004861
Algorithm #2 (sum): 34079 2 patchSG0004861
MD5 checksum: 3A2E13F4214A7DE2EDC6A541AB2C884F
Filename: patchSG0004861.eoe_sw
Algorithm #1 (sum -r): 14812 8693 patchSG0004861.eoe_sw
Algorithm #2 (sum): 65234 8693 patchSG0004861.eoe_sw
MD5 checksum: 57FB55C1100BE5B07200B8AA8952F3AA
Filename: patchSG0004861.idb
Algorithm #1 (sum -r): 48910 8 patchSG0004861.idb
Algorithm #2 (sum): 28671 8 patchSG0004861.idb
MD5 checksum: 23689B4F2FEF2DE6CC4F9B80F4A2B3EA
Filename: README.patch.4862
Algorithm #1 (sum -r): 36366 8 README.patch.4862
Algorithm #2 (sum): 34677 8 README.patch.4862
MD5 checksum: 5F9EC05279B801B70BD80E4AF7265861
Filename: patchSG0004862
Algorithm #1 (sum -r): 49813 2 patchSG0004862
Algorithm #2 (sum): 35382 2 patchSG0004862
MD5 checksum: 69692CEF25EE7AE774DACB8E62AB1DEC
Filename: patchSG0004862.eoe_sw
Algorithm #1 (sum -r): 29451 8746 patchSG0004862.eoe_sw
Algorithm #2 (sum): 17026 8746 patchSG0004862.eoe_sw
MD5 checksum: 4BE770442C8DFD31AC54CCFF35F89E44
Filename: patchSG0004862.idb
Algorithm #1 (sum -r): 04107 8 patchSG0004862.idb
Algorithm #2 (sum): 28768 8 patchSG0004862.idb
MD5 checksum: AEBF11906A3322B410F93CD9F26594B1
- -------------
- --- Links ---
- -------------
SGI Security Advisories can be found at:
http://www.sgi.com/support/security/ and
ftp://patches.sgi.com/support/free/security/advisories/
SGI Security Patches can be found at:
http://www.sgi.com/support/security/ and
ftp://patches.sgi.com/support/free/security/patches/
SGI patches for IRIX can be found at the following patch servers:
http://support.sgi.com/irix/ and ftp://patches.sgi.com/
SGI freeware updates for IRIX can be found at:
http://freeware.sgi.com/
SGI fixes for SGI open sourced code can be found on:
http://oss.sgi.com/projects/
SGI patches and RPMs for Linux can be found at:
http://support.sgi.com/linux/ or
http://oss.sgi.com/projects/sgilinux-combined/download/security-fixes/
SGI patches for Windows NT or 2000 can be found at:
http://support.sgi.com/nt/
IRIX 5.2-6.4 Recommended/Required Patch Sets can be found at:
http://support.sgi.com/irix/ and ftp://patches.sgi.com/support/patchset/
IRIX 6.5 Maintenance Release Streams can be found at:
http://support.sgi.com/colls/patches/tools/relstream/index.html
IRIX 6.5 Software Update CDs can be obtained from:
http://support.sgi.com/irix/swupdates/
The primary SGI anonymous FTP site for security advisories and patches is
patches.sgi.com (216.32.174.211). Security advisories and patches are
located under the URL ftp://patches.sgi.com/support/free/security/
For security and patch management reasons, ftp.sgi.com (mirrors
patches.sgi.com security FTP repository) lags behind and does not do a
real-time update.
- -----------------------------------------
- --- SGI Security Information/Contacts ---
- -----------------------------------------
If there are questions about this document, email can be sent to
security-info@....com.
------oOo------
SGI provides security information and patches for use by the entire SGI
community. This information is freely available to any person needing the
information and is available via anonymous FTP and the Web.
The primary SGI anonymous FTP site for security advisories and patches is
patches.sgi.com (216.32.174.211). Security advisories and patches are
located under the URL ftp://patches.sgi.com/support/free/security/
The SGI Security Headquarters Web page is accessible at the URL:
http://www.sgi.com/support/security/
For issues with the patches on the FTP sites, email can be sent to
security-info@....com.
For assistance obtaining or working with security patches, please
contact your SGI support provider.
------oOo------
SGI provides a free security mailing list service called wiretap and
encourages interested parties to self-subscribe to receive (via email) all
SGI Security Advisories when they are released. Subscribing to the mailing
list can be done via the Web
(http://www.sgi.com/support/security/wiretap.html) or by sending email to
SGI as outlined below.
% mail wiretap-request@....com
subscribe wiretap <YourEmailAddress such as zedwatch@....com >
end
^d
In the example above, <YourEmailAddress> is the email address that you wish
the mailing list information sent to. The word end must be on a separate
line to indicate the end of the body of the message. The control-d (^d) is
used to indicate to the mail program that you are finished composing the
mail message.
------oOo------
SGI provides a comprehensive customer World Wide Web site. This site is
located at http://www.sgi.com/support/security/ .
------oOo------
If there are general security questions on SGI systems, email can be sent to
security-info@....com.
For reporting *NEW* SGI security issues, email can be sent to
security-alert@....com or contact your SGI support provider. A support
contract is not required for submitting a security report.
______________________________________________________________________________
This information is provided freely to all interested parties
and may be redistributed provided that it is not altered in any
way, SGI is appropriately credited and the document retains and
includes its valid PGP signature.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBPkqMrbQ4cFApAP75AQHPSQQAt3JYa7juK9ppEKHM7hOXV31NSwaaWD5N
dOMA2NZa29XtzXVXCoofoS8pL9qDj3g6rLyHjhJkya2pRBfpJVV4jh8pmohJSdML
gg0aNSCEpo4Q9YWg9HKJq/TMSQdyMBfjbF8CkS+j6ZFtmDoNJ3TUqzEy69sNO/ys
XhSS7OQBNGM=
=WVnw
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists