|
______________________________________________________________________________ Silicon Graphics Inc. Security Advisory Title: Security vulnerabilities in rpc.statd program Number: 19960301-01-P Date: February 29, 1996 ______________________________________________________________________________ Silicon Graphics provides this information freely to the SGI user community for its consideration, interpretation, implementation and use. Silicon Graphics recommends that this information be acted upon as soon as possible. Silicon Graphics will not be liable for any indirect, special, or consequential damages arising from the use of, failure to use or improper use of any of the instructions or information in this Security Advisory. ______________________________________________________________________________ It has been found that there are some security vulnerabilities within the /usr/etc/rpc.statd program. After further investigation, SGI recommends the following steps for neutralizing this possible means of exploit. It is HIGHLY RECOMMENDED that these measures be done on ALL SGI systems running IRIX 3.x, 4.x, 5.x and 6.x. The issue will be permanently corrected in a future release of IRIX. - -------------- - --- Impact --- - -------------- The vulnerabilities found within the rpc.statd program could be used in several including removal of files and denial of service attacks. An existing account on the target system is not necessary. - ---------------- - --- Solution --- - ---------------- **** IRIX 3.x **** Silicon Graphics Inc, no longer supports the IRIX 3.x operating system and therefore has no patches or binaries to provide. If possible, it is recommended that the system be upgrade to a supported version of IRIX (see below) and then install the patch for that particular IRIX version. **** IRIX 4.x **** As of the date of this document, SGI does not have a IRIX 4.x binary replacement that addresses this particular issue. If in the future, a replacement binary is generated, additional advisory information will be provided. If possible, it is recommended that the system be upgrade to a supported version of IRIX (see below) and then install the patch for that particular IRIX version. **** IRIX 5.0.x, 5.1.x **** For the IRIX operating systems versions 5.0.x and 5.1.x, an upgrade to 5.2 or better is required first. When the upgrade is completed, then the patches described in the following sections can be applied depending on the final version of the upgrade. **** IRIX 5.2 **** For the IRIX operating system version 5.2, an inst-able patch has been generated and made available via anonymous FTP and your service/support provider. The patch is number 1145 and will install on IRIX 5.2 only. The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its mirror, ftp.sgi.com. Patch 1145 can be found in the following directories on the FTP server: ~ftp/Security or ~ftp/Patches/5.2 ##### Checksums #### The actual patch will be a tar file containing the following files: Filename: patchSG0001145 Algorithm #1 (sum -r): 44131 2 patchSG0001145 Algorithm #2 (sum): 6431 2 patchSG0001145 MD5 checksum: 21AA35CB9907CE65E7E9F2CED4C5911A Filename: patchSG0001145.eoe1_sw Algorithm #1 (sum -r): 00315 35 patchSG0001145.eoe1_sw Algorithm #2 (sum): 33929 35 patchSG0001145.eoe1_sw MD5 checksum: 40B85524141352FA8EE027230BE6322C Filename: patchSG0001145.idb Algorithm #1 (sum -r): 45044 2 patchSG0001145.idb Algorithm #2 (sum): 60514 2 patchSG0001145.idb MD5 checksum: 784C192324E1D4CEAD0866CCE279EBC2 Filename: patchSG0001145.nfs_man Algorithm #1 (sum -r): 54026 6 patchSG0001145.nfs_man Algorithm #2 (sum): 4258 6 patchSG0001145.nfs_man MD5 checksum: 8B9266952D84D7B86386674FBEDDFC57 Filename: patchSG0001145.nfs_sw Algorithm #1 (sum -r): 11017 111 patchSG0001145.nfs_sw Algorithm #2 (sum): 29091 111 patchSG0001145.nfs_sw MD5 checksum: F52AC0B723600A408A3F3FF1AF637E95 **** IRIX 5.3, 6.0, 6.0.1, 6.1 **** For the IRIX operating system versions 5.3, 6.0, 6.0.1, and 6.1 an inst-able patch has been generated and made available via anonymous FTP and your service/support provider. The patch is number 1128 and will install on IRIX 5.3, 6.0 and 6.0.1 only. The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its mirror, ftp.sgi.com. Patch 1128 can be found in the following directories on the FTP server: ~ftp/Security or ~ftp/Patches/5.3 ~ftp/Patches/6.0 ~ftp/Patches/6.0.1 ~ftp/Patches/6.1 ##### Checksums #### The actual patch will be a tar file containing the following files: Filename: patchSG0001128 Algorithm #1 (sum -r): 20931 3 patchSG0001128 Algorithm #2 (sum): 29192 3 patchSG0001128 MD5 checksum: 133D5686F71C291FBFB03826171E6C74 Filename: patchSG0001128.eoe1_sw Algorithm #1 (sum -r): 61563 23 patchSG0001128.eoe1_sw Algorithm #2 (sum): 36962 23 patchSG0001128.eoe1_sw MD5 checksum: CECD51825804C10EFC91AB21E64608A7 Filename: patchSG0001128.idb Algorithm #1 (sum -r): 27583 2 patchSG0001128.idb Algorithm #2 (sum): 59737 2 patchSG0001128.idb MD5 checksum: 0F242B0EEACF2F1A3C97B67C1924C887 Filename: patchSG0001128.nfs_man Algorithm #1 (sum -r): 55436 5 patchSG0001128.nfs_man Algorithm #2 (sum): 39750 5 patchSG0001128.nfs_man MD5 checksum: 2D902C2D245E370CA3747762075B4AFD Filename: patchSG0001128.nfs_sw Algorithm #1 (sum -r): 16238 124 patchSG0001128.nfs_sw Algorithm #2 (sum): 57740 124 patchSG0001128.nfs_sw MD5 checksum: 2DEC03983024A7583D6B94431048014E - ----------------------------------------- - --- SGI Security Information/Contacts --- - ----------------------------------------- Past SGI Advisories and security patches can be obtained via anonymous FTP from sgigate.sgi.com or its mirror, ftp.sgi.com. These security patches and advisories are provided freely to all interested parties. For issues with the patches on the FTP sites, email can be sent to cse-security-alert@csd.sgi.com. For assistance obtaining or working with security patches, please contact your SGI support provider. If there are questions about this document, email can be sent to cse-security-alert@csd.sgi.com. For reporting *NEW* SGI security issues, email can be sent to security-alert@sgi.com or contact your SGI support provider. A support contract is not required for submitting a security report. -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUBMTZBErQ4cFApAP75AQGZ/wP+Na2rwJNtfLjTb+r62Qqql3/X8dJKDhKu c75INm4OA24HJP8ICGucUhrrr7phTWx7OkkkepDpPHySyES8gyXfJ5XF+aWGkVMN hgOuVYMnPJUnA+qiAyyGiYDJQRtaNpaDHifbOSWg2CCv30Hi5aTTy3FsJKSNpn6V mCQZ5l7bnGI= =pCex -----END PGP SIGNATURE-----