TUCoPS :: Networks :: Wireless :: bt372.txt

iChain 2.2 Field Patch 1a

Hash: SHA1

For Immediate Disclosure

============================== Summary ==============================

 Security Alert: NOVL-2003-2966205
          Title: iChain 2.2 Field Patch 1a
           Date: 05-Jun-2003
       Revision: Original
   Product Name: iChain 2.2
 OS/Platform(s): Netware
  Reference URL: http://support.novell.com/servlet/tidfinder/2966205 
    Vendor Name: Novell, Inc. 
     Vendor URL: http://www.novell.com 
Security Alerts: http://support.novell.com/security-alerts 
        Affects: Various
    Identifiers: None
        Credits: Axel Dunkel, Dunkel GmbH <security@Dunkel.de>

============================ Description ============================

DoS caused by buffer overflow abend running special script against 

For security reasons, NCPIP.NLM and JSTCP.NLM were renamed to 
NCPIP.OLD and JSTCP.OLD. NCPIP.NLM should never be loaded on a 
PUBLIC interface unless port 524 is blocked by a firewall, even 
if using the NCP exclude options. JSTCP.NLM posted a listener on 
port 6901 that is not needed by iChain. 

User could access a restricted/secure page without authenticating.

Numerous other updates are included in this field patch.  See the 
Technical Information Document (TID) for further details.

============================== Impact ===============================

Denial of Service caused by buffer overflow abend running special 
script against login.

Inappropriate access with incorrect configuration.

======================== Recommended Actions ========================

See detailed instructions in the referenced Technical Information 
Document (TID) http://support.novell.com/servlet/tidfinder/2966205.

============================ DISCLAIMER =============================

The content of this document is believed to be accurate at the time 
of publishing based on currently available information. However, the 
information is provided "AS IS" without any warranty or 
representation. Your use of the document constitutes acceptance of 
this disclaimer. Novell disclaims all warranties, express or implied,
regarding this document, including the warranties of merchantability 
and fitness for a particular purpose. Novell is not liable for any 
direct, indirect, or consequential loss or damage arising from use 
of, or reliance on, this document or any security alert, even if 
Novell has been advised of the possibility of such damages and even 
if such damages are foreseeable.

============================ Appendices =============================


================ Contacting Novell Security Alerts ==================

To report suspected security vulnerabilities in Novell products, send
email to

or use the web form at our website


PGP users may send signed/encrypted information to us using our PGP 
key, available from the pgpkeys.mit.edu server, or our website.

Users wishing to be notified when Novell Security Alerts are issued 
may register their email address at


Security Alerts, Novell, Inc. PGP Key Fingerprint:

F5AE 9265 0A34 F84E 580E  9B87 3AC1 1974 DE05 0FDB

========================= Revision History ==========================
       Original: 06-Jun-2003 - Original Publication

Version: PGP Personal Security 7.0.3


You are currently subscribed to security-alerts as: [bugtraq@securityfocus.com]
To unsubscribe, forward this message to leave-security-alerts-23015264B@list.novell.com

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH