[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 561/03 - Tru64 UNIX sendmail Potential Security Vulnerability.



-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 561/03 dated 06.10.03  Time: 12:00
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- ----------------------------------------------------------------------------------
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Tru64 UNIX sendmail Potential Security Vulnerability.

Detail
======

A potential security vulnerability has been identified in
sendmail where a buffer overflow could result in a local or
remote user gaining unauthorized privileged access.

SECURITY BULLETIN

REVISION: 0

SSRT3631 - Tru64 UNIX sendmail Potential Security
Vulnerability

- ----------------------------------------------------------
NOTICE: There are no restrictions for distribution of this
Bulletin provided that it remains complete and intact.

RELEASE DATE: 03 October 2003

SEVERITY:  1

SOURCE:  Compaq Computer Corporation, a wholly-owned
subsidiary of Hewlett-Packard Company and Hewlett-Packard
Company HP Services
Software Security Response Team

REFERENCE:  CA-2003-25, SSRT3612, SSRT3531

PROBLEM SUMMARY
A potential security vulnerability has been identified in
sendmail where a buffer overflow could result in a local or
remote user gaining unauthorized privileged access.

VERSIONS IMPACTED

All currently supported versions of HP Tru64 UNIX running
sendmail including

HP Tru64 UNIX 5.1B  All Base levels

HP Tru64 UNIX 5.1A  All Base levels

HP Tru64 UNIX 5.1    All Base levels

HP Tru64 UNIX 4.0G  All Base levels

HP Tru64 UNIX 4.0F  All Base levels

and

HP Tru64 UNIX (IX) Internet Express running sendmail
versions 8.9.3 through 8.12.9 which were delivered with
IX kit versions 5.43 through 6.12.

To determine if this patch kit is needed

If the installed the version of sendmail was shipped with
affected versions of HP Tru64 UNIX or HP Tru64 UNIX (IX)
Internet Express versions 5.4 through 6.1 a patch will be
required.
Sendmail versions 8.9.3 through 8.12.9 are affected.

To determine the version of sendmail run the following
command:

# /usr/sbin/sendmail -d0.1


Version 8.9.3
 Compiled with: some verbiage


RESOLUTION

Until the resolutions are available in HP Tru64 UNIX
mainstream release patch kits, HP is releasing the
following Early Release Patch (ERP) kits.

The fixes contained in the ERP kits are scheduled to be
available in the following mainstream patch kits:

     HP Tru64 UNIX V5.1B PK4
     HP Tru64 UNIX V5.1A PK6

Early Release Patches

The ERP kits use dupatch to install and will not install
over any installed Customer Specific Patches (CSPs) that
have file intersections with the ERPs.  Contact the
appropriate HP Services support channel for assistance
if the installation of the ERPs is blocked by any
installed CSPs.

For alternatives to using the Dupach ERP kit solutions
for the HP Tru64 UNIX Base OS please see the following
Web page: http://h30097.www3.hp.com/unix/AlternativesTo
UsingDupatch.htm.

The following ERP kits are available for HP Tru64 UNIX:


NOTE: These currently released ERPs do have file
interactions with the ERPs provided to resolve SSRT3531
i.e. 5.1A PK4 (BL21), 5.1 PK6 (BL20), 4.0G PK3 (BL17),
4.0F PK7 (BL18) however, they are designed to install
standalone or seamlessly over the previous SSRT3531
patch kits.

HP Tru64 UNIX 5.1B
PREREQUISITE: HP Tru64 UNIX with 5.1B with PK2 (BL22)
installed
ERP Kit Name: T64KIT0020135-V51BB22-ES-20031001.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0020135-V51BB22-ES-20031001

HP Tru64 UNIX 5.1B
PREREQUISITE: HP Tru64 UNIX with 5.1B with patch kit
prior to PK2 (BL22) installed
Please upgrade to 5.1B PK2 (BL22) and apply the above
patch kit.

HP Tru64 UNIX 5.1A
PREREQUISITE: HP Tru64 UNIX with 5.1A with PK5 (BL23)
installed
ERP Kit Name: T64KIT0020137-V51AB23-ES-20031001.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0020137-V51AB23-ES-20031001

HP Tru64 UNIX 5.1A
PREREQUISITE: HP Tru64 UNIX with 5.1A with PK4 (BL21)
installed
ERP Kit Name: T64KIT0020138-V51AB21-ES-20031001.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0020138-V51AB21-ES-20031001

HP Tru64 UNIX 5.1
PREREQUISITE: HP Tru64 UNIX with 5.1A with PK6 (BL20)
installed
ERP Kit Name: T64KIT0020139-V51B20-ES-20031001.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0020139-V51B20-ES-20031001

HP Tru64 UNIX 4.0F
PREREQUISITE: HP Tru64 UNIX with 4.0F with PK4 (BL22)
installed
ERP Kit Name: DUXKIT0020136-V40FB22-ES-20031001.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=DUXKIT0020136-V40FB22-ES-20031001

HP Tru64 UNIX 4.0F
PREREQUISITE: HP Tru64 UNIX with 4.0F with PK7 (BL18)
installed
ERP Kit Name: DUXKIT0020134-V40FB18-ES-20031001.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=DUXKIT0020134-V40FB18-ES-20031001

HP Tru64 UNIX 4.0G
PREREQUISITE: HP Tru64 UNIX with 4.0G with PK4 (BL22)
installed
ERP Kit Name:  T64KIT0020132-V40GB22-ES-20031001.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0020132-V40GB22-ES-20031001

HP Tru64 UNIX 4.0G
PREREQUISITE: HP Tru64 UNIX with 4.0G with PK3 (BL17)
installed
ERP Kit Name: T64KIT0020133-V40GB17-ES-20031001.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64KIT0020133-V40GB17-ES-20031001

The following ERP kits are available for HP Tru64
UNIX (IX) Internet Express:

NOTE: These ERPs include updates to the solution
provided for SSRT3612.

HP Tru64 UNIX Internet Express (IX) Sendmail v6.12
ERP Kit Name:  T64V51AB-IX-612-SENDMAIL-SSRT3631.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64V51AB-IX-612-SENDMAIL-SSRT3631

HP Tru64 UNIX Internet Express (IX) Sendmail v6.03
ERP Kit Name:  T64V51AB-IX-603-SENDMAIL-SSRT3631.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64V51AB-IX-603-SENDMAIL-SSRT3631

HP Tru64 UNIX Internet Express (IX) Sendmail v5.94
ERP Kit Name:  T64V51AB-IX-594-SENDMAIL-SSRT3631.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64V51AB-IX-594-SENDMAIL-SSRT3631

HP Tru64 UNIX Internet Express (IX) Sendmail v5.86
ERP Kit Name:  T64V51AB-IX-586-SENDMAIL-SSRT3631.tar

General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64V51AB-IX-586-SENDMAIL-SSRT3631

HP Tru64 UNIX Internet Express (IX) Sendmail v5.74
ERP Kit Name:  T64V51AB-IX-574-SENDMAIL-SSRT3631.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64V51AB-IX-574-SENDMAIL-SSRT3631

HP Tru64 UNIX Internet Express (IX) Sendmail v5.63
ERP Kit Name:  T64V51AB-IX-563-SENDMAIL-SSRT3631.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64V51AB-IX-563-SENDMAIL-SSRT3631

HP Tru64 UNIX Internet Express (IX) Sendmail v5.53
ERP Kit Name:  T64V51AB-IX-553-SENDMAIL-SSRT3631.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64V51AB-IX-553-SENDMAIL-SSRT3631

HP Tru64 UNIX Internet Express (IX) Sendmail v5.43
ERP Kit Name:  T64V51AB-IX-543-SENDMAIL-SSRT3631.tar
General ITRC Patch Page:  http://www.itrc.hp.com/
service/patch/mainPage.do
Kit Location:
http://www.itrc.hp.com/service/patch/patchDetail.do?
patchid=T64V51AB-IX-543-SENDMAIL-SSRT3631

To determine if senmail has been successfully
patched following installation of the ERP

To determine if a patch is installed run the following
command:

# /usr/sbin/sendmail -d0.1
  Version 8.9.3 Compiled with: some verbiage Includes
patches for:  SSRT3469 SSRT3531  SSRT3631 <-- confirm
ation of patch install


MD5 and SHA1 checksums are available in the public
patch notice for the ERP kits. You can find information
on how to verify MD5 and SHA1 checksums at:
http://www.support.compaq.com/patches/whats-new.shtml


SUPPORT: For further information, contact HP Services.

SUBSCRIBE: To subscribe to automatically receive future
Security Advisories from the Software Security Response
Team via electronic mail:
http://www.support.compaq.com/patches/mail-list.shtml

REPORT: To report a potential security vulnerability
with any HP supported product, send email to:
security-alert@xxxxxx

As always, HP urges you to periodically review your
system management and security procedures. HP will
continue to review and enhance the security features
of its products and work with our customers to maintain
and improve the security and integrity of their systems.

"HP is broadly distributing this Security Bulletin in
order to bring to the attention of users of the affected
HP products the important security information contained
in this Bulletin. HP recommends that all users determine
the applicability of this information to their individual
situations and take appropriate action. HP does not
warrant that this information is necessarily accurate or
complete for all user situations and, consequently,
HP will not be responsible for any damages resulting from
user's use or disregard of the information provided in
this Bulletin."


©Copyright 2001, 2003 Hewlett-Packard Development
Company, L.P.
Hewlett-Packard Company shall not be liable for technical
or editorial errors or omissions contained herein.
The information in this document is subject to change
without notice. Hewlett-Packard Company and the names of
Hewlett-Packard products referenced herein are trademarks
of Hewlett-Packard Company in the United States and other
countries. Other product and company names mentioned herein
may be trademarks of their respective owners.


*** END PGP VERIFIED MESSAGE ***

- ---
You are currently subscribed to security as: uniras@xxxxxxxxxxxx
To unsubscribe send a blank email to leave-security-22585X@xxxxxxxxxxxxxxxxxxxxxxx
- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by
telephone or Not Protectively Marked information may be sent via EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Compaq for the information
contained in this Briefing.
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some
of the information may have changed since it was released. If the vulnerability
affects you, it may be prudent to retrieve the advisory from the canonical site
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views
and opinions of authors expressed within this notice shall not be used for
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they shall
not be liable for any loss or damage whatsoever, arising from or in connection
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST)
and has contacts with other international Incident Response Teams (IRTs) in
order to foster cooperation and coordination in incident prevention, to prompt
rapid reaction to incidents, and to promote information sharing amongst its
members and the community at large.
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBP4FLnIpao72zK539AQEiYQP/am9RH9h6jl8EUmHquryLnKfNNFgxkzDP
SR8mozd8Jcym/GD58iXyMS79/teMY+P1ASru65KW4rA1DH+hnTawnY25eRoJ4z43
9GHa32vvXMXdE6mQSxRwUsU7WiurwZIqeeU8mr3kyhK1HsXTaDN/0ieqkJaa8qNI
+UiyikPjJCI=
=cI+p
-----END PGP SIGNATURE-----