Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2001.088 -- COMPAQ SSRT1-38U/66U/68U/69U Security Advisory Multiple Issues with BIND 1 March 2001 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: BIND Vendor: ISC Operating System: Tru64 UNIX V4.0d Tru64 UNIX V4.0f Tru64 UNIX V4.0g Tru64 UNIX V5.0 Tru64 UNIX V5.0a Tru64 UNIX V5.1 Impact: Denial of Service Execute Arbitrary Code/Commands User Access Access Required: Remote Ref: AA-2001.01 ESB-2001.044 ESB-2001.039 ESB-2001.038 ESB-2001.037 ESB-2000.343 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ** NO RESTRICTIONS FOR DISTRIBUTION ** ================================================== SOURCE: Compaq Computer Corporation Software Security Response Team CASE ID: SSRT1-38U, SSRT1-66U,SSRT1-68U, SSRT1-69U TITLE: Multiple Potential Security Issues in BIND (X-REF: CERT CA-2000-20 & CERT CA-2001-02 ) Date: 26-FEB-2001 "Compaq is broadly distributing this Security Advisory in order to bring to the attention of users of Compaq products the important security information contained in this Advisory. Compaq recommends that all users determine the applicability of this information to their individual situations and take appropriate action. Compaq does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, Compaq will not be responsible for any damages resulting from user's use or disregard of the information provided in this Advisory." IMPACT: Versions Affected: Compaq's Tru64 UNIX V4.0d, V4.0f, V4.0g, V5.0, V5.0a, V5.1 Versions Not Affected: TCP/IP Services for Compaq OpenVMS A number of potential security vulnerabilities have recently been discovered for BIND released with Tru64 UNIX, where under certain circumstances, system integrity may be compromised. This advisory provides solution information for 6 (six) issues spanning multiple versions of BIND 8.* and BIND 4.* SEVERITY: HIGH PROBLEM STATEMENT: Several security problems were recently found in the BIND software used by Compaq Tru64 UNIX. Specific details have been published by a number of groups to the internet. Technical details of these vulnerabilities are publicized by the ISC at: http://www.isc.org/products/BIND/bind-security.html The advisory information is not duplicated here. The purpose of this advisory is to provide notice of remedial solutions for the problems as it impacts Compaq Tru64 UNIX. SOLUTION: Compaq Tru64 UNIX engineering has provided a solutions for the potential problems, details are included below. NOTE: The solutions will be included in future releases of Tru64 UNIX aggregate patch kits. Until that has happened the kits identified should be reinstalled accordingly after an upgrade to any affected version listed. The patches identified are available from the Compaq FTP site http://ftp1.support.compaq.com/public/dunix/ then choose the version directory needed and search for the patch by name. ...................................................................... CERT VU#325431 INFOLEAK - servers may disclose environment variables X-REF: SSRT1-66U,SSRT1-68U,SSRT1-69U ...................................................................... Compaq Tru64 UNIX V5.1 - patch: SSRT1-66U_v5_1.tar Compaq Tru64 UNIX V5.0 & V5.0a - V5.0 patch: SSRT1-68U_v5_0.tar V5.0a patch: SSRT1-68U_v5_0a.tar Compaq Tru64 UNIX V4.0D/F/G - V4.0d patch: SSRT1-69U_v4_0d.tar V4.0f patch: SSRT1-69U_v4_0f.tar V4.0g patch: SSRT1-69U_v4_0g.tar TCP/IP Services for Compaq OpenVMS - Not Vulnerable ...................................................................... CERT VU#572183 - BIND 4 Buffer overflow in nslookupComplain() X-REF: SSRT1-69U CERT VU#868916 - BIND 4 Input validation error in nslookupComplain() X-REF: SSRT1-69U ...................................................................... Compaq Tru64 UNIX V5.0, V5.0a, V5.1 - Not Vulnerable Compaq Tru64 UNIX V4.0D/F/G - V4.0d patch: SSRT1-69U_v4_0d.tar V4.0f patch: SSRT1-69U_v4_0f.tar V4.0g patch: SSRT1-69U_v4_0g.tar TCP/IP Services for Compaq OpenVMS - Not Vulnerable ...................................................................... CERT VU#196945- BIND 8 contains buffer overflow in transaction signature handling code X-REF: SSRT1-66U, SSRT1-68U ...................................................................... Compaq Tru64 UNIX V5.1 - patch: SSRT1-66U_v5_1.tar Compaq Tru64 UNIX V5.0 & V5.0a - V5.0 patch: SSRT1-68U_v5_0.tar V5.0a patch: SSRT1-68U_v5_0a.tar Compaq Tru64 UNIX V4.0D/F/G - Not Vulnerable TCP/IP Services for Compaq OpenVMS - Not Vulnerable ...................................................................... CERT CA-2000-20 - BIND 8 The "zxfr bug" X-REF: SSRT1-38U ...................................................................... Compaq Tru64 UNIX V5.1 - patch: SSRT1-66U_v5_1.tar Compaq Tru64 UNIX V5.0 & V5.0a - V5.0 patch: SSRT1-68U_v5_0.tar V5.0a patch: SSRT1-68U_v5_0a.tar Compaq Tru64 UNIX V4.0D/F/G - Not Vulnerable TCP/IP Services for Compaq OpenVMS - Not Vulnerable ...................................................................... CERT CA-2000-20 - BIND 8 The "srv bug" X-REF: SSRT1-38U ...................................................................... Compaq Tru64 UNIX V5.1 - patch: SSRT1-66U_v5.1_tar Compaq Tru64 UNIX V5.0 & V5.0a - V5.0 patch: SSRT1-68U_v5_0.tar V5.0a patch: SSRT1-68U_v5_0a.tar Compaq Tru64 UNIX V4.0D/F/G - Not Vulnerable TCP/IP Services for Compaq OpenVMS - Not Vulnerable NOTE: For Compaq Tru64 UNIX V4.0e please contact your normal Compaq Services channel. To subscribe to automatically receive future NEW Security Advisories from the Software Security Response Team at Compaq via electronic mail, Use your browser to get to the http://www.support.compaq.com/patches/mailing-list.shtml and sign up. Select "Security and Individual Notices" for immediate dispatch notifications. If you need further information, please contact your normal Compaq Services support channel. Compaq appreciates your cooperation and patience. We regret any inconvenience applying this information may cause. As always, Compaq urges you to periodically review your system management and security procedures. Compaq will continue to review and enhance the security features of its products and work with customers to maintain and improve the security and integrity of their systems. (c) Copyright 2001 Compaq Computer Corporation. All rights reserved - -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com> iQA/AwUBOpvCUqgxZJFjvD74EQI4CQCdFAVJWK1Ye6k4NZpToGhMxPCFH2QAnRVz V/wStBTQ02MAG+JtzA8N7W5G =AqRC - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBOp4ruyh9+71yA2DNAQFArwP/ahGvnB8k3OuE6czeEsWR55FBEz6DxrZh mscIxi4LQ85fQXeBMIB7xTdRwNjy1OSk2J4+wQyNHli9NPiZ/LIMTG/ihhuWncNv +bBbNDQDJT+Lkg7GL6OR5KJ/Of/Grt1xHJ7EihmpeAgaMnLCjBR3LLWLgxr6Y/HO 6pe86GTpaXo= =vyYy -----END PGP SIGNATURE-----