Operating System:

Published:

05 November 2003

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                  ESB-2003.0762 -- UNIRAS Brief - 604/03
                 NISCC Vulnerability Advisory 006489/X400
                             05 November 2003

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                X.400 Protocol
Publisher:              UNIRAS (UK Govt CERT)
Impact:                 Denial of Service
                        Execute Arbitrary Code/Commands
Access Required:        Remote

- --------------------------BEGIN INCLUDED TEXT--------------------

Title
=====

NISCC Vulnerability Advisory 006489/X400

Vulnerability Issues in Implementations of the X.400 Protocol

Version Information
- - -------------------
Advisory Reference  006489/X400
Release Date        04 November 2003
Last Revision       03 November 2003
Version Number      1

What is affected?
- - -----------------
The vulnerabilities described in this advisory affect the messaging
protocol X.400.  Many vendors include support for this protocol in their
products and may be impacted to varying degrees, if at all.  The web page
detailing this vulnerability includes any vendor specific information that
is available to us.

Please see http://www.uniras.gov.uk/vuls/2003/006489/x400.htm for further
information.

Severity
- - --------
The severity of these vulnerabilities varies by vendor.  Please see the
vendor section below for further information.  Alternatively contact your
vendor for product specific information.

If exploited, these vulnerabilities could allow an attacker to create a
Denial of Service condition. There are indications that it may also be
possible for an attacker to execute code as a result of a buffer overflow.

Summary
- - -------
During 2002 the University of Oulu Security Programming Group (OUSPG)
discovered a number of implementation specific vulnerabilities in the
Simple Network Management Protocol (SNMP).  Subsequent to this discovery,
NISCC has performed and commissioned further work on identifying
implementation specific vulnerabilities in related protocols that are
critical to the UK Critical National Infrastructure.  One of these
protocols is X.400.

NISCC has produced a set of test cases for X.400 and employed them in tests
against equipment supporting X.400.  Vendors of X.400 products have been
contacted and supplied with the test cases for use against their own
products.  These vendors' product lines cover a great deal of the existing
critical information infrastructure worldwide and have therefore been
addressed as a priority.  However, NISCC has subsequently contacted other
vendors whose products employ X.400 and provided them with the test cases.

All users of messaging products that utilise the X.400 protocol are
recommended to take note of this advisory and carry out any remedial
actions suggested by their vendor(s).

This advisory can be viewed on-line at:
http://www.uniras.gov.uk/vuls/2003/006489/x400.htm

[Please note that revisions to this advisory will not be routinely notified
by email.  All subscribers are advised to regularly check the URL above for
updates to this notice.]

Details
- - -------
X.400 is an international standard protocol, published by the International
Telecommunications Union, that supports messaging applications.  As such it
is often found on corporate email/messaging servers and some email security
platforms.

Messages are exchanged utilising Basic Encoding Rules (BER) encoded ASN.1
data structures.  By crafting messages that do not correctly conform to the
X.400 ASN.1 definitions it may be possible to cause a receiving X.400 system
to behave in an anomalous way.  This could result in a Denial of Service
condition or potentially allow the execution of code embedded within the
crafted message.

Further detail will be released as it becomes available.

Solution
- - --------
Please refer to the vendor information for platform specific remediation.

Vendor Information
- - ------------------
A list of vendors affected by this vulnerability is not currently
available. Please visit this web page regularly in order to check for
updates.

Contact Information
- - -------------------
The NISCC Vulnerability Management Team can be contacted as follows:

Email      vulteam@niscc.gov.uk
           Please quote the advisory reference in the subject line

Telephone  +44 (0) 20 7821 1330 Ext 4511
           Monday - Friday 08:30 - 17:00 hrs

Fax        +44 (0) 20 7821 1686

Post       Vulnerability Management Team
           NISCC
           PO Box 832
           London
           SW1P 1BG

We encourage those who wish to communicate via email to make use of our PGP
key.  This is available from http://www.uniras.gov.uk/UNIRAS.asc

Please note that UK government protectively marked material should not be
sent to the email address above.

If you wish to be added to our email distribution list please email your
request to uniras@niscc.gov.uk.

What is NISCC?
- - --------------
For further information regarding the UK National Infrastructure Security
Co-ordination Centre, please visit:
http://www.niscc.gov.uk/aboutniscc/index.htm.

Reference to any specific commercial product, process, or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by NISCC. The views and
opinions of authors expressed within this notice shall not be used for
advertising or product endorsement purposes.

Neither shall NISCC accept responsibility for any errors or omissions
contained within this briefing notice. In particular, they shall not be
liable for any loss or damage whatsoever, arising from or in connection
with the usage of information contained within this notice.

© 2003 Crown Copyright

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBP6hpGyh9+71yA2DNAQEAPwP+MJ4dPNaS146W8p8Y1KJz35FnhapayYSM
907G0EoBzIADQ/m0nE9k3pM06dZKOYmdXXdZJeFkdhloA4J6JH1w8nAvfq9TR9Xr
NTCgdNqn43wRjgqqEwnEnwtGJO456jTjJKY0Xp50vRIxv4sFT0oQAdzrTG9ooCP9
AeIWglbBug4=
=4KmH
-----END PGP SIGNATURE-----