-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                          ESB-2008.0190 -- [AIX]
        IBM Pegasus CIM Server for Director on AIX vulnerabilities
                             22 February 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              IBM Pegasus CIM Server for Director
Publisher:            IBM
Operating System:     AIX 6.1
                      AIX 5.3
                      AIX 5.2
Impact:               Root Compromise
                      Denial of Service
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-0495 CVE-2008-0003

Ref:                  ESB-2008.0017

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

IBM SECURITY ADVISORY

First Issued: Thu Feb 21 10:43:47 CST 2008
===============================================================================
                           VULNERABILITY SUMMARY

VULNERABILITY:   IBM Pegasus CIM Server for Director on AIX vulnerabilities.

PLATFORMS:       AIX 5.2, 5.3, 6.1

SOLUTION:        Apply the fix or workaround as described below.

THREAT:          A remote attacker may run arbitrary code with root privileges,
                 and/or cause a Denial of Service (DoS) attack.

CERT VU Number:  n/a
CVE Number:      CVE-2008-0003, CVE-2008-0495
===============================================================================
                           DETAILED INFORMATION

I. OVERVIEW

    IBM Pegasus CIM Server for Director provides common information model
    (CIM) object management. This is a framework supporting Web-Based 
    Enterprise Management (WBEM) services. WBEM is a platform and resource 
    independent standard from the Distributed Management Task Force (DMTF).
    WBEM defines a CIM, and communication protocol for resource monitoring 
    and control. 

    Two vulnerabilities have been addressed in the IBM Pegasus CIM Server
    for Director. The first is a stack buffer overflow flaw found in the PAM
    authentication code in the CIM management server. The second is a Denial
    of Service (DoS) vulnerability against the CIM service daemon itself.

II. DESCRIPTION

    A stack-based buffer overflow vulnerability exists in the IBM Pegasus CIM 
    Server for Director in which an unauthenticated remote user could trigger 
    this flaw and potentially execute arbitrary code with root privileges
    (CVE-2008-0003). In addition a denial-of-service (DoS) issue exists in
    the IBM Pegasus CIM Server for Director.

III. IMPACT

    The successful exploitation of these vulnerabilities allows a
    non-privileged remote user to execute code with root privileges
    and/or cause a denial of service against the CIM server.

IV. PLATFORM VULNERABILITY ASSESSMENT

    To determine if your system is vulnerable, run the following commands:

    lslpp -L sysmgt.pegasus.cimserver.rte

    The following fileset levels are vulnerable for all supported versions
    of AIX:

    AIX Fileset                   Fileset Levels
    ----------------------------------------------------------------
    sysmgt.pegasus.cimserver.rte  2.5.1.20
                                  2.5.1.21
                                  2.5.1.30

    sysmgt.pegasus.cimserver.rte  2.6.1.0
                                  2.6.1.1

V. SOLUTIONS

    A. Installable images including these fixes for AIX 5.3 and AIX 6.1 will 
       be available for IBM Pegasus CIM Server on the IBM Director Download 
       website approximately in April 2008.  These images will install 
       fileset 'sysmgt.cimserver.pegasus.rte' level 2.6.1.20.

    B. INTERIM FIXES

        Interim Fixes are available.  The fixes can be downloaded in two ways:

        1. Via HTTP or Download Director from the IBM Director Web Download 
           Site:

           https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=dmp

           NOTE: Once logged in to the site, the fixes can be located
           using the following steps:

           Fixes for Pegasus 2.6.1 on AIX:
            - Select IBM Director for AIX and accept the license.
            - Find the fixes in the IBM Pegasus CIM Server for Director on 
              AIX section:

                  AIX 5.2: Efix_644427.080123_AIX5.2.tar.gz
                  AIX 5.3: Efix_644427.080123_AIX5.3_6.1.tar.gz
                  AIX 6.1: Efix_644427.080123_AIX5.3_6.1.tar.gz

           Fixes for Pegasus 2.5.1 on AIX:
            - Select IBM Director-Archives.
            - Find the fixes in the IBM Director for AIX and Linux on 
              POWER section:

                  AIX (all versions): Efix_641416.080123_AIX.tar.gz

           Install instructions are included in the file:

               CIM_Pegasus_Providers_AIX.README.html 

        2. Via FTP from the AIX Software Download Site:

           ftp://aix.software.ibm.com/aix/efixes/security/pegasus_ifix.tar

        The link above is to a tar file containing this signed
        advisory, interim fix packages, and PGP signatures for each
        package.  The interim fixes below include prerequisite
        checking. This will enforce the correct mapping between the
        fixes and AIX Technology Levels.

        Version        AIX Release  Interim fix
        -----------------------------------------------------------------
        Pegasus 2.5.1  All          Efix_641416.080123_AIX.tar.gz
        Pegasus 2.6.1  5.2          Efix_644427.080123_AIX5.2.tar.gz
        Pegasus 2.6.1  5.3, 6.1     Efix_644427.080123_AIX5.3_6.1.tar.gz

        To extract the fixes from the tar file:

        tar xvf pegasus_ifix.tar
        cd pegasus_ifix

        IMPORTANT: If possible, it is recommended that a mksysb backup
        of the system be created.  Verify it is both bootable and
        readable before proceeding.

        These interim fixes have not been fully regression tested;
        thus, IBM does not warrant the fully correct functionality of
        the interim fix.
        
        Verify you have retrieved the fixes intact:

        The checksums below were generated using the "sum", "cksum",
        "csum -h MD5" (md5sum), and "csum -h SHA1" (sha1sum) commands
        and are as follows:

sum         filename
- - ------------------------------------
53770  3610 Efix_641416.080123_AIX.tar.gz
47815   169 Efix_644427.080123_AIX5.2.tar.gz
33258   169 Efix_644427.080123_AIX5.3_6.1.tar.gz

cksum              filename
- - ------------------------------------------
4271833127 3695746 Efix_641416.080123_AIX.tar.gz
1284858963  172713 Efix_644427.080123_AIX5.2.tar.gz
2454864014  172998 Efix_644427.080123_AIX5.3_6.1.tar.gz

csum -h MD5 (md5sum)              filename
- - ----------------------------------------------------------
8d71ff3be9f60722d4f158bb0e5c2558  Efix_641416.080123_AIX.tar.gz
3aadb16572166fd190a6fb63ddbf85da  Efix_644427.080123_AIX5.2.tar.gz
04c876224b116e2c23778ca941669e29  Efix_644427.080123_AIX5.3_6.1.tar.gz

csum -h SHA1 (sha1sum)                    filename
- - ------------------------------------------------------------------
1b9edb622a24c06cf8155fd836235a4a337fbfaf  Efix_641416.080123_AIX.tar.gz
3c69ca8f6213312c4179e6e026cd3ebe8469b7ed  Efix_644427.080123_AIX5.2.tar.gz
022a84b9bd0710bce3dc295b96ddeb0214355563  Efix_644427.080123_AIX5.3_6.1.tar.gz

        To verify the sums, use the text of this advisory as input to
        csum, md5sum, or sha1sum. For example:

        csum -h SHA1 -i Advisory.asc
        md5sum -c Advisory.asc
        sha1sum -c Advisory.asc

        These sums should match exactly. The PGP signatures in the tar
        file and on this advisory can also be used to verify the
        integrity of the fixes.  If the sums or signatures cannot be
        confirmed, contact IBM AIX Security at
        security-alert@austin.ibm.com and describe the discrepancy.

    C. INTERIM FIX INSTALLATION

        Please refer to the installation instructions in the following
        files:

        Efix_641416_readme.html
        Efix_644427_readme.html

VI. WORKAROUNDS

    There are no workarounds for these vulnerabilities other than 
    uninstalling the affected software.

VII. OBTAINING FIXES

    Security related Interim Fixes can be downloaded from:

        ftp://aix.software.ibm.com/aix/efixes/security

VIII. CONTACT INFORMATION

    If you would like to receive AIX Security Advisories via email,
    please visit:

        http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd
 
    Comments regarding the content of this announcement can be
    directed to:

        security-alert@austin.ibm.com

    To request the PGP public key that can be used to communicate
    securely with the AIX Security Team you can either:

        A. Send an email with "get key" in the subject line to:

            security-alert@austin.ibm.com

        B. Download the key from a PGP Public Key Server. The key ID is:

            0xA6A36CCC

    Please contact your local IBM AIX support center for any
    assistance.

    eServer is a trademark of International Business Machines
    Corporation.  IBM, AIX and pSeries are registered trademarks of
    International Business Machines Corporation.  All other trademarks
    are property of their respective holders.

IX. ACKNOWLEDGMENTS

    RedHat security auditors and the IBM Hardware Management Console
    for discovering/reporting these vulnerabilities.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (AIX)

iD8DBQFHvbHe8lficKajbMwRArWuAKCZTY4Cx7ttVtvREp1ZkW/bgZPEFACaA8bv
LPxfbPEyDgoquvEG+E/NNbg=
=4y99
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR74bxSh9+71yA2DNAQIz2wQAkLhGbHj63qKzkOhXugeeaN9uev6b2LC7
g13PdtbfUuW+Ha4RtgH6ZzXYodEq9Vl/0P3licxLm8vfZJL9+W3PmyvVvGMAfs4y
T1eWN9GwJuhgYadQsUoE1zuLQe0VmAPGAy3oorJfWNb8fr/90S+5K1/QsKtbVMSy
miiCwkgmmyI=
=t9ss
-----END PGP SIGNATURE-----