-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                          ESB-2008.0268 -- [AIX]
                  AIX Perl buffer overflow vulnerability
                               14 March 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Perl
Publisher:            IBM
Operating System:     AIX
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-5116

Ref:                  ESB-2007.0866

Original Bulletin:    
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4172

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

IBM SECURITY ADVISORY

First Issued: Tue Dec 18 11:33:00 CST 2007
| Updated: Wed Dec 19 13:45:27 CST 2007
|          Added perl PTF for APARs IY98394 and IY98395 to ifix tar file
| Updated: Tue Mar 11 12:57:00 CDT 2008
| Fixed fileset levels and APAR numbers
===============================================================================
                           VULNERABILITY SUMMARY

VULNERABILITY:   AIX Perl buffer overflow vulnerability

PLATFORMS:       AIX 5.2, 5.3, 6.1

SOLUTION:        Apply the APAR, interim fix or workaround as
                 described below.

THREAT:          A remote attacker may run arbitrary code.

CERT VU Number:  n/a
CVE Number:      CVE-2007-5116
===============================================================================
                           DETAILED INFORMATION

I. OVERVIEW

    Perl is a free software scripting language interpreter providing a
    rich set of features provided as part of the base AIX Operating
    System environment.

II. DESCRIPTION

    A buffer overflow vulnerability exists in the 'perl.rte' fileset.
    A remote attacker may execute arbitrary code if a Perl script
    executing on the system is listening on a network port. If
    exploited the attacker can execute arbitrary code with the same
    privileges as the script.

    For more details please visit:

        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116

III. IMPACT

    The successful exploitation of this vulnerability allows a remote
    attacker to execute arbitrary code.

IV. PLATFORM VULNERABILITY ASSESSMENT

    To determine if your system is vulnerable, run the following
    command:

    # lslpp -l perl.rte

    The following fileset levels are vulnerable:

    AIX Fileset        AIX Level       Lower Level       Upper Level
    ----------------------------------------------------------------
    perl.rte           5.2.0           5.8.0.0           5.8.0.106
|   perl.rte           5.3.0           5.8.2.0           5.8.2.61
|   perl.rte           5.3.7           5.8.2.70          5.8.2.70
    perl.rte           6.1.0           5.8.2.70          5.8.2.70

    NOTE: Affected customers are urged to upgrade to the latest
    applicable Technology Level and Service Pack.

V. SOLUTIONS

    A. APARS

        IBM provides the following fixes:

        AIX Level           APAR number        Availability
        ---------------------------------------------------
        5.2                 IZ10220            05/14/2008 
|       5.3 through TL06    IZ10244            Now
|       5.3 TL07            IZ10245            Now
|       6.1                 IZ10245            Now

        Subscribe to the APARs here:

        http://www.ibm.com/support/docview.wss?uid=isg1IZ10220
        http://www.ibm.com/support/docview.wss?uid=isg1IZ10244

        By subscribing, you will receive periodic email alerting you
        to the status of the APAR, and a link to download the fix once
        it becomes available.

        AIX Version 5 APARs can be downloaded from:

        http://www.ibm.com/servers/eserver/support/unixservers/aixfixes.html

        NOTE: Affected customers are urged to upgrade to the latest
        applicable Technology Level and Service Pack.

    B. INTERIM FIXES

        Interim fixes are available.  The interim fix can be
        downloaded via ftp from:

        ftp://aix.software.ibm.com/aix/efixes/security/perl_ifix.tar

|       The latest perl interim fixes do not include all of the files
|       affected by the previous perl security vulnerability, fixed by
|       APARs IY98394 (52) and IY98395 (53).  If you have the previous
|       ifix for IY98394 or IY98395 installed, please remove the
|       previous ifix, install the appropriate PTF
|       (perl.rte.5.8.0.106.U or perl.rte.5.8.2.61.U), and then
|       install the latest ifix with the procedure below.  The PTFs
|       have been added to the updated interim fix tar file.  Please
|       note that the latest ifix itself has not changed with this
|       update, we have only added the PTFs to the tar file.

        The link above is to a tar file containing this signed
        advisory, interim fix packages, and PGP signatures for each
        package.  The interim fixes below include prerequisite
        checking. This will enforce the correct mapping between the
        fixes and AIX Technology Levels.

        AIX Fileset         AIX Release and      Interim fix
                            Technology Level
        -----------------------------------------------------------------
        perl.rte            5200-08              IZ10220.071206.epkg.Z
        perl.rte            5200-09              IZ10220.071206.epkg.Z
        perl.rte            5200-10              IZ10220.071206.epkg.Z

        perl.rte            5300-05              IZ10244.071206.epkg.Z
        perl.rte            5300-06              IZ10244.071206.epkg.Z
        perl.rte            5300-07              IZ10244.071206.epkg.Z

        perl.rte            6100-00 (same as 53) IZ10244.071206.epkg.Z

        IMPORTANT: If possible, it is recommended that a mksysb backup
        of the system be created.  Verify it is both bootable and
        readable before proceeding.

        These interim fixes have not been fully regression tested;
        thus, IBM does not warrant the fully correct functionality of
        the interim fix.
        
        Verify you have retrieved the fixes intact:

        The checksums below were generated using the "sum", "cksum",
        "csum -h MD5" (md5sum), and "csum -h SHA1" (sha1sum) commands
        and are as follows:

        sum         filename
        ------------------------------------
        21674  5683 IZ10220.071206.epkg.Z
        43658  5880 IZ10244.071206.epkg.Z
|       60869 23239 perl.rte.5.8.0.106.U
|       61317 22846 perl.rte.5.8.2.61.U

        cksum             filename
        ------------------------------------------
        3383682558 5819246 IZ10220.071206.epkg.Z
        4001149063 6020447 IZ10244.071206.epkg.Z
|       2242377008 23796736 perl.rte.5.8.0.106.U
|       3794525633 23394304 perl.rte.5.8.2.61.U

        csum -h MD5 (md5sum)              filename
        ----------------------------------------------------------
        208b132ee3ff67d7ac4641e1ef9b5c6b  IZ10220.071206.epkg.Z
        42e6ae761b9ec36ad653a3fa294fd184  IZ10244.071206.epkg.Z
|       418dda5cb0f895205ab489bc2f0c0baa  perl.rte.5.8.0.106.U
|       4e6cad28ba5cf25512b0ce22f9dff54b  perl.rte.5.8.2.61.U

        csum -h SHA1 (sha1sum)                    filename
        ------------------------------------------------------------------
        aea47a5acc29ad3b5eee23de3cee47d53706e79a  IZ10220.071206.epkg.Z
        21db9fa9b433a2fc62d7897dab2c1a62e55a6a9e  IZ10244.071206.epkg.Z
|       4d57b03a8a558b154abfb75da6bac716b0cf3911  perl.rte.5.8.0.106.U
|       0d331754e38c4fb6458219a91a2f6703b511eaba  perl.rte.5.8.2.61.U

        To verify the sums, use the text of this advisory as input to
        csum, md5sum, or sha1sum. For example:

        csum -h SHA1 -i Advisory.asc
        md5sum -c Advisory.asc
        sha1sum -c Advisory.asc

        These sums should match exactly. The PGP signatures in the
        compressed tarball and on this advisory can also be used to
        verify the integrity of the various files they correspond to.
        If the sums or signatures cannot be confirmed, double check
        the command results and the download site address.  If those
        are OK, contact IBM AIX Security at
        security-alert@austin.ibm.com and describe the discrepancy.

    C. INTERIM FIX INSTALLATION

        These packages use the new Interim Fix Management Solution to
        install and manage interim fixes.  More information can be
        found at:

        http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html

        To preview an epkg interim fix installation execute the
        following command:

        # emgr -e ipkg_name -p       # where ipkg_name is the name of the
                                     # interim fix package being previewed.

        To install an epkg interim fix package, execute the following
        command:

        # emgr -e ipkg_name -X       # where ipkg_name is the name of the
                                     # interim fix package being installed.

        The "X" flag will expand any filesystems if required.

VI. WORKAROUNDS

    If you are running perl network services there are no known
    workarounds.  If the perl services are not needed and are running,
    shut them down.

VII. OBTAINING FIXES

    AIX Version 5 APARs can be downloaded from:

|       http://www.ibm.com/eserver/support/fixes/fixcentral/main/pseries/aix

    Security related Interim Fixes can be downloaded from:

        ftp://aix.software.ibm.com/aix/efixes/security

VIII. CONTACT INFORMATION

    If you would like to receive AIX Security Advisories via email,
    please visit:

        http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd
 
    Comments regarding the content of this announcement can be
    directed to:

        security-alert@austin.ibm.com

    To request the PGP public key that can be used to communicate
    securely with the AIX Security Team you can either:

        A. Send an email with "get key" in the subject line to:

            security-alert@austin.ibm.com

        B. Download the key from a PGP Public Key Server. The key ID is:

            0xA6A36CCC

    Please contact your local IBM AIX support center for any
    assistance.

    eServer is a trademark of International Business Machines
    Corporation.  IBM, AIX and pSeries are registered trademarks of
    International Business Machines Corporation.  All other trademarks
    are property of their respective holders.

IX. ACKNOWLEDGMENTS

    Tavis Ormandy and Will Drewry are credited with the discovery of
    this issue.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (AIX)

iD8DBQFH1soz8lficKajbMwRAnN6AKCA9vFrheteUBS+MS9ANCJ6XZqe2wCfa+tR
ZG4sLhhhfFQL2EfrZj8RZMY=
=7PL/
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR9nRkyh9+71yA2DNAQIwqQP/TTdhompYc0dyJL2VRvtB0kRvEdpSfr/F
fA+GM8YkKE+Fgfs2gacaDn1WQ1v0N+PRWFG78eNlkA10JJrjU4/QjOHTuMuugsP3
HeBqCvtUrN3YikdrHqCePMf9tZ919L+mvVIo3k+BcY7V9Vz3gTZvrm9vIoAHCfeB
zcYGQoJhiUg=
=JSWE
-----END PGP SIGNATURE-----