-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0620
             Vulnerability in BIND impact AIX (CVE-2016-9131)
                               9 March 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM
Publisher:         IBM
Operating System:  AIX
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-9131  

Reference:         ESB-2017.0265
                   ESB-2017.0126
                   ESB-2017.0097.2
                   ESB-2017.0088
                   ESB-2017.0087

Original Bulletin: 
   https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc

- --------------------------BEGIN INCLUDED TEXT--------------------

- ------------------------------------------------------------------------------
1.  AIX 5.3

- - TITLE: Vulnerability in BIND impact AIX (CVE-2016-9131)
- - URL: http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=5284&myns=aix&mynp=OCOE607&mync=E&cm_sp=aix-_-OCOE607-_-E
- - ABSTRACT: IBM SECURITY ADVISORY

First Issued: Tue Mar  7 15:49:49 CST 2017

The most recent version of this document is available here:

http://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc
https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc
ftp://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc


Security Bulletin:  Vulnerability in BIND impact AIX (CVE-2016-9131)

===============================================================================

SUMMARY:

There is a vulnerability in BIND that impacts AIX.


===============================================================================

VULNERABILITY DETAILS:

CVEID: CVE-2016-9131 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
DESCRIPTION: ISC BIND is vulnerable to a denial of service, caused by the
improper handling of responses during recursion. By sending a malformed 
response to a RTYPE ANY query, a remote attacker could exploit this 
vulnerability to trigger an assertion failure.
CVSS Base Score: 7.5 
CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/120472 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


AFFECTED PRODUCTS AND VERSIONS:

AIX  5.3, 6.1, 7.1, 7.2

The following fileset levels are vulnerable:

key_fileset = aix

Fileset                    Lower Level  Upper Level KEY 
- ------------------------------------------------------------
bos.net.tcp.client         5.3.12.0     5.3.12.10   key_w_fs
bos.net.tcp.client         6.1.9.0      6.1.9.200   key_w_fs
bos.net.tcp.client         7.1.3.0      7.1.3.48    key_w_fs
bos.net.tcp.client         7.1.4.0      7.1.4.30    key_w_fs
bos.net.tcp.client_core    7.2.0.0      7.2.0.3     key_w_fs
bos.net.tcp.client_core    7.2.1.0      7.2.1.1     key_w_fs



Note:  To find out whether the affected filesets are installed 
on your systems, refer to the lslpp command found in AIX user's guide.

Example:  lslpp -L | grep -i bos.net.tcp.client

REMEDIATION:

A. APARS

IBM has assigned the following APARs to this problem:

AIX Level APAR     Availability  SP   KEY
- ------------------------------------------------
5.3.12    IV93366    **          N/A  key_w_apar
6.1.9     IV93361    **          SP9  key_w_apar
7.1.3     IV93362    **          SP9  key_w_apar
7.1.4     IV93363    **          SP4  key_w_apar
7.2.0     IV93403    **          SP4  key_w_apar
7.2.1     IV93365    **          SP2  key_w_apar

** Please refer to AIX support lifecycle information page for 
availability of Service Packs:
http://www-01.ibm.com/support/docview.wss?uid=isg3T1012517

Subscribe to the APARs here:

http://www.ibm.com/support/docview.wss?uid=isg1IV93366
http://www.ibm.com/support/docview.wss?uid=isg1IV93361
http://www.ibm.com/support/docview.wss?uid=isg1IV93362 
http://www.ibm.com/support/docview.wss?uid=isg1IV93363
http://www.ibm.com/support/docview.wss?uid=isg1IV93403
http://www.ibm.com/support/docview.wss?uid=isg1IV93365

https://www.ibm.com/support/docview.wss?uid=isg1IV93366
https://www.ibm.com/support/docview.wss?uid=isg1IV93361
https://www.ibm.com/support/docview.wss?uid=isg1IV93362 
https://www.ibm.com/support/docview.wss?uid=isg1IV93363
https://www.ibm.com/support/docview.wss?uid=isg1IV93403
https://www.ibm.com/support/docview.wss?uid=isg1IV93365

By subscribing, you will receive periodic email alerting you
to the status of the APAR, and a link to download the fix once
it becomes available.

B. FIXES

Fixes are available.

The fixes can be downloaded via ftp or http from:

ftp://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar
http://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar
https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar

The links above are to a tar file containing this signed
advisory, fix packages, and OpenSSL signatures for each
package.
The fixes below include prerequisite checking. This will
enforce the correct mapping between the fixes and AIX
Technology Levels.

AIX Level  Interim Fix (*.Z)         KEY
- ----------------------------------------------
5.3.12.9   IV93366m9a.170215.epkg.Z  key_w_fix
6.1.9.6    IV93361m8a.170215.epkg.Z  key_w_fix
6.1.9.7    IV93361m8a.170215.epkg.Z  key_w_fix
6.1.9.8    IV93361m8a.170215.epkg.Z  key_w_fix
7.1.3.6    IV93362m8a.170215.epkg.Z  key_w_fix
7.1.3.7    IV93362m8a.170215.epkg.Z  key_w_fix
7.1.3.8    IV93362m8a.170215.epkg.Z  key_w_fix
7.1.4.1    IV93363m3a.170215.epkg.Z  key_w_fix
7.1.4.2    IV93363m3a.170215.epkg.Z  key_w_fix 
7.1.4.3    IV93363m3a.170215.epkg.Z  key_w_fix
7.2.0.1    IV93403m3a.170215.epkg.Z  key_w_fix
7.2.0.2    IV93403m3a.170215.epkg.Z  key_w_fix
7.2.0.3    IV93403m3a.170215.epkg.Z  key_w_fix
7.2.1.0    IV93365m1a.170215.epkg.Z  key_w_fix
7.2.1.1    IV93365m1a.170215.epkg.Z  key_w_fix



Please note that the above table refers to AIX TL/SP level as
opposed to fileset level, i.e., 7.1.3.5 is AIX 7100-03-05.

           
The above fixes are cumulative and address previously issued
AIX BIND security bulletins with respect to SP and TL.           

To extract the fixes from the tar file:

tar xvf bind_fix15.tar
cd bind_fix15 

Verify you have retrieved the fixes intact:

The checksums below were generated using the
"openssl dgst -sha256 [filename]" command as the following:

openssl dgst -sha256
filename                 KEY
- ----------------------------------------------------------
53f40b333c357a59ddd41dab42d8dcb0b8f2caf6ac4d10e1accac635eaf63230  
IV93366m9a.170215.epkg.Z key_w_csum
f3c62e3f3cf77d3ad49f7a253437fc1c07664f084a7e6cc9f2edfc434d43a20f  
IV93361m8a.170215.epkg.Z key_w_csum
70315bb6134e3e95423d7861de6ee1a1e2192b82b2d4ad3789aabe7879956f54  
IV93362m8a.170215.epkg.Z key_w_csum
2ee8b789c628a0d5aa52606fc6cf8ef695da8cadae3fc7065270eaa84b6b980c  
IV93363m3a.170215.epkg.Z key_w_csum
47f7846b5e7b21e12ea6f2d6a18d82192659306449b9be432eca9cba18f6dda2  
IV93403m3a.170215.epkg.Z key_w_csum
393ef4ed967efe3b08f39ad7f595e62f302db309dd6d78c3fec8b7ac983c6c68  
IV93365m1a.170215.epkg.Z key_w_csum
            
These sums should match exactly. The OpenSSL signatures in the tar
file and on this advisory can also be used to verify the
integrity of the fixes.  If the sums or signatures cannot be
confirmed, contact IBM Support at
http://ibm.com/support/ and describe the discrepancy.

openssl dgst -sha1 -verify [pubkey_file] -signature 
[advisory_file].sig [advisory_file]

openssl dgst -sha1 -verify [pubkey_file] -signature 
[ifix_file].sig [ifix_file]

Published advisory OpenSSL signature file location:


http://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc.sig

https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc.sig

ftp://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc.sig 

C. FIX AND INTERIM FIX INSTALLATION

IMPORTANT: If possible, it is recommended that a mksysb backup
of the system be created.  Verify it is both bootable and
readable before proceeding.

To preview a fix installation:

installp -a -d fix_name -p all  # where fix_name is the name of the
                                # fix package being previewed.
To install a fix package:

installp -a -d fix_name -X all  # where fix_name is the name of the
                                # fix package being installed.

Interim fixes have had limited functional and regression
testing but not the full regression testing that takes place
for Service Packs; however, IBM does fully support them.

Interim fix management documentation can be found at:


http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html

https://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html

To preview an interim fix installation:

emgr -e epkg_name -p         # where epkg_name is the name of the
                             # interim fix package being previewed.

To install an interim fix package:

emgr -e epkg_name -X         # where epkg_name is the name of the
                             # interim fix package being installed.

WORKAROUNDS AND MITIGATIONS:

None.


===============================================================================

CONTACT US:

Note: Keywords labeled as KEY in this document are used for parsing
purposes.

If you would like to receive AIX Security Advisories via email,
please visit "My Notifications":

http://www.ibm.com/support/mynotifications
https://www.ibm.com/support/mynotifications

To view previously issued advisories, please visit:

http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq
https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq

Contact IBM Support for questions related to this announcement:

http://ibm.com/support/
https://ibm.com/support/



To obtain the OpenSSL public key that can be used to verify the
signed advisories and ifixes:

Download the key from our web page:

http://www.ibm.com/systems/resources/systems_p_os_aix_security_pubkey.txt
https://www.ibm.com/systems/resources/systems_p_os_aix_security_pubkey.txt

To obtain the PGP public key that can be used to communicate
securely with the AIX Security Team via security-alert@austin.ibm.com you
can either:

A. Download the key from our web page:

http://www.ibm.com/systems/resources/systems_p_os_aix_security_pgppubkey.txt
https://www.ibm.com/systems/resources/systems_p_os_aix_security_pgppubkey.txt

B. Download the key from a PGP Public Key Server. The key ID is:

0x28BFAA12

Please contact your local IBM AIX support center for any
assistance.


REFERENCES:

Complete CVSS v3 Guide: 
http://www.first.org/cvss/user-guide
https://www.first.org/cvss/user-guide

On-line Calculator v3:
http://www.first.org/cvss/calculator/3.0
https://www.first.org/cvss/calculator/3.0


ACKNOWLEDGEMENTS:

None.


CHANGE HISTORY:

First Issued: Tue Mar  7 15:49:49 CST 2017



===============================================================================

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact 
of this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin. 

Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ------------------------------------------------------------------------------

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=XmrX
-----END PGP SIGNATURE-----