From Security@securityfocus.com Fri Jun 20 18:12:31 2003 From: Security@securityfocus.com, Alerts@securityfocus.com, Novell@securityfocus.com, Inc. To: bugtraq@securityfocus.com Date: Fri, 06 Jun 2003 12:18:04 -0600 Reply-To: EINFO@novell.com Subject: NOVL-2003-2966205 - iChain 2.2 Field Patch 1a -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 For Immediate Disclosure ============================== Summary ============================== Security Alert: NOVL-2003-2966205 Title: iChain 2.2 Field Patch 1a Date: 05-Jun-2003 Revision: Original Product Name: iChain 2.2 OS/Platform(s): Netware Reference URL: http://support.novell.com/servlet/tidfinder/2966205 Vendor Name: Novell, Inc. Vendor URL: http://www.novell.com Security Alerts: http://support.novell.com/security-alerts Affects: Various Identifiers: None Credits: Axel Dunkel, Dunkel GmbH Others ============================ Description ============================ DoS caused by buffer overflow abend running special script against login. For security reasons, NCPIP.NLM and JSTCP.NLM were renamed to NCPIP.OLD and JSTCP.OLD. NCPIP.NLM should never be loaded on a PUBLIC interface unless port 524 is blocked by a firewall, even if using the NCP exclude options. JSTCP.NLM posted a listener on port 6901 that is not needed by iChain. User could access a restricted/secure page without authenticating. Numerous other updates are included in this field patch. See the Technical Information Document (TID) for further details. ============================== Impact =============================== Denial of Service caused by buffer overflow abend running special script against login. Inappropriate access with incorrect configuration. ======================== Recommended Actions ======================== See detailed instructions in the referenced Technical Information Document (TID) http://support.novell.com/servlet/tidfinder/2966205. ============================ DISCLAIMER ============================= The content of this document is believed to be accurate at the time of publishing based on currently available information. However, the information is provided "AS IS" without any warranty or representation. Your use of the document constitutes acceptance of this disclaimer. Novell disclaims all warranties, express or implied, regarding this document, including the warranties of merchantability and fitness for a particular purpose. Novell is not liable for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this document or any security alert, even if Novell has been advised of the possibility of such damages and even if such damages are foreseeable. ============================ Appendices ============================= None ================ Contacting Novell Security Alerts ================== To report suspected security vulnerabilities in Novell products, send email to secure@novell.com or use the web form at our website http://support.novell.com/security-alerts PGP users may send signed/encrypted information to us using our PGP key, available from the pgpkeys.mit.edu server, or our website. Users wishing to be notified when Novell Security Alerts are issued may register their email address at http://www.novell.com/info/list/ Security Alerts, Novell, Inc. PGP Key Fingerprint: F5AE 9265 0A34 F84E 580E 9B87 3AC1 1974 DE05 0FDB ========================= Revision History ========================== Original: 06-Jun-2003 - Original Publication -----BEGIN PGP SIGNATURE----- Version: PGP Personal Security 7.0.3 iQA/AwUBPuDUOTrBGXTeBQ/bEQLJOwCg3boegHa+BlhQ2J63Mxwpe0bUw+cAn1Oi cBTIkd5oXKOlP/Y7Pr/H0GC5 =eKI1 -----END PGP SIGNATURE----- --- You are currently subscribed to security-alerts as: [bugtraq@securityfocus.com] To unsubscribe, forward this message to leave-security-alerts-23015264B@list.novell.com