From security@sco.com Fri Oct 28 17:19:55 2005
From: security@sco.com
To: security-announce@list.sco.com
Date: Fri, 28 Oct 2005 16:13:19 -0400 (EDT)
Subject: [Full-disclosure] SCOSA-2005.43 OpenServer 6.0.0 : RPCBind Remote Denial of Service Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


______________________________________________________________________________

 			SCO Security Advisory

Subject:		OpenServer 6.0.0 : RPCBind Remote Denial of Service Vulnerability
Advisory number: 	SCOSA-2005.43
Issue date: 		2005 October 27
Cross reference:	sr895067 erg712957 fz533036 CAN-2005-2132
______________________________________________________________________________


1. Problem Description

 	When the RPC portmapper (rpcbind) receives an invalid portmap
 	request from a remote (or local) host, it falls into a denial
 	of service state and cannot respond. As a result, the RPC
 	services will not operate normally.

 	The Common Vulnerabilities and Exposures project (cve.mitre.org)
 	has assigned the name CAN-2005-2132 to this issue.


2. Vulnerable Supported Versions

 	System				Binaries
 	----------------------------------------------------------------------
 	OpenServer 6.0.0		/usr/lib/libnsl.so.1


3. Solution

 	The proper solution is to install the latest packages.


4. OpenServer 6.0.0

 	4.1 Location of Fixed Binaries

 	ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.43


 	4.2 Verification

 	MD5 (VOL.000.000) = 5086254532a3d202f526de0b6d343e66

 	md5 is available for download from
 		ftp://ftp.sco.com/pub/security/tools


 	4.3 Installing Fixed Binaries

 	Upgrade the affected binaries with the following sequence:

 	1) Download the VOL* files to a directory

 	2) Run the custom command, specify an install from media
 	images, and specify the directory as the location of the
 	images.


5. References

 	Specific references for this advisory:
 		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2132

 	SCO security resources:
 		http://www.sco.com/support/security/index.html
 	SCO security advisories via email
 		http://www.sco.com/support/forums/security.html

 	This security fix closes SCO incidents sr895067 erg712957 fz533036.


6. Disclaimer

 	SCO is not responsible for the misuse of any of the information
 	we provide on this website and/or through our security
 	advisories. Our advisories are a service to our customers
 	intended to promote secure installation and use of SCO
 	products.


7. Acknowledgments

 	The SCO Group would like to thank Yun Jonglim for his work
 	in discovering and describing this defect so well.

______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAkNhPPkACgkQaqoBO7ipriEu+wCaAhGGLIVq7OtpTuUBQ4RxMOP7
gHQAniSVhsDnsSldI/t3oynFPXUOVhFi
=sm7f
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
