From security@sco.com Thu Dec 22 10:54:20 2005
From: security@sco.com
To: security-announce@list.sco.com
Date: Thu, 22 Dec 2005 10:50:56 -0500 (EST)
Subject: [Full-disclosure] SCOSA-2005.64 UnixWare 7.1.3 UnixWare 7.1.4 : TCP Denial of Service Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

____________________________________________________________________________
__

			SCO Security Advisory

Subject:		UnixWare 7.1.3 UnixWare 7.1.4 : TCP Denial of
Service Vulnerability
Advisory number:	SCOSA-2005.64
Issue date:		2005 December 22
Cross reference:	sr893333 fz531593 erg712814
			CVE-2005-0356 VU#637934
____________________________________________________________________________
__


1. Problem Description

	TCP does not adequately validate segments before updating
	timestamp value allowing a remote attacker to arbitrarily modify
	host timestamp values that will in turn cause TCP connections to
	abort/drop segments, leading to a denial-of-service condition.

	The Common Vulnerabilities and Exposures project (cve.mitre.org)
	has assigned the name CVE-2005-0356 to this issue.


2. Vulnerable Supported Versions

	System				Binaries
	--------------------------------------------------------------------
--
	UnixWare 7.1.3 			/etc/conf/pack.d/inet/Driver_atup.o
					/etc/conf/pack.d/inet/Driver_mp.o
	UnixWare 7.1.4 			/etc/conf/pack.d/inet/Driver_atup.o
					/etc/conf/pack.d/inet/Driver_mp.o
					/etc/conf/pack.d/inet/space.c


3. Solution

	The proper solution is to install the latest packages.


4. UnixWare 7.1.3

	4.1 Location of Fixed Binaries

	ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64


	4.2 Verification

	MD5 (p531593.713.image) = cd1cb0636dbbb4a26ce95c37f2cf78fb

	md5 is available for download from
		ftp://ftp.sco.com/pub/security/tools


	4.3 Installing Fixed Binaries

	The following package should be installed on your system before
	you install this fix:

		UnixWare 7.1.3 Maintenance Pack 5

	Upgrade the affected binaries with the following sequence:

	Download p531593.713.image to the /var/spool/pkg directory.

	# pkgadd -d /var/spool/pkg/p531593.713.image


5. UnixWare 7.1.4

	5.1 Location of Fixed Binaries

	ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64


	5.2 Verification

	MD5 (p531593.714.image) = df2fbb69838cd7bdfa4f68135835612c

	md5 is available for download from
		ftp://ftp.sco.com/pub/security/tools


	5.3 Installing Fixed Binaries

	The following package should be installed on your system before
	you install this fix:

		UnixWare 7.1.4 Maintenance Pack 2
		ptf9051

	Upgrade the affected binaries with the following sequence:

	Download p531593.714.image to the /var/spool/pkg directory.

	# pkgadd -d /var/spool/pkg/p531593.714.image


6. References

	Specific references for this advisory:
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0356
		http://www.kb.cert.org/vuls/id/VU#637934
		http://www.securityfocus.com/bid/13676

	SCO security resources:
		http://www.sco.com/support/security/index.html

	SCO security advisories via email
		http://www.sco.com/support/forums/security.html

	This security fix closes SCO incidents sr893333 fz531593
	erg712814.


7. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers
	intended to promote secure installation and use of SCO
	products.


8. Acknowledgments

	SCO would like to thank Noritoshi Demizu for researching and
	reporting this vulnerability.

____________________________________________________________________________
__
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (UnixWare)

iD8DBQFDqsO+aqoBO7ipriERAndNAJwKGS/jdCzclIa18d05DWPrcTocGwCghg+/
ZE9qL+A6cbTY2B4h7gapDrY=
=jJCv
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
