[Full-Disclosure] IRIX IP denial-of-service fixes and tunings

From: SGI Security Coordinator (agent99at_private)
Date: Wed Feb 12 2003 - 10:40:12 PST

  • Next message: bugzillaat_private: "[Full-Disclosure] [RHSA-2003:029-06] Updated lynx packages fix CRLF injection vulnerability"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    ______________________________________________________________________________
                              SGI Security Advisory
    
    Title    : IP denial-of-service fixes and tunings
    Number   : 20030201-01-P
    Date     : February 12, 2003
    Reference: CERT CA-2001-09
    Reference: CVE-1999-0077 CAN-2001-0328
    Reference: SGI BUGS 836110 866901 822734 829671 860748 862151 864775
    Fixed in : IRIX 6.5.19 or patches 4765-4770, 4859-4862
    ______________________________________________________________________________
    
    - -----------------------
    - --- Issue Specifics ---
    - -----------------------
    
    It's been reported that there are multiple networking related
    vulnerabilities in certain versions of IRIX:
    
      o  Statistical Weaknesses in TCP/IP Initial Sequence Numbers
         http://www.cert.org/advisories/CA-2001-09.html
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0077
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0328
    
      o  Denial of Service attack involving clients sending packets with very
         small MSS values
         http://www.securityfocus.com/archive/1/195457
    
      o  IGMP report suppression Denial of Service
         http://www.cs.ucsb.edu/~krishna/igmp_dos/
    
      o  Non-root users could influence interface settings that they shouldn't
         be able to change.
    
      o  We added two new systune variables to disable additional types
         of broadcast probes.
    
    Non-security related fixes included with these patches,
    
      o Always immediately ACK packets with PSH flag set to improve performance
        with GigE networking.
    
      o Permit the use of select() with sockets using the STP protocol in
        the IRIX m-stream
    
    
    SGI has investigated the issue and recommends the following steps for
    neutralizing the exposure.  It is HIGHLY RECOMMENDED that these measures be
    implemented on ALL vulnerable SGI systems.
    
    These issues have been corrected in patches and in IRIX 6.5.19.
    
    
    - --------------
    - --- Impact ---
    - --------------
    
    The above vulnerabilities are kernel-level, and naturally the kernel is
    installed by default on IRIX 6.5 systems as part of eoe.sw.base.
    
    To determine the version of IRIX you are running, execute the following
    command:
    
      # /bin/uname -R
    
    That will return a result similar to the following:
    
      # 6.5 6.5.16f
    
    The first number ("6.5") is the release name, the second ("6.5.16f" in this
    case) is the extended release name.  The extended release name is the
    "version" we refer to throughout this document.
    
    
    - ----------------------------
    - --- Temporary Workaround ---
    - ----------------------------
    
    There is no effective workaround available for these problems.  SGI
    recommends either upgrading to IRIX 6.5.19, or installing the appropriate
    patch from the listing below.
    
    
    - ----------------
    - --- Solution ---
    - ----------------
    
    SGI has provided a series of patches for these vulnerabilities. Our
    recommendation is to upgrade to IRIX 6.5.19 when available, or install the
    appropriate patch.
    
       OS Version     Vulnerable?     Patch #      Other Actions
       ----------     -----------     -------      -------------
       IRIX 3.x        unknown                     Note 1
       IRIX 4.x        unknown                     Note 1
       IRIX 5.x        unknown                     Note 1
       IRIX 6.0.x      unknown                     Note 1
       IRIX 6.1        unknown                     Note 1
       IRIX 6.2        unknown                     Note 1
       IRIX 6.3        unknown                     Note 1
       IRIX 6.4        unknown                     Note 1
       IRIX 6.5          yes                       Notes 2 & 3
       IRIX 6.5.1        yes                       Notes 2 & 3
       IRIX 6.5.2        yes                       Notes 2 & 3
       IRIX 6.5.3        yes                       Notes 2 & 3
       IRIX 6.5.4        yes                       Notes 2 & 3
       IRIX 6.5.5        yes                       Notes 2 & 3
       IRIX 6.5.6        yes                       Notes 2 & 3
       IRIX 6.5.7        yes                       Notes 2 & 3
       IRIX 6.5.8        yes                       Notes 2 & 3
       IRIX 6.5.9        yes                       Notes 2 & 3
       IRIX 6.5.10       yes                       Notes 2 & 3
       IRIX 6.5.11       yes                       Notes 2 & 3
       IRIX 6.5.12       yes                       Notes 2 & 3
       IRIX 6.5.13       yes                       Notes 2 & 3
       IRIX 6.5.14m      yes            4765       Notes 2,4 & 5
       IRIX 6.5.14f      yes            4766       Notes 2,4 & 5
       IRIX 6.5.15m      yes            4767       Notes 2,4 & 5
       IRIX 6.5.15f      yes            4768       Notes 2,4 & 5
       IRIX 6.5.16m      yes            4769       Notes 2,4 & 5
       IRIX 6.5.16f      yes            4770       Notes 2,4 & 5
       IRIX 6.5.17m      yes            4859       Notes 2,4 & 5
       IRIX 6.5.17f      yes            4860       Notes 2,4 & 5
       IRIX 6.5.18m      yes            4861       Notes 2,4 & 5
       IRIX 6.5.18f      yes            4862       Notes 2,4 & 5
       IRIX 6.5.19        no
    
    
       NOTES
    
         1) This version of the IRIX operating has been retired. Upgrade to an
            actively supported IRIX operating system.  See
            http://support.sgi.com/irix/news/index.html#policy for more
            information.
    
         2) If you have not received an IRIX 6.5.X CD for IRIX 6.5, contact your
            SGI Support Provider or URL: http://support.sgi.com/irix/swupdates/
    
         3) Upgrade to IRIX 6.5.19
    
         4) Install the appropriate patch or upgrade to IRIX 6.5.19
    
         5) Note that for several of these fixes, you have to systune variables to
            non-default settings to provide the added protection. Documentation
            on how to use the new systunes is in the file /var/sysgen/mtune/bsd.
    
    
    - ------------------------
    - --- Acknowledgments ----
    - ------------------------
    
    SGI wishes to thank Michal Zalewski, Krishna Ramachandran, Darren Reed,
    Rob Warnock, FIRST, UCSB, and the users of the Internet Community at
    large for their assistance in this matter.
    
    
                    ##### Patch File Checksums ####
    
    The actual patch will be a tar file containing the following files:
    
    Filename:                 README.patch.4765
    Algorithm #1 (sum -r):    00851 8 README.patch.4765
    Algorithm #2 (sum):       50531 8 README.patch.4765
    MD5 checksum:             EEF9775971EB60E31FF3EE99C3F48D05
    
    Filename:                 patchSG0004765
    Algorithm #1 (sum -r):    61582 2 patchSG0004765
    Algorithm #2 (sum):       37142 2 patchSG0004765
    MD5 checksum:             79F0A0E99AC82540FB447D147C68DF23
    
    Filename:                 patchSG0004765.eoe_sw
    Algorithm #1 (sum -r):    49197 8682 patchSG0004765.eoe_sw
    Algorithm #2 (sum):       52920 8682 patchSG0004765.eoe_sw
    MD5 checksum:             AA3ABF4FB89EC7214D3F812EF8266F58
    
    Filename:                 patchSG0004765.idb
    Algorithm #1 (sum -r):    33635 8 patchSG0004765.idb
    Algorithm #2 (sum):       28804 8 patchSG0004765.idb
    MD5 checksum:             48ADB895BB57E67339D8E4C03EDF7071
    
    Filename:                 README.patch.4766
    Algorithm #1 (sum -r):    46520 8 README.patch.4766
    Algorithm #2 (sum):       45333 8 README.patch.4766
    MD5 checksum:             391B328808E4F94A27305D92634EAAE6
    
    Filename:                 patchSG0004766
    Algorithm #1 (sum -r):    40678 2 patchSG0004766
    Algorithm #2 (sum):       37866 2 patchSG0004766
    MD5 checksum:             8589BD3E333441A8F051E8BDAAB1F461
    
    Filename:                 patchSG0004766.eoe_sw
    Algorithm #1 (sum -r):    27708 8719 patchSG0004766.eoe_sw
    Algorithm #2 (sum):       43291 8719 patchSG0004766.eoe_sw
    MD5 checksum:             8619F9B9BABC2240723593F886C6E9DA
    
    Filename:                 patchSG0004766.idb
    Algorithm #1 (sum -r):    42539 8 patchSG0004766.idb
    Algorithm #2 (sum):       28701 8 patchSG0004766.idb
    MD5 checksum:             EBFD5C60C84081AAB256F62A7D515991
    
    Filename:                 README.patch.4767
    Algorithm #1 (sum -r):    17974 8 README.patch.4767
    Algorithm #2 (sum):       50521 8 README.patch.4767
    MD5 checksum:             695AAF2AC022DF5548F6A08BABB8C19C
    
    Filename:                 patchSG0004767
    Algorithm #1 (sum -r):    50741 2 patchSG0004767
    Algorithm #2 (sum):       36840 2 patchSG0004767
    MD5 checksum:             D40046A218262CE6C4525315574D7A93
    
    Filename:                 patchSG0004767.eoe_sw
    Algorithm #1 (sum -r):    06411 8634 patchSG0004767.eoe_sw
    Algorithm #2 (sum):       65220 8634 patchSG0004767.eoe_sw
    MD5 checksum:             F311806DECAFCBE257C847BA3B90E234
    
    Filename:                 patchSG0004767.idb
    Algorithm #1 (sum -r):    23118 8 patchSG0004767.idb
    Algorithm #2 (sum):       28772 8 patchSG0004767.idb
    MD5 checksum:             59C5EDC63D888EBCD9678AA094E4AE36
    
    Filename:                 README.patch.4768
    Algorithm #1 (sum -r):    07449 8 README.patch.4768
    Algorithm #2 (sum):       45329 8 README.patch.4768
    MD5 checksum:             574EF632903897A79F2EC30EBDB749BD
    
    Filename:                 patchSG0004768
    Algorithm #1 (sum -r):    12854 2 patchSG0004768
    Algorithm #2 (sum):       37926 2 patchSG0004768
    MD5 checksum:             300D477270517404F21EBBC4EC1F9AF1
    
    Filename:                 patchSG0004768.eoe_sw
    Algorithm #1 (sum -r):    19153 8695 patchSG0004768.eoe_sw
    Algorithm #2 (sum):       56318 8695 patchSG0004768.eoe_sw
    MD5 checksum:             0F31ACA7E678DEFFC62B4470D286C168
    
    Filename:                 patchSG0004768.idb
    Algorithm #1 (sum -r):    10022 8 patchSG0004768.idb
    Algorithm #2 (sum):       28960 8 patchSG0004768.idb
    MD5 checksum:             001968D21CDAA04CF8F00929F56993D2
    
    Filename:                 README.patch.4769
    Algorithm #1 (sum -r):    31126 8 README.patch.4769
    Algorithm #2 (sum):       50564 8 README.patch.4769
    MD5 checksum:             82E480DAC43FCEED64BC15B8D9D57DEA
    
    Filename:                 patchSG0004769
    Algorithm #1 (sum -r):    03843 2 patchSG0004769
    Algorithm #2 (sum):       36640 2 patchSG0004769
    MD5 checksum:             FB989211A29CF7D7ED37B20859CDC749
    
    Filename:                 patchSG0004769.eoe_sw
    Algorithm #1 (sum -r):    06936 8684 patchSG0004769.eoe_sw
    Algorithm #2 (sum):       19463 8684 patchSG0004769.eoe_sw
    MD5 checksum:             0DBAEF3ABE22AF89768A36BEBE7DB6B0
    
    Filename:                 patchSG0004769.idb
    Algorithm #1 (sum -r):    52255 8 patchSG0004769.idb
    Algorithm #2 (sum):       28982 8 patchSG0004769.idb
    MD5 checksum:             CD7BDCADDC43DFCF70718701F2CB31DB
    
    Filename:                 README.patch.4770
    Algorithm #1 (sum -r):    47848 8 README.patch.4770
    Algorithm #2 (sum):       45283 8 README.patch.4770
    MD5 checksum:             62420BDB0901E3508DC24357A753F808
    
    Filename:                 patchSG0004770
    Algorithm #1 (sum -r):    37174 2 patchSG0004770
    Algorithm #2 (sum):       37555 2 patchSG0004770
    MD5 checksum:             9BEC0D64A1A37ADC457F5899B59C4924
    
    Filename:                 patchSG0004770.eoe_sw
    Algorithm #1 (sum -r):    39864 8731 patchSG0004770.eoe_sw
    Algorithm #2 (sum):       60323 8731 patchSG0004770.eoe_sw
    MD5 checksum:             8EF0379361DF58C8D1A7F1EF90BF8957
    
    Filename:                 patchSG0004770.idb
    Algorithm #1 (sum -r):    11481 8 patchSG0004770.idb
    Algorithm #2 (sum):       28643 8 patchSG0004770.idb
    MD5 checksum:             70C4D90A919D2FDC543923004923956F
    
    Filename:                 README.patch.4859
    Algorithm #1 (sum -r):    00935 8 README.patch.4859
    Algorithm #2 (sum):       45233 8 README.patch.4859
    MD5 checksum:             FB019BC6CF6D404FF65C1961C5916D34
    
    Filename:                 patchSG0004859
    Algorithm #1 (sum -r):    48316 2 patchSG0004859
    Algorithm #2 (sum):       37273 2 patchSG0004859
    MD5 checksum:             A4F76A969A96443ECE4EF81F03E42929
    
    Filename:                 patchSG0004859.eoe_sw
    Algorithm #1 (sum -r):    05200 8682 patchSG0004859.eoe_sw
    Algorithm #2 (sum):       24603 8682 patchSG0004859.eoe_sw
    MD5 checksum:             B4E67351627AF9BD2518E130403E1F5C
    
    Filename:                 patchSG0004859.idb
    Algorithm #1 (sum -r):    12558 8 patchSG0004859.idb
    Algorithm #2 (sum):       28929 8 patchSG0004859.idb
    MD5 checksum:             2EBD54044AD96AF6E3130F7E4A831F83
    
    Filename:                 README.patch.4860
    Algorithm #1 (sum -r):    08551 8 README.patch.4860
    Algorithm #2 (sum):       40311 8 README.patch.4860
    MD5 checksum:             A083EF36545E7806C503ECDC4205B30C
    
    Filename:                 patchSG0004860
    Algorithm #1 (sum -r):    38690 2 patchSG0004860
    Algorithm #2 (sum):       37973 2 patchSG0004860
    MD5 checksum:             EF53D09FE2F5920C4A2FE48498F526F3
    
    Filename:                 patchSG0004860.eoe_sw
    Algorithm #1 (sum -r):    18758 8729 patchSG0004860.eoe_sw
    Algorithm #2 (sum):       50084 8729 patchSG0004860.eoe_sw
    MD5 checksum:             49663754DA52A65D1F3955EC3F61D200
    
    Filename:                 patchSG0004860.idb
    Algorithm #1 (sum -r):    00608 8 patchSG0004860.idb
    Algorithm #2 (sum):       28685 8 patchSG0004860.idb
    MD5 checksum:             89FDF54A20EBDB47F159B5B372098699
    
    Filename:                 README.patch.4861
    Algorithm #1 (sum -r):    55419 8 README.patch.4861
    Algorithm #2 (sum):       34686 8 README.patch.4861
    MD5 checksum:             F67AB6C309E5CB6C14AD328FA5DAFAF9
    
    Filename:                 patchSG0004861
    Algorithm #1 (sum -r):    33127 2 patchSG0004861
    Algorithm #2 (sum):       34079 2 patchSG0004861
    MD5 checksum:             3A2E13F4214A7DE2EDC6A541AB2C884F
    
    Filename:                 patchSG0004861.eoe_sw
    Algorithm #1 (sum -r):    14812 8693 patchSG0004861.eoe_sw
    Algorithm #2 (sum):       65234 8693 patchSG0004861.eoe_sw
    MD5 checksum:             57FB55C1100BE5B07200B8AA8952F3AA
    
    Filename:                 patchSG0004861.idb
    Algorithm #1 (sum -r):    48910 8 patchSG0004861.idb
    Algorithm #2 (sum):       28671 8 patchSG0004861.idb
    MD5 checksum:             23689B4F2FEF2DE6CC4F9B80F4A2B3EA
    
    Filename:                 README.patch.4862
    Algorithm #1 (sum -r):    36366 8 README.patch.4862
    Algorithm #2 (sum):       34677 8 README.patch.4862
    MD5 checksum:             5F9EC05279B801B70BD80E4AF7265861
    
    Filename:                 patchSG0004862
    Algorithm #1 (sum -r):    49813 2 patchSG0004862
    Algorithm #2 (sum):       35382 2 patchSG0004862
    MD5 checksum:             69692CEF25EE7AE774DACB8E62AB1DEC
    
    Filename:                 patchSG0004862.eoe_sw
    Algorithm #1 (sum -r):    29451 8746 patchSG0004862.eoe_sw
    Algorithm #2 (sum):       17026 8746 patchSG0004862.eoe_sw
    MD5 checksum:             4BE770442C8DFD31AC54CCFF35F89E44
    
    Filename:                 patchSG0004862.idb
    Algorithm #1 (sum -r):    04107 8 patchSG0004862.idb
    Algorithm #2 (sum):       28768 8 patchSG0004862.idb
    MD5 checksum:             AEBF11906A3322B410F93CD9F26594B1
    
    
    - -------------
    - --- Links ---
    - -------------
    
    SGI Security Advisories can be found at:
    http://www.sgi.com/support/security/ and
    ftp://patches.sgi.com/support/free/security/advisories/
    
    SGI Security Patches can be found at:
    http://www.sgi.com/support/security/ and
    ftp://patches.sgi.com/support/free/security/patches/
    
    SGI patches for IRIX can be found at the following patch servers:
    http://support.sgi.com/irix/ and ftp://patches.sgi.com/
    
    SGI freeware updates for IRIX can be found at:
    http://freeware.sgi.com/
    
    SGI fixes for SGI open sourced code can be found on:
    http://oss.sgi.com/projects/
    
    SGI patches and RPMs for Linux can be found at:
    http://support.sgi.com/linux/ or
    http://oss.sgi.com/projects/sgilinux-combined/download/security-fixes/
    
    SGI patches for Windows NT or 2000 can be found at:
    http://support.sgi.com/nt/
    
    IRIX 5.2-6.4 Recommended/Required Patch Sets can be found at:
    http://support.sgi.com/irix/ and ftp://patches.sgi.com/support/patchset/
    
    IRIX 6.5 Maintenance Release Streams can be found at:
    http://support.sgi.com/colls/patches/tools/relstream/index.html
    
    IRIX 6.5 Software Update CDs can be obtained from:
    http://support.sgi.com/irix/swupdates/
    
    The primary SGI anonymous FTP site for security advisories and patches is
    patches.sgi.com (216.32.174.211).  Security advisories and patches are
    located under the URL ftp://patches.sgi.com/support/free/security/
    
    For security and patch management reasons, ftp.sgi.com (mirrors
    patches.sgi.com security FTP repository) lags behind and does not do a
    real-time update.
    
    
    - -----------------------------------------
    - --- SGI Security Information/Contacts ---
    - -----------------------------------------
    
    If there are questions about this document, email can be sent to
    security-infoat_private
    
                          ------oOo------
    
    SGI provides security information and patches for use by the entire SGI
    community.  This information is freely available to any person needing the
    information and is available via anonymous FTP and the Web.
    
    The primary SGI anonymous FTP site for security advisories and patches is
    patches.sgi.com (216.32.174.211).  Security advisories and patches are
    located under the URL ftp://patches.sgi.com/support/free/security/
    
    The SGI Security Headquarters Web page is accessible at the URL:
    http://www.sgi.com/support/security/
    
    For issues with the patches on the FTP sites, email can be sent to
    security-infoat_private
    
    For assistance obtaining or working with security patches, please
    contact your SGI support provider.
    
                          ------oOo------
    
    SGI provides a free security mailing list service called wiretap and
    encourages interested parties to self-subscribe to receive (via email) all
    SGI Security Advisories when they are released. Subscribing to the mailing
    list can be done via the Web
    (http://www.sgi.com/support/security/wiretap.html) or by sending email to
    SGI as outlined below.
    
    % mail wiretap-requestat_private
    subscribe wiretap <YourEmailAddress such as zedwatchat_private >
    end
    ^d
    
    In the example above, <YourEmailAddress> is the email address that you wish
    the mailing list information sent to.  The word end must be on a separate
    line to indicate the end of the body of the message. The control-d (^d) is
    used to indicate to the mail program that you are finished composing the
    mail message.
    
    
                          ------oOo------
    
    SGI provides a comprehensive customer World Wide Web site. This site is
    located at http://www.sgi.com/support/security/ .
    
                          ------oOo------
    
    If there are general security questions on SGI systems, email can be sent to
    security-infoat_private
    
    For reporting *NEW* SGI security issues, email can be sent to
    security-alertat_private or contact your SGI support provider.  A support
    contract is not required for submitting a security report.
    
    ______________________________________________________________________________
          This information is provided freely to all interested parties
          and may be redistributed provided that it is not altered in any
          way, SGI is appropriately credited and the document retains and
          includes its valid PGP signature.
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.2
    
    iQCVAwUBPkqMrbQ4cFApAP75AQHPSQQAt3JYa7juK9ppEKHM7hOXV31NSwaaWD5N
    dOMA2NZa29XtzXVXCoofoS8pL9qDj3g6rLyHjhJkya2pRBfpJVV4jh8pmohJSdML
    gg0aNSCEpo4Q9YWg9HKJq/TMSQdyMBfjbF8CkS+j6ZFtmDoNJ3TUqzEy69sNO/ys
    XhSS7OQBNGM=
    =WVnw
    -----END PGP SIGNATURE-----
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Wed Feb 12 2003 - 11:03:45 PST