home *** CD-ROM | disk | FTP | other *** search
- ______________________________________________________________________________
- Silicon Graphics Inc. Security Advisory
-
- Title: Security vulnerabilities in rpc.statd program
- Number: 19960301-01-P
- Date: February 29, 1996
- ______________________________________________________________________________
-
- Silicon Graphics provides this information freely to the SGI user community
- for its consideration, interpretation, implementation and use. Silicon
- Graphics recommends that this information be acted upon as soon as possible.
-
- Silicon Graphics will not be liable for any indirect, special, or
- consequential damages arising from the use of, failure to use or improper
- use of any of the instructions or information in this Security Advisory.
- ______________________________________________________________________________
-
-
- It has been found that there are some security vulnerabilities within the
- /usr/etc/rpc.statd program. After further investigation, SGI recommends
- the following steps for neutralizing this possible means of exploit. It
- is HIGHLY RECOMMENDED that these measures be done on ALL SGI systems
- running IRIX 3.x, 4.x, 5.x and 6.x. The issue will be permanently
- corrected in a future release of IRIX.
-
-
- - --------------
- - --- Impact ---
- - --------------
-
-
- The vulnerabilities found within the rpc.statd program could be used
- in several including removal of files and denial of service attacks.
- An existing account on the target system is not necessary.
-
-
- - ----------------
- - --- Solution ---
- - ----------------
-
-
- **** IRIX 3.x ****
-
- Silicon Graphics Inc, no longer supports the IRIX 3.x operating system
- and therefore has no patches or binaries to provide.
-
- If possible, it is recommended that the system be upgrade to a
- supported version of IRIX (see below) and then install the patch
- for that particular IRIX version.
-
-
- **** IRIX 4.x ****
-
- As of the date of this document, SGI does not have a IRIX 4.x binary
- replacement that addresses this particular issue. If in the future,
- a replacement binary is generated, additional advisory information will
- be provided.
-
- If possible, it is recommended that the system be upgrade to a
- supported version of IRIX (see below) and then install the patch
- for that particular IRIX version.
-
-
- **** IRIX 5.0.x, 5.1.x ****
-
- For the IRIX operating systems versions 5.0.x and 5.1.x, an upgrade
- to 5.2 or better is required first. When the upgrade is completed,
- then the patches described in the following sections can be applied
- depending on the final version of the upgrade.
-
-
- **** IRIX 5.2 ****
-
- For the IRIX operating system version 5.2, an inst-able patch has been
- generated and made available via anonymous FTP and your service/support
- provider. The patch is number 1145 and will install on IRIX 5.2 only.
-
- The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its
- mirror, ftp.sgi.com. Patch 1145 can be found in the following
- directories on the FTP server:
-
- ~ftp/Security
-
- or
-
- ~ftp/Patches/5.2
-
- ##### Checksums ####
-
- The actual patch will be a tar file containing the following files:
-
-
- Filename: patchSG0001145
- Algorithm #1 (sum -r): 44131 2 patchSG0001145
- Algorithm #2 (sum): 6431 2 patchSG0001145
- MD5 checksum: 21AA35CB9907CE65E7E9F2CED4C5911A
-
- Filename: patchSG0001145.eoe1_sw
- Algorithm #1 (sum -r): 00315 35 patchSG0001145.eoe1_sw
- Algorithm #2 (sum): 33929 35 patchSG0001145.eoe1_sw
- MD5 checksum: 40B85524141352FA8EE027230BE6322C
-
- Filename: patchSG0001145.idb
- Algorithm #1 (sum -r): 45044 2 patchSG0001145.idb
- Algorithm #2 (sum): 60514 2 patchSG0001145.idb
- MD5 checksum: 784C192324E1D4CEAD0866CCE279EBC2
-
- Filename: patchSG0001145.nfs_man
- Algorithm #1 (sum -r): 54026 6 patchSG0001145.nfs_man
- Algorithm #2 (sum): 4258 6 patchSG0001145.nfs_man
- MD5 checksum: 8B9266952D84D7B86386674FBEDDFC57
-
- Filename: patchSG0001145.nfs_sw
- Algorithm #1 (sum -r): 11017 111 patchSG0001145.nfs_sw
- Algorithm #2 (sum): 29091 111 patchSG0001145.nfs_sw
- MD5 checksum: F52AC0B723600A408A3F3FF1AF637E95
-
-
-
-
-
- **** IRIX 5.3, 6.0, 6.0.1, 6.1 ****
-
- For the IRIX operating system versions 5.3, 6.0, 6.0.1, and 6.1
- an inst-able patch has been generated and made available via anonymous
- FTP and your service/support provider. The patch is number 1128
- and will install on IRIX 5.3, 6.0 and 6.0.1 only.
-
-
- The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its
- mirror, ftp.sgi.com. Patch 1128 can be found in the following
- directories on the FTP server:
-
- ~ftp/Security
-
- or
-
- ~ftp/Patches/5.3
- ~ftp/Patches/6.0
- ~ftp/Patches/6.0.1
- ~ftp/Patches/6.1
-
- ##### Checksums ####
-
- The actual patch will be a tar file containing the following files:
-
-
- Filename: patchSG0001128
- Algorithm #1 (sum -r): 20931 3 patchSG0001128
- Algorithm #2 (sum): 29192 3 patchSG0001128
- MD5 checksum: 133D5686F71C291FBFB03826171E6C74
-
- Filename: patchSG0001128.eoe1_sw
- Algorithm #1 (sum -r): 61563 23 patchSG0001128.eoe1_sw
- Algorithm #2 (sum): 36962 23 patchSG0001128.eoe1_sw
- MD5 checksum: CECD51825804C10EFC91AB21E64608A7
-
- Filename: patchSG0001128.idb
- Algorithm #1 (sum -r): 27583 2 patchSG0001128.idb
- Algorithm #2 (sum): 59737 2 patchSG0001128.idb
- MD5 checksum: 0F242B0EEACF2F1A3C97B67C1924C887
-
- Filename: patchSG0001128.nfs_man
- Algorithm #1 (sum -r): 55436 5 patchSG0001128.nfs_man
- Algorithm #2 (sum): 39750 5 patchSG0001128.nfs_man
- MD5 checksum: 2D902C2D245E370CA3747762075B4AFD
-
- Filename: patchSG0001128.nfs_sw
- Algorithm #1 (sum -r): 16238 124 patchSG0001128.nfs_sw
- Algorithm #2 (sum): 57740 124 patchSG0001128.nfs_sw
- MD5 checksum: 2DEC03983024A7583D6B94431048014E
-
-
-
- - -----------------------------------------
- - --- SGI Security Information/Contacts ---
- - -----------------------------------------
-
-
- Past SGI Advisories and security patches can be obtained via
- anonymous FTP from sgigate.sgi.com or its mirror, ftp.sgi.com.
- These security patches and advisories are provided freely to
- all interested parties. For issues with the patches on the
- FTP sites, email can be sent to cse-security-alert@csd.sgi.com.
-
- For assistance obtaining or working with security patches, please
- contact your SGI support provider.
-
- If there are questions about this document, email can be sent to
- cse-security-alert@csd.sgi.com.
-
- For reporting *NEW* SGI security issues, email can be sent to
- security-alert@sgi.com or contact your SGI support provider. A
- support contract is not required for submitting a security report.
-
-
-
- -----BEGIN PGP SIGNATURE-----
- Version: 2.6
-
- iQCVAwUBMTZBErQ4cFApAP75AQGZ/wP+Na2rwJNtfLjTb+r62Qqql3/X8dJKDhKu
- c75INm4OA24HJP8ICGucUhrrr7phTWx7OkkkepDpPHySyES8gyXfJ5XF+aWGkVMN
- hgOuVYMnPJUnA+qiAyyGiYDJQRtaNpaDHifbOSWg2CCv30Hi5aTTy3FsJKSNpn6V
- mCQZ5l7bnGI=
- =pCex
- -----END PGP SIGNATURE-----
-
-