what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CA-97.26.statd

CA-97.26.statd
Posted Sep 14, 1999

This advisory reports a vulnerability that exists in the statd(1M) program, available on a variety of Unix platforms.

systems | unix
SHA-256 | 9c0319d901eaa7188f86bb313801dbd71d92dc888b87ed7e24b04c724a400723

CA-97.26.statd

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-97.26.statd

Original issue date: Dec. 5, 1997
Last revised: March 08, 1999 - Updated patch information for Sun
Microsystems

A complete revision history is at the end of this file.
_________________________________________________________________

Buffer Overrun Vulnerability in statd(1M) Program
_________________________________________________________________

The text of this advisory was originally released on December 5, 1997,
as AA-97.29, developed by the Australian Computer Emergency Response
Team. To more widely broadcast this information, we are reprinting the
AUSCERT advisory here with their permission. Only the contact
information at the end has changed: AUSCERT contact information has
been replaced with CERT/CC contact information.

We will update this advisory as we receive additional information.
Look for it in an "Updates" section at the end of the advisory.
_________________________________________________________________

AUSCERT has received information that a vulnerability exists in the
statd(1M) program, available on a variety of Unix platforms.

This vulnerability may allow local users, as well as remote users to
gain root privileges.

Exploit information involving this vulnerability has been made
publicly available.

This vulnerability is different to the statd vulnerability described
in CERT/CC advisory CA-96.09.

The vulnerability in statd affects various vendor versions of statd.
AUSCERT recommends that sites take the steps outlined in section 3 as
soon as possible.

This advisory will be updated as more information becomes available.
_________________________________________________________________

I. Description

AUSCERT has received information concerning a vulnerability in some
vendor versions of the RPC server, statd(1M).

statd provides network status monitoring. It interacts with lockd to
provide crash and recovery functions for the locking services on NFS.

Due to insufficient bounds checking on input arguments which may be
supplied by local users, as well as remote users, it is possible to
overwrite the internal stack space of the statd program while it is
executing a specific rpc routine. By supplying a carefully designed
input argument to the statd program, intruders may be able to force
statd to execute arbitrary commands as the user running statd. In most
instances, this will be root.

This vulnerability may be exploited by local users. It can also be
exploited remotely without the intruder requiring a valid local
account if statd is accessible via the network.

Sites can check whether they are running statd by:

On system V like systems:
# ps -fe |grep statd
root 973 1 0 14:41:46 ? 0:00 /usr/lib/nfs/statd

On BSD like systems:
# ps -auxw |grep statd
root 156 0.0 0.0 52 0 ? IW May 3 0:00 rpc.statd

Specific vendor information regarding this vulnerability can be found
in Section III.

II. Impact

This vulnerability permits attackers to gain root privileges. It can
be exploited by local users. It can also be exploited remotely without
the intruder requiring a valid local account if statd is accessible
via the network.

III. Workarounds/Solution

The statd program is available on many different systems. As vendor
patches are made available sites are encouraged to install them
immediately (Section 3.1).

If you are not using NFS in your environment then there is no need for
the statd program to be running and it can be disabled (Section 3.2).

3.1 Vendor information

The following vendors have provided information concerning the
vulnerability in statd.
BSDI
Data General Corporation
Digital Equipment Corporation
Hewlett-Packard
IBM Corporation
The NetBSD Project
Red Hat Software
Sun Microsystems

Specific vendor information has been placed in Appendix A.

If the statd program is required at your site and your vendor is not
listed, you should contact your vendor directly.

If you do not require the statd program then it should be disabled
(Section 3.2).

3.2 Disabling statd

The statd daemon is required as part of an NFS environment. If you are
not using NFS there is no need for this program and it can be
disabled. The statd (or rpc.statd) program is often started in the
system initialisation scripts (such as /etc/rc* or /etc/rc*.d/*). If
you do not require statd it should be commented out from the
initialisation scripts. In addition, any currently running statd
should be identified using ps(1) and then terminated using kill(1).
_________________________________________________________________

Appendix A Vendor information

The following information regarding this vulnerability for specific
vendor versions of statd has been made available to AUSCERT. For
additional information, sites should contact their vendors directly.

BSDI

No versions of BSD/OS are vulnerable to this problem.

Data General Corporation

This problem is under investigation.

Digital Equipment Corporation

A DIGITAL EQUIPMENT CORPORATION ADVISORY, SSRT0456U, concerning
"DIGITAL UNIX rpc.statd V3.2g, V4.0, V4.0a, V4.0b, V4.0c, V4.0d"
was issued April 30, 1998. For more information, please see

the World Wide Web at the following FTP address:

http://www.service.digital.com/html/patch_service.html

Use the FTP access option, select DIGITAL_UNIX directory
then choose the appropriate version directory
and download the patch accordingly.

Hewlett-Packard

HP is not vulnerable.

IBM Corporation

AIX 3.2 and 4.1 are vulnerable to the statd buffer overflow. However,
the buffer overflow described in this advisory was fixed when the APARs
for CERT CA-96.09 was released. See the appropriate release below to
determine your action.

AIX 3.2
-------
Apply the following fix to your system:

APAR - IX56056 (PTF - U441411)

To determine if you have this PTF on your system, run the following
command:

lslpp -lB U441411

AIX 4.1
-------
Apply the following fix to your system:

APAR - IX55931

To determine if you have this PTF on your system, run the following
command:

instfix -ik IX55931

Or run the following command:

lslpp -h bos.net.nfs.client

Your version of bos.net.nfs.client should be 4.1.4.7 or later.

AIX 4.2
-------
No APAR required. Fix already contained in the release.

APARs may be ordered using Electronic Fix Distribution (via
FixDist) or from the IBM Support Center. For more information on
FixDist, reference URL:

http://service.software.ibm.com/aixsupport/

or send e-mail to aixserv@austin.ibm.com with a subject of
"FixDist".

IBM and AIX are registered trademarks of International Business
Machines Corporation.

The NetBSD project

NetBSD is not vulnerable to the statd buffer overflow. It does not ship
with NFS locking programs (statd/lockd).

Red Hat Linux

Red Hat Linux is not vulnerable to the statd buffer overflow. No versions
of Red Hat Linux include statd in any form.

Sun Microsystems

The statd vulnerability has been fixed by the following patches:

SunOS version Patch Id
------------- --------

5.5.1 104166-03
5.5.1_x86 104167-02
5.5 103468-03
5.5_x86 103469-03
5.4 102769-04
5.4_x86 102770-04
4.1.4 102516-06
4.1.3_U1 101592-09

SunOS 5.6 and 5.6_x86 are not vulnerable to this problem.

The vulnerability described in this advisory is not the same as that
described in Sun Security Bulletin #135.

Sun recommended and security patches (including checksums) are available from:

http://sunsolve.sun.com/sunsolve/pubpatches/patches.html

AUSCERT maintains a local mirror of Sun recommended and security
patches at:

ftp://ftp.auscert.org.au/pub/mirrors/sunsolve1.sun.com/
_________________________________________________________________

AUSCERT thanks Peter Marelas (The Fulcrum Consulting Group), Tim
MacKenzie (The Fulcrum Consulting Group) and CERT/CC for their
assistance in the preparation of this advisory.
______________________________________________________________________

UPDATES

Vendor Information

Below is information we have received from vendors. If you do not see
your vendor's name below, contact the vendor directly for information.

NetBSD

NetBSD 1.2.1 and prior do not ship with rpc.statd. NetBSD 1.3 ships an
rpc.statd that is not vulnerable.

Silicon Graphics Inc.

Silicon Graphics Inc. has investigated the issue and has recommended
steps for neutralizing the exposure. It is HIGHLY RECOMMENDED that
these measures be implemented on ALL SGI systems.

For further information, please refer to Silicon Graphics Inc.
Security Advisory Number: 19971201-01-P1391 "Buffer Overrun
Vulnerability in statd(1M) Program"

The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its
mirror, ftp.sgi.com. Security information and patches can be found in
the ~ftp/security and ~ftp/patches directories, respectfully.
______________________________________________________________________

This document is available from:
http://www.cert.org/advisories/CA-97.26.statd.html.
______________________________________________________________________

CERT/CC Contact Information

Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.

CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4)
Monday through Friday; they are on call for emergencies during other
hours, on U.S. holidays, and on weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by email.
Our public PGP key is available from http://www.cert.org/CERT_PGP.key.
If you prefer to use DES, please call the CERT hotline for more
information.

Getting security information

CERT publications and other security information are available from
our web site http://www.cert.org/.

To be added to our mailing list for advisories and bulletins, send
email to cert-advisory-request@cert.org and include SUBSCRIBE
your-email-address in the subject of your message.

Copyright 1999 Carnegie Mellon University.
Conditions for use, disclaimers, and sponsorship information can be
found in http://www.cert.org/legal_stuff.html.

* "CERT" and "CERT Coordination Center" are registered in the U.S.
Patent and Trademark Office
______________________________________________________________________

NO WARRANTY
Any material furnished by Carnegie Mellon University and the Software
Engineering Institute is furnished on an "as is" basis. Carnegie
Mellon University makes no warranties of any kind, either expressed or
implied as to any matter including, but not limited to, warranty of
fitness for a particular purpose or merchantability, exclusivity or
results obtained from use of the material. Carnegie Mellon University
does not make any warranty of any kind with respect to freedom from
patent, trademark, or copyright infringement.
______________________________________________________________________

Revision history
Mar. 08, 1999 Updated patch information for Sun Microsystems.

Jul. 07, 1998 Updated information for Digital Equipment Corporation.

Feb. 12, 1998 Updated information for Hewlett-Packard and Data General Corpor
ation.

Dec. 19, 1997 Vendor information for SGI added to the UPDATES section.

Dec. 15, 1997 Vendor information for NetBSD has been added to the UPDATES sec
tion.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNuRLMnVP+x0t4w7BAQGv6gP/bGZQn2gadc7roYIAsBGnbm2uzX3M0sH3
jj+rICLeUYObI4w+Hwkt2ph++AntLdotZUBE9dFZhqGCNKqwXzTr7aaUJGl9IDuK
ZuQb/bwu4FfT3KnNxcN1ds/l6KRi2fN+t39Dvey1UL4cOt7ZpvsUFN+xcBeWMgIT
tQIHQ3IAUsk=
=tpLh
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close