exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SA-1997.35.txt

SA-1997.35.txt
Posted Sep 23, 1999

SA-1997.35.txt

SHA-256 | b1e4c0fbcde43cd83702cd8444c1ad285ff1397184525f43908202879c87b17f

SA-1997.35.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

Subject: Caldera Security Advisory SA-1997.35: Vulnerability in identd

Original report date: 04-Aug-1997
RPM build date: 11-Nov-1997
Advisory issue date: 31-Dec-1997

Topic: Vulnerability in identd package


I. Problem Description

A vulnerability exists within pidentd that will allow a denial of
service attack.

identd operates by looking up specific TCP/IP connections and
returning the user name of the process owning the connection.
It can optionally return other information instead of a
user name.

pidentd is a particular implementation of the "Ident" protocol as
described in RFC 1413.

II. Impact

On systems such as Caldera OpenLinux 1.1, an unprivileged user
can potentially initiate a large quantity of identd requests
causing the system load to increase to the point of rendering
the attacked machine unusable.

This problem was present on the following OpenLinux releases:

CND 1.0
Base 1.0
Lite 1.1
Base 1.1
Standard 1.1

To determine if you are affected and need this update execute
the following:

rpm -q pident

If the results show a version prior to pidentd-2.8a4-1.i386.rpm
then you will need to update.


III. Solution

The proper solution is to install the new pidentd package that
contains the fixed version of identd. The binary RPM package
is located on Caldera's FTP server (ftp.caldera.com):

/pub/openlinux/updates/1.1/current/RPMS/pidentd-2.8a4-1.i386.rpm

Source code in an RPM format can also be obtained from:

/pub/openlinux/updates/1.1/current/SRPMS/pidentd-2.8a4-1.src.rpm

To install the new package execute (as root) the following command:

rpm -U pidentd-2.8a4-1.i386.rpm

The MD5 checksum (from the "md5sum" command) for these packages
are:

2adbc13dee00a907fef87dd2b50f1c2d RPMS/pidentd-2.8a4-1.i386.rpm
801c10eaa2a78fc8fa54d68209bcc748 SRPMS/pidentd-2.8a4-1.src.rpm


IV. References

This and other Caldera security resources are located at:

http://www.caldera.com/tech-ref/security/

This security advisory report is based on the posting to the
Bugtraq email list:

From: (Corinne Posse Releases) releases@CORINNE.MAC.EDU
To: BUGTRAQ@NETSPACE.ORG
Date: Mon, 4 Aug 1997 09:19:54 -0500
Subject: CPSR #8: identd Denial of Service
Message-ID: Pine.NEB.3.95.970804091757.25418A-100000@corinne.cpio.org

http://www.geek-girl.com/bugtraq/1997_3/0244.html

http://www.internic.net/rfc/rfc1413.txt

This update closes Caldera internal problem report #876.


V. PGP Signature

This message was signed with the PGP key for security@caldera.com.

This key can be obtained from:
ftp://ftp.caldera.com/pub/pgp-keys/

Or on an OpenLinux CDROM under:
/OpenLinux/pgp-keys/

$Id: SA-1997.35,v 1.4 1998/01/01 00:27:26 ron Exp $

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNKrjKun+9R4958LpAQHJLgQAjVd64fXZrdFnrYV1WP7mhKpGSZEoOol8
JCgY3GnwKkDrusVpuSME+JCSrd5PZxv+BXPP3YnaMQ2ozvJMHRe5B3xkzx3pZP2G
jY+haaqqsSjNj3eOohb1h9NzyCPJhP4YiaqKXJKoAW30aqqnWH8yyC2Ba7NoSKup
skC+5yeirwQ=
=9DtX
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close