【TWCERT/CC安全通報】TW-CA-2005-022-[Sun(sm) Alert Notification
※ 本文轉錄自 [Lan] 信箱
作者: twcert@cert.org.tw (TWCERT/CC Fellows)
標題: 【TWCERT/CC安全通報】TW-CA-2005-022-[Sun(sm) A
時間: Fri Feb 18 17:12:05 2005
-----BEGIN PGP SIGNED MESSAGE-----
TW-CA-2005-022-[Sun(sm) Alert Notification #57725: A Local or Remote Unprivileged
User May be Able to Cause a Denial of Service (DoS) of an FTP Server]
────────────────────────────────────────
TWCERT/CC發布日期:2005-02-18
原漏洞發布日期:2005-02-07
原漏洞最新更新日期:2005-02-14
通用安全漏洞編號:
分類:Dos
來源參考:Sun(sm) Alert Notification #57725
──── 簡述 ─────────────────────────────────
──── 說明 ─────────────────────────────────
本地端或遠端未經授權的使用者可能透過使用系統上所有的通訊埠,造成阻斷服務攻擊。
此議題記載於 CVE-1999-0079:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0079
──── 影響平台 ───────────────────────────────
此議題可能影響下列發行版本:
SPARC 平台
‧未安裝 110646-06 修正檔的 Solaris 7
‧未安裝 110606-05 修正檔的 Solaris 8
x86 平台
‧未安裝 110647-06 修正檔的 Solaris 7
‧未安裝 110607-05 修正檔的 Solaris 8
注意:Solaris 9 不受此議題影響。
──── 修正方式 ───────────────────────────────
暫時解決方法:
無暫時性解決方法,請參閱 "解決方法"。
解決方法:
此議題已於下列版本中解決:
SPARC 平台
‧安裝 110646-06 或更新版本修正檔的 Solaris 7
‧安裝 110606-05 或更新版本修正檔的 Solaris 8
x86 平台
‧安裝 110647-06 或更新版本修正檔的 Solaris 7
‧安裝 110607-05 或更新版本修正檔的 Solaris 8
──── 影響結果 ───────────────────────────────
大量未使用的通訊埠會表示為 "listen" 狀態。要顯示此情況:
1)決定 in.ftpd (1M) 中程序的序號(pid),或利用 pgrep(1) 指令。例如:
$ /usr/bin/pgrep in.ftpd
2)下一步,以 root 的身份對每一個 pid 執行 pfiles(1) 指令,並檢查其 "listen" 狀
態。下列指令可以以 root 身份執行 pfiles(1) 以抵抗所有系統中的 in.ftpd(1M) 程序。
# /usr/proc/bin/pfiles `/usr/bin/pgrep in.ftpd`
──── 聯絡TWCERT/CC ─────────────────────────────
Tel: 886-7-5250211 FAX: 886-7-5250212
886-2-23563303 886-2-23924082
Email: twcert@cert.org.tw
URL: http://www.cert.org.tw/
PGP key: http://www.cert.org.tw/eng/pgp.htm
────────────────────────────────────────
附件:[A Local or Remote Unprivileged User May be Able to Cause a Denial of
Service (DoS) of an FTP Server]
──── 原文 ─────────────────────────────────
Sun(sm) Alert Notification
* Sun Alert ID: 57725
* Synopsis: A Local or Remote Unprivileged User May be Able to Cause
a Denial of Service (DoS) of an FTP Server
* Category: Security
* Product: Solaris
* BugIDs: 5108531
* Avoidance: Patch
* State: Resolved
* Date Released: 07-Feb-2005
* Date Closed: 07-Feb-2005
* Date Modified:
1. Impact
A local or remote unprivileged user may be able to cause a Denial of
Service (DoS) of an FTP server by using up all of the ports in the system.
This issue is described in CVE-1999-0079 which is available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0079.
2. Contributing Factors
This issue can occur in the following releases:
SPARC Platform
* Solaris 7 without patch 110646-06
* Solaris 8 without patch 111606-05
x86 Platform
* Solaris 7 without patch 110647-06
* Solaris 8 without patch 111607-05
Note: Solaris 9 is not affected by this issue.
3. Symptoms
A number of ports that are unused will be in a "listen" state. To display
this condition:
1) Determine the process id (pid) of the in.ftpd(1M) process or processes
on the system using pgrep(1). For example:
$ /usr/bin/pgrep in.ftpd
2) Next, issue the pfiles(1) command as the root user for each pid
displayed and check for a large number of ports in the "listen" state.
The following command can be run as the root user to execute pfiles(1)
against all of the in.ftpd(1M) processes on the system:
# /usr/proc/bin/pfiles `/usr/bin/pgrep in.ftpd`
Solution Summary
4. Relief/Workaround
There is no workaround. Please see the "Resolution" section below.
5. Resolution
This issue is addressed in the following releases:
SPARC Platform
* Solaris 7 with patch 110646-06 or later
* Solaris 8 with patch 111606-05 or later
x86 Platform
* Solaris 7 with patch 110647-06 or later
* Solaris 8 with patch 111607-05 or later
This Sun Alert notification is being provided to you on an "AS IS"
basis. This Sun Alert notification may contain information provided by
third parties. The issues described in this Sun Alert notification may
or may not impact your system(s). Sun makes no representations,
warranties, or guarantees as to the information contained herein. ANY
AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT
YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE
OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN.
This Sun Alert notification contains Sun proprietary and confidential
information. It is being provided to you pursuant to the provisions of
your agreement to purchase services from Sun, or, if you do not have
such an agreement, the Sun.com Terms of Use. This Sun Alert
notification may only be used for the purposes contemplated by these
agreements.
Copyright 2000-2005 Sun Microsystems, Inc., 4150 Network Circle, Santa
Clara, CA 95054 U.S.A. All rights reserved.
────────────────────────────────────────
-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.4
iQEVAwUBQhWvLqcyQYefg2/NAQF9jggAt6SLRzhlzjWFLjfh4Z1xp+3xNpbzVExT
UqkkYQYiQaW8gWhZdH1yVVcbU03nLZILh8mu3jnLgpkcHIfr3XHrMnMC/nLui0k5
LFwnb/GyNvWTUyNLx+h3eu4Z+TtyqPhTA/vq0nM6SA66YMEQH4KIYGfsTkSxKeip
uqDE0MSm3mHyVN3AG/kDkx6ysQfkcZ9o8S50ZT2IbGuhXKYjV8mubQ/sD+m/3tM/
WI5VsBJ2KmCD8TW/yMNlqsiOS5oRhdrMZj392USYbpBSs5L9Bup0ZNre9QiJj8ws
4OSOfgHSqGKuJrNepRMD4WtUzg5XtfgEzF3e3OCdXF4tAEVlWmT47w==
=PLJq
-----END PGP SIGNATURE-----
--
Taiwan Computer Emergency Response Team Security Advisory mailing list.
Mail to : Majordomo@cert.org.tw and include a line "subscribe advisory".
Please visit http://www.cert.org.tw/.
PGP key : http://www.cert.org.tw/eng/pgp.htm
NetSecurity 近期熱門文章
PTT數位生活區 即時熱門文章