【TWCERT/CC安全通報】TW-CA-2005-024-[Sun(sm) Alert Notification

看板NetSecurity (資安 資訊安全)作者時間20年前 (2005/03/01 16:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
※ 本文轉錄自 [Lan] 信箱 作者: twcert@cert.org.tw (TWCERT/CC Fellows) 標題: 【TWCERT/CC安全通報】TW-CA-2005-024-[Sun(sm) A 時間: Tue Mar 1 14:11:36 2005 -----BEGIN PGP SIGNED MESSAGE----- TW-CA-2005-024-[Sun(sm) Alert Notification #57673: Security Vulnerability With ARP Handling Could Cause System to Hang] ──────────────────────────────────────── TWCERT/CC發布日期:2005-03-01 原漏洞發布日期:2005-02-11 原漏洞最新更新日期:2005-02-14 通用安全漏洞編號: 分類:Dos 來源參考:Sun(sm) Alert Notification #57673 ──── 簡述 ───────────────────────────────── ──── 說明 ───────────────────────────────── 系統接受到大量的特殊 ARP (7p) 網路封包 (稱為 "ARP 風暴" 或 "ARP 颶風") 可能導致 系統懸滯。這些 ARP 封包可能由遠端具特殊權限之使用者,透過進行阻斷服務攻擊或透過 錯誤的封包路由來產生這些封包。 ──── 影響平台 ─────────────────────────────── 此議題可能影響下列發行版本: SPARC 平台 ‧未安裝 106541-39 修正檔的 Solaris 7 ‧未安裝 116965-05 修正檔的 Solaris 8 ‧未安裝 114344-09 修正檔的 Solaris 9 x86 平台 ‧未安裝 106542-39 修正檔的 Solaris 7 ‧未安裝 116966-05 修正檔的 Solaris 8 ‧未安裝 114345-08 修正檔的 Solaris 9 ──── 修正方式 ─────────────────────────────── 暫時解決方法: 暫時解決方法為暫時將受影響的部分自系統中區隔開,直到找出發起 ARP 封包的源頭或 ARP 封包停止為止。一旦系統不再受到封包攻擊,便不會造成系統懸滯。 解決方法: 此議題已於下列版本中解決: SPARC 平台 ‧安裝 106541-39 或更新版本修正檔的 Solaris 7 ‧安裝 116965-05 或更新版本修正檔的 Solaris 8 ‧安裝 114344-09 或更新版本修正檔的 Solaris 9 x86 平台 ‧安裝 106542-39 或更新版本修正檔的 Solaris 7 ‧安裝 116966-05 或更新版本修正檔的 Solaris 8 ‧安裝 114345-08 或更新版本修正檔的 Solaris 9 ──── 影響結果 ─────────────────────────────── 系統將無法再提供網路服務,而且網路上會出現不尋常的大量 ARP 封包。 可以用 "root" 身份(從同一個網路區塊的不同系統上)執行下列指令來驗證您的 Solaris 系統是否遭受到 ARP 封包的攻擊: # snoop -o <output-file> arp # snoop -i 大量如下的 ARP 廣播,可能表示大量的 ARP 封包: 7 0.12578 123.456.0.22 -> (broadcast) ARP C Who is 123.456.0.254, 123.456.0.254 ? 15 0.10603 123.456.0.2 -> (broadcast) ARP C Who is 123.456.0.22, 123.456.0.22 ? ──── 聯絡TWCERT/CC ───────────────────────────── Tel: 886-7-5250211 FAX: 886-7-5250212 886-2-23563303 886-2-23924082 Email: twcert@cert.org.tw URL: http://www.cert.org.tw/ PGP key: http://www.cert.org.tw/eng/pgp.htm ──────────────────────────────────────── 附件:[Security Vulnerability With ARP Handling Could Cause System to Hang] ──── 原文 ───────────────────────────────── Sun(sm) Alert Notification * Sun Alert ID: 57673 * Synopsis: Security Vulnerability With ARP Handling Could Cause System to Hang * Category: Security, Availability * Product: Solaris * BugIDs: 4653899 * Avoidance: Patch, Workaround * State: Resolved * Date Released: 11-Feb-2005 * Date Closed: 11-Feb-2005 * Date Modified: 1. Impact A system receiving a very large number of specific arp(7P) network packets (an "arp storm" or "arp hurricane") could cause the system to hang. These ARP packets could result from a remote privileged user implementing a Denial of Service (DoS) or from a misconfigured (or broken) router inadvertently sending the packets. 2. Contributing Factors This issue can occur in the following releases: SPARC Platform * Solaris 7 without patch 106541-39 * Solaris 8 without patch 116965-05 * Solaris 9 without patch 114344-09 x86 Platform * Solaris 7 without patch 106542-39 * Solaris 8 without patch 116966-05 * Solaris 9 without patch 114345-08 3. Symptoms The system will be unable to provide networked services, and an unusually heavy amount of ARP traffic will be observed on the network. One way to verify a suspected flood of ARP packets to a specific Solaris system on the network is to run the following command as the "root" user (from another system on the same network segment): # snoop -o <output-file> arp # snoop -i A large number of ARP broadcasts such as: 7 0.12578 123.456.0.22 -> (broadcast) ARP C Who is 123.456.0.254, 123.456.0.254 ? 15 0.10603 123.456.0.2 -> (broadcast) ARP C Who is 123.456.0.22, 123.456.0.22 ? may indicate an ARP flood. Solution Summary 4. Relief/Workaround A temporary workaround would be to physically disconnect the affected segment from the system until the source can be determined, and the source of the flood of ARP packets stopped. Once the system stops processing the packet flood, the hang will no longer be in effect. 5. Resolution This issue is addressed in the following releases: SPARC Platform * Solaris 7 with patch 106541-39 or later * Solaris 8 with patch 116965-05 or later * Solaris 9 with patch 114344-09 or later x86 Platform * Solaris 7 with patch 106542-39 or later * Solaris 8 with patch 116966-05 or later * Solaris 9 with patch 114345-08 or later This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements. Copyright 2000-2005 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. ──────────────────────────────────────── -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.4 iQEVAwUBQiQFkKcyQYefg2/NAQHs0gf/Qyy5lO5yEKmIdlHIr5occSYOAzIlIUGb kV48thwu9gDG6R5vl6r3ICpWcPFWuGGcxlioG/MVDNr0oPPdn7xceD1HNJqKQvhc y51RmDJ5EygKU5k/MTqfWZ5NLYEPkFGm+hHIkXd1bTs9B+Xgn7HNkAAyZAOlvao2 o9ApzbOM7n2UaQ0wcvhvQSXmcydqG395I8GN307Bj2fscm+cR2ip5UTL2RpMlVdN 3zWMbnMwBRD1ysvVnphrxc3Z7pxlx3hp1tJ+nIN8aHSxkUCI3azBTD4IPSZZG09V DlE2x92oyB7XKH0dKnws06pWZqdWdnc2meTBuCPfoAva3m4gWZn20Q== =JgxZ -----END PGP SIGNATURE----- -- Taiwan Computer Emergency Response Team Security Advisory mailing list. Mail to : Majordomo@cert.org.tw and include a line "subscribe advisory". Please visit http://www.cert.org.tw/. PGP key : http://www.cert.org.tw/eng/pgp.htm
文章代碼(AID): #1292Y600 (NetSecurity)
文章代碼(AID): #1292Y600 (NetSecurity)