CVE-2005-2132
CVSS2.1
发布时间 :2005-08-03 00:00:00
修订时间 :2016-10-17 23:25:14
NMCOPS    

[原文]RPC portmapper (rpcbind) in SCO UnixWare 7.1.1 m5, 7.1.3 mp5, and 7.1.4 mp2 allows remote attackers or local users to cause a denial of service (lack of response) via multiple invalid portmap requests.


[CNNVD]UnixWare 拒绝服务漏洞(CNNVD-200508-046)

        UnixWare是由SCO公司开发和维护的商业性质Unix操作系统。
        UnixWare 7.x RPC端口映射程序存在拒绝服务漏洞。如果UnixWare 7.x版本的RPC端口映射程序(rpcbind)接收到了一些无效的端口映射请求的话,就可能导致拒绝服务,无法响应正常的RPC端口映射请求。
        rpcbind将每个RPC服务映射到本地或远程RPC请求相应的端口,因此如果rpcbind拒绝服务的话,端口映射就无法正常运行,导致大多数RPC服务不可用。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:sco:unixware:7.1.3_mp5
cpe:/o:sco:unixware:7.1.1_m5
cpe:/o:sco:unixware:7.1.4_mp2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2132
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2132
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200508-046
(官方数据源) CNNVD

- 其它链接及资源

ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.31/SCOSA-2005.31.txt
(VENDOR_ADVISORY)  SCO  SCOSA-2005.31
http://marc.info/?l=bugtraq&m=112247187722821&w=2
(UNKNOWN)  BUGTRAQ  20050727 [NILESA-20050701] UnixWare 7.x RPC portmapper Dos Vulnerability
http://www.securityfocus.com/bid/14360
(UNKNOWN)  BID  14360

- 漏洞信息

UnixWare 拒绝服务漏洞
低危 其他
2005-08-03 00:00:00 2005-10-20 00:00:00
远程  
        UnixWare是由SCO公司开发和维护的商业性质Unix操作系统。
        UnixWare 7.x RPC端口映射程序存在拒绝服务漏洞。如果UnixWare 7.x版本的RPC端口映射程序(rpcbind)接收到了一些无效的端口映射请求的话,就可能导致拒绝服务,无法响应正常的RPC端口映射请求。
        rpcbind将每个RPC服务映射到本地或远程RPC请求相应的端口,因此如果rpcbind拒绝服务的话,端口映射就无法正常运行,导致大多数RPC服务不可用。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.sco.com/support/security/index.html
        ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.31

- 漏洞信息 (F41076)

SCOSA-2005.43.txt (PacketStormID:F41076)
2005-10-30 00:00:00
SCO  sco.com
advisory,remote,denial of service,local
CVE-2005-2132
[点击下载]

SCO Security Advisory - When the RPC portmapper (rpcbind) receives an invalid portmap request from a remote (or local) host, it falls into a denial of service state and cannot respond. As a result, the RPC services will not operate normally.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


______________________________________________________________________________

 			SCO Security Advisory

Subject:		OpenServer 6.0.0 : RPCBind Remote Denial of Service Vulnerability
Advisory number: 	SCOSA-2005.43
Issue date: 		2005 October 27
Cross reference:	sr895067 erg712957 fz533036 CAN-2005-2132
______________________________________________________________________________


1. Problem Description

 	When the RPC portmapper (rpcbind) receives an invalid portmap
 	request from a remote (or local) host, it falls into a denial
 	of service state and cannot respond. As a result, the RPC
 	services will not operate normally.

 	The Common Vulnerabilities and Exposures project (cve.mitre.org)
 	has assigned the name CAN-2005-2132 to this issue.


2. Vulnerable Supported Versions

 	System				Binaries
 	----------------------------------------------------------------------
 	OpenServer 6.0.0		/usr/lib/libnsl.so.1


3. Solution

 	The proper solution is to install the latest packages.


4. OpenServer 6.0.0

 	4.1 Location of Fixed Binaries

 	ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.43


 	4.2 Verification

 	MD5 (VOL.000.000) = 5086254532a3d202f526de0b6d343e66

 	md5 is available for download from
 		ftp://ftp.sco.com/pub/security/tools


 	4.3 Installing Fixed Binaries

 	Upgrade the affected binaries with the following sequence:

 	1) Download the VOL* files to a directory

 	2) Run the custom command, specify an install from media
 	images, and specify the directory as the location of the
 	images.


5. References

 	Specific references for this advisory:
 		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2132

 	SCO security resources:
 		http://www.sco.com/support/security/index.html
 	SCO security advisories via email
 		http://www.sco.com/support/forums/security.html

 	This security fix closes SCO incidents sr895067 erg712957 fz533036.


6. Disclaimer

 	SCO is not responsible for the misuse of any of the information
 	we provide on this website and/or through our security
 	advisories. Our advisories are a service to our customers
 	intended to promote secure installation and use of SCO
 	products.


7. Acknowledgments

 	The SCO Group would like to thank Yun Jonglim for his work
 	in discovering and describing this defect so well.

______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAkNhPPkACgkQaqoBO7ipriEu+wCaAhGGLIVq7OtpTuUBQ4RxMOP7
gHQAniSVhsDnsSldI/t3oynFPXUOVhFi
=sm7f
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F38920)

NILESA-20050701.txt (PacketStormID:F38920)
2005-07-28 00:00:00
Yun Jonglim  nilesoft.co.kr
advisory,denial of service
unixware
CVE-2005-2132
[点击下载]

When the UnixWare 7.x version of the RPC portmapper (rpcbind) receives an invalid portmap request, it falls into a denial of service state and cannot respond.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================================================
                        NileSOFT Security Advisory
- --------------------------------------------------------------------------------
ID      : NILESA-20050701
Title   : rpcbind Invalid portmap Request Causes Denial of Service
Vendor  : SCO
URL     : www.sco.com
Product : UnixWare 7.x (and maybe other versions)
Severity: Moderate
Local   : Possible
Remote  : Possible
Date    : 2005.07.25
CVE ID  : CAN-2005-2132
Author  : Yun Jonglim / NileSOFT (www.nilesoft.co.kr)
================================================================================

1. Summary

When the UnixWare 7.x version of the RPC portmapper(rpcbind) receives an invalid
portmap request from a remote (or local) host, it falls into a denial of service
state and cannot respond.

2. Vulnerability Description

When the UnixWare 7.x version of the RPC portmapper(rpcbind) receives a number of
invalid portmap requests, it falls into a denial of service state and does not
respond to normal RPC portmap requests.
rpcbind maps each RPC service to the corresponding port for remote(or local) RPC
service requests. Therefore, when rpcbind falls into a denial of service state,
the port mapping does not operate normally and will cause most RPC services to be
unusable.

3. Impact

The RPC services will not operate normally.

4. Remedy

SCO will be releasing the advisory and fix: SCOSA-2005.31.
http://www.sco.com/support/security/index.html
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.31

5. Disclosure Dates

2005/05/15 First discovered and analyzed
2005/06/01 Vender notified and initial response
2005/07/19 Vender Confirmed and patch prepared
2005/07/25 Advisory released

6. CVE Information

The Common Vulnerabilities and Exposures (CVE) project has assigned the
names CAN-2005-2132 to these issues. This is a candidate for inclusion
in the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (MingW32) - GPGshell v3.30

iQEVAwUBQubU3oFNV2ryoBXjAQIPBAf/apd71pVJN6tf3MRefWZgbBCrKIhMfEAr
fjn+9t8dcjg0v4PT5U2KBu6VeKS6h/Q1tuz9cfHxs4fSDrldgcSCjYqsnU6PrVDq
6VjwJgSzJ5KCam/5Lt4ORQWVW0kKrO6eQyEWC/wEBHfYimY7XaZrFmYVAL/k+wcG
AsPYvkBv2zaPdHLYPQJJkkGnxHiE04MWUgQbVP5iv1WfO1W9QpIiM1AHeeaP4Fy5
+mM58OgpGKCKZZs15869xHOOM4j1BN4non1AqpRrqq8GYWeXIkdkHRzeDayyxn0L
tb+1PVcX4m4gNvfMJHrx04RiAq02dTyJSZzHv2mIC66mKY4h4L/MUQ==
=wRT6
-----END PGP SIGNATURE-----

    

- 漏洞信息

18479
SCO UnixWare RPC portmapper Multiple Invalid Request DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

SCO UnixWare contains a flaw that may allow a remote denial of service. The issue is triggered when the RPC portmapper receives an invalid portmap request, causing it to hang and stop responding to further queries. As a result, the RPC services will not operate normally until the service is restarted by an administrator.

- 时间线

2005-07-25 2005-05-15
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, SCO has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

SCO UnixWare RPC Portmapper Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 14360
Yes No
2005-07-25 12:00:00 2009-07-12 04:06:00
Discovery is credited to Yun Jonglim <abc@nilesoft.co.kr>.

- 受影响的程序版本

SCO Unixware 7.1.4
SCO Unixware 7.1.3 up
SCO Unixware 7.1.3
SCO Unixware 7.1.2
SCO Unixware 7.1.1
SCO Unixware 7.1
SCO Unixware 7.0.1
SCO Unixware 7.0
SCO Open Server 6.0

- 漏洞讨论

SCO UnixWare is reported prone to a denial of service vulnerability.

Reportedly, this issue arises when the application handles multiple invalid portmap requests.

UnixWare 7.x versions are reported to be affected.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

SCO has released advisory SCOSA-2005.31 to address this issue. Please see the referenced advisory for more information.

SCO has released advisory SCOSA-2005.43 to address this issue in OpenServer 6.0.0. Please see the referenced advisory for more information.


SCO Open Server 6.0

SCO Unixware 7.1.1

SCO Unixware 7.1.3

SCO Unixware 7.1.4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站