----
An upgrade to A/UX version 3.1 (and 3.1.1) for this vulnerability is
available. The upgrade replaces the rpc.statd binary with a new, improved
version. It is available via anonymous FTP from ftp.support.apple.com:
pub/apple_sw_updates/US/Unix/A_UX/supported/3.x/rpc.statd/rpc.statd.Z
Uncompress(1) this file and replace the existing version in /etc.
Modify the entry for rpc.statd in /etc/inittab to "respawn" instead of "wait".
Kill the running rpc.statd and restart.
Earlier versions of A/UX are not supported by this patch. Users of
previous versions are encouraged to update their system or disable rpc.statd.
AIX for the Apple Network Server
-------------------------------
An upgrade to AIX version 4.1.4 for the Network Server which resolves
this vulnerability is available. The PTF replaces the rpc.statd binary
and related programs with new, improved versions.
To determine if you already have APAR IX55931 on your system, run the
following command:
instfix -ik IX55931
Or run the following command:
lslpp -h bos.net.nfs.client
Your version of bos.net.nfs.client should be 4.1.4.7 or later.
The PTF for this APAR is available via anonymous FTP from
ftp.support.apple.com:
pub/apple_sw_updates/US/Unix/AIX/supported/4.1/bos.net.nfs.client.bff
Place this file in /usr/sys/inst.images or another directory of your choice.
To install the PTF, start smit using the following fast path:
# smit install_selectable
Select the menu item "Install Fileset Updates by Fix" and provide the
name of the directory in which the PTF was placed. Enter OK and in the
next dialog, enter the APAR number, IX55931, in the "FIXES" item. For
information about the other options in this dialog, see the manual page
for installp(1). Enter OK, exit smit and restart the system.
Customers should contact their reseller for any additional information.
Berkeley Software Design, Inc.
=============================
BSD/OS is not vulnerable.
Cray Research, Inc.
===================
This problem has been tracked with SPR 99983 and reported
with Field notice 2107. Since statd is only available on 9.0 systems
fixes have been provided for UNICOS 9.0 and higher.
Data General Corporation
========================
Data General has fixed this vulnerability in DG/UX R4.11 Maintenance
Update 2 (R4.11MU02).
Digital Equipment Corporation
=============================
At the time of writing this document, patches (binary kits) for Digital's
ULTRIX operating system are being developed - V4.3 (both VAX and RISC) thru
V4.5.
Similar patches (binary kits) for Digital UNIX (OSF/1) versions 3.0 thru 3.2d
are being tested. Digital will provide notice of the completion of the kits
through AES services (DIA, DSNlink FLASH) and be available from your normal
Digital Support channel.
Digital's Software Security Response Team 16.APR.1996
Harris Computer Systems Corporation
===================================
All versions of NightHawk CX/SX and CyberGuard CX/SX are not vulnerable.
All versions of NightHawk CX/UX and PowerUX are vulnerable.
Users are advised, until patches are available, to use the workaround
in the advisory.
Hewlett-Packard Company
=======================
Vulnerable - 9.X & 10.X (i.e., all that are currently supported)
Patches are in process; watch for an HP security bulletin.
IBM Corporation
===============
See the appropriate release below to determine your action.
AIX 3.2
-------
Apply the following fix to your system:
APAR - IX56056 (PTF - U441411)
To determine if you have this PTF on your system, run the following
command:
lslpp -lB U441411
AIX 4.1
-------
Apply the following fix to your system:
APAR - IX55931
To determine if you have this APAR on your system, run the following
command:
instfix -ik IX55931
Or run the following command:
lslpp -h bos.net.nfs.client
Your version of bos.net.nfs.client should be 4.1.4.7 or later.
To Order
--------
APARs may be ordered using FixDist or from the IBM Support Center.
For more information on FixDist, reference URL:
http://aix.boulder.ibm.com/pbin-usa/fixdist.pl/
or send e-mail to aixserv_at_austin.ibm.com with a subject of "FixDist".
NEC Corporation
===============
Some systems are vulnerable. We are developing the patches and plan to put
them on our anonymous FTP server. You can contact us with the following
e-mail address if you need.
E-mail: UX48-security-support_at_nec.co.jp
FTP server: ftp://ftp.meshnet.or.jp
NeXT Software, Inc.
===================
This vulnerability will be fixed in release 4.0 of OpenStep for Mach,
scheduled for 2Q96.
The Santa Cruz Operation, Inc.
==============================
These are not vulnerable:
SCO UnixWare 2.x.
SCO OpenServer 3.0, 5
SCO Open Desktop 2.x, 3.x
SCO NFS 1.x.x.
Silicon Graphics, Inc.
======================
All versions of IRIX earlier than 6.2 are vulnerable.
IRIX 6.2 is not vulnerable.
Sony Corporation
================
NEWS-OS 4.2.1 vulnerable; Patch 0124 [rpc.statd] is available.
NEWS-OS 6.0.3 vulnerable; Patch SONYP6063 [lockd/statd 2] is
available.
NEWS-OS 6.1 vulnerable; Patch SONYP6176 [lockd/statd] is
available.
NEWS-OS 6.1.1 vulnerable; Patch SONYP6207 [lockd/statd] is
available.
Patches are available via anonymous FTP in the
/pub/patch/news-os/un-official directory on
ftp1.sony.co.jp [202.238.80.18]:
4.2.1a+/0124.doc describes about patch 0124 [rpc.statd]
4.2.1a+/0124_C.pch patch for NEWS-OS 4.2.1C/a+C
4.2.1a+/0124_R.pch patch for NEWS-OS 4.2.1R/RN/RD/aRD/aRS/a+R
6.0.3/SONYP6063.doc describes about patch SONYP6063 [lockd/statd 2]
6.0.3/SONYP6063.pch patch for NEWS-OS 6.0.3
6.1/SONYP6176.doc describes about patch SONYP6176 [lockd/statd]
6.1/SONYP6176.pch patch for NEWS-OS 6.1
6.1.1/SONYP6207.doc describes about patch SONYP6207 [lockd/statd]
6.1.1/SONYP6207.pch patch for NEWS-OS 6.1.1
If you need further information, contact your dealer.
Sun Microsystems, Inc.
======================
SunOS 4.x and Solaris 2.x are believed to be vulnerable. When further
information is available, it will be placed in CA-96.09.README.
.........................................................................
Appendix B: Example Workaround Scenario
The information given below was provided to the CERT/CC by Wolfgang Ley
of DFN-CERT. It is reproduced here as an example of how to run the statd
daemon as a user other than root on a Solaris system. This workaround
may not be directly applicable on other vendor's systems, but an analogous
solution may be possible. Please contact your vendor for assistance.
The statd daemon under Solaris 2.4 and 2.5 starts without problems
if the following steps are taken.
1) Go into single user mode (ensure rpcbind and statd are not running)
2) Create a new user, e.g., "statd" with a separate uid/gid
3) Chown statd /var/statmon/* /var/statmon/*/*
4) Chgrp statd /var/statmon/* /var/statmon/*/*
5) Edit /etc/init.d/nfs.client startup script and change the start of the
statd from:
/usr/lib/nfs/statd > /dev/console 2>&1
to:
/usr/bin/su - statd -c "/usr/lib/nfs/statd" > /dev/console 2>&1
6) Reboot the system
Received on Thu Apr 25 1996 - 02:19:18 NZST
This archive was generated by hypermail 2.4.0 : Wed Nov 08 2023 - 11:53:46 NZDT