[Full-disclosure] SCOSA-2005.43 OpenServer 6.0.0 : RPCBind Remote Denial of Service Vulnerability

Date: 10/28/05

Date: Fri, 28 Oct 2005 16:13:19 -0400 (EDT)
To: security-announce@list.sco.com

Hash: SHA1


                         SCO Security Advisory

Subject: OpenServer 6.0.0 : RPCBind Remote Denial of Service Vulnerability
Advisory number: SCOSA-2005.43
Issue date: 2005 October 27
Cross reference: sr895067 erg712957 fz533036 CAN-2005-2132

1. Problem Description

         When the RPC portmapper (rpcbind) receives an invalid portmap
         request from a remote (or local) host, it falls into a denial
         of service state and cannot respond. As a result, the RPC
         services will not operate normally.

         The Common Vulnerabilities and Exposures project (cve.mitre.org)
         has assigned the name CAN-2005-2132 to this issue.

2. Vulnerable Supported Versions

         System Binaries
         OpenServer 6.0.0 /usr/lib/libnsl.so.1

3. Solution

         The proper solution is to install the latest packages.

4. OpenServer 6.0.0

         4.1 Location of Fixed Binaries


         4.2 Verification

         MD5 (VOL.000.000) = 5086254532a3d202f526de0b6d343e66

         md5 is available for download from

         4.3 Installing Fixed Binaries

         Upgrade the affected binaries with the following sequence:

         1) Download the VOL* files to a directory

         2) Run the custom command, specify an install from media
         images, and specify the directory as the location of the

5. References

         Specific references for this advisory:

         SCO security resources:
         SCO security advisories via email

         This security fix closes SCO incidents sr895067 erg712957 fz533036.

6. Disclaimer

         SCO is not responsible for the misuse of any of the information
         we provide on this website and/or through our security
         advisories. Our advisories are a service to our customers
         intended to promote secure installation and use of SCO

7. Acknowledgments

         The SCO Group would like to thank Yun Jonglim for his work
         in discovering and describing this defect so well.

Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/