Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » IRIX IP denial-of-service fixes and tunings

IRIX IP denial-of-service fixes and tunings

by Nikola Strahija on February 13th, 2003 It's been reported that there are multiple networking related vulnerabilities in certain versions of IRIX.


Title : IP denial-of-service fixes and tunings
Number : 20030201-01-P
Date : February 12, 2003
Reference: CERT CA-2001-09
Reference: CVE-1999-0077 CAN-2001-0328
Reference: SGI BUGS 836110 866901 822734 829671 860748 862151 864775
Fixed in : IRIX 6.5.19 or patches 4765-4770, 4859-4862
______________________________________________________________________________

- -----------------------
- --- Issue Specifics ---
- -----------------------

It's been reported that there are multiple networking related
vulnerabilities in certain versions of IRIX:

o Statistical Weaknesses in TCP/IP Initial Sequence Numbers
http://www.cert.org/advisories/CA-2001-09.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0328

o Denial of Service attack involving clients sending packets with very
small MSS values
http://www.securityfocus.com/archive/1/195457

o IGMP report suppression Denial of Service
http://www.cs.ucsb.edu/~krishna/igmp_dos/

o Non-root users could influence interface settings that they shouldn't
be able to change.

o We added two new systune variables to disable additional types
of broadcast probes.

Non-security related fixes included with these patches,

o Always immediately ACK packets with PSH flag set to improve performance
with GigE networking.

o Permit the use of select() with sockets using the STP protocol in
the IRIX m-stream


SGI has investigated the issue and recommends the following steps for
neutralizing the exposure. It is HIGHLY RECOMMENDED that these measures be
implemented on ALL vulnerable SGI systems.

These issues have been corrected in patches and in IRIX 6.5.19.


- --------------
- --- Impact ---
- --------------

The above vulnerabilities are kernel-level, and naturally the kernel is
installed by default on IRIX 6.5 systems as part of eoe.sw.base.

To determine the version of IRIX you are running, execute the following
command:

# /bin/uname -R

That will return a result similar to the following:

# 6.5 6.5.16f

The first number ("6.5") is the release name, the second ("6.5.16f" in this
case) is the extended release name. The extended release name is the
"version" we refer to throughout this document.


- ----------------------------
- --- Temporary Workaround ---
- ----------------------------

There is no effective workaround available for these problems. SGI
recommends either upgrading to IRIX 6.5.19, or installing the appropriate
patch from the listing below.


- ----------------
- --- Solution ---
- ----------------

SGI has provided a series of patches for these vulnerabilities. Our
recommendation is to upgrade to IRIX 6.5.19 when available, or install the
appropriate patch.

OS Version Vulnerable? Patch # Other Actions
---------- ----------- ------- -------------
IRIX 3.x unknown Note 1
IRIX 4.x unknown Note 1
IRIX 5.x unknown Note 1
IRIX 6.0.x unknown Note 1
IRIX 6.1 unknown Note 1
IRIX 6.2 unknown Note 1
IRIX 6.3 unknown Note 1
IRIX 6.4 unknown Note 1
IRIX 6.5 yes Notes 2 & 3
IRIX 6.5.1 yes Notes 2 & 3
IRIX 6.5.2 yes Notes 2 & 3
IRIX 6.5.3 yes Notes 2 & 3
IRIX 6.5.4 yes Notes 2 & 3
IRIX 6.5.5 yes Notes 2 & 3
IRIX 6.5.6 yes Notes 2 & 3
IRIX 6.5.7 yes Notes 2 & 3
IRIX 6.5.8 yes Notes 2 & 3
IRIX 6.5.9 yes Notes 2 & 3
IRIX 6.5.10 yes Notes 2 & 3
IRIX 6.5.11 yes Notes 2 & 3
IRIX 6.5.12 yes Notes 2 & 3
IRIX 6.5.13 yes Notes 2 & 3
IRIX 6.5.14m yes 4765 Notes 2,4 & 5
IRIX 6.5.14f yes 4766 Notes 2,4 & 5
IRIX 6.5.15m yes 4767 Notes 2,4 & 5
IRIX 6.5.15f yes 4768 Notes 2,4 & 5
IRIX 6.5.16m yes 4769 Notes 2,4 & 5
IRIX 6.5.16f yes 4770 Notes 2,4 & 5
IRIX 6.5.17m yes 4859 Notes 2,4 & 5
IRIX 6.5.17f yes 4860 Notes 2,4 & 5
IRIX 6.5.18m yes 4861 Notes 2,4 & 5
IRIX 6.5.18f yes 4862 Notes 2,4 & 5
IRIX 6.5.19 no


NOTES

1) This version of the IRIX operating has been retired. Upgrade to an
actively supported IRIX operating system. See
http://support.sgi.com/irix/news/index.html#policy for more
information.

2) If you have not received an IRIX 6.5.X CD for IRIX 6.5, contact your
SGI Support Provider or URL: http://support.sgi.com/irix/swupdates/

3) Upgrade to IRIX 6.5.19

4) Install the appropriate patch or upgrade to IRIX 6.5.19

5) Note that for several of these fixes, you have to systune variables to
non-default settings to provide the added protection. Documentation
on how to use the new systunes is in the file /var/sysgen/mtune/bsd.


- ------------------------
- --- Acknowledgments ----
- ------------------------

SGI wishes to thank Michal Zalewski, Krishna Ramachandran, Darren Reed,
Rob Warnock, FIRST, UCSB, and the users of the Internet Community at
large for their assistance in this matter.


##### Patch File Checksums ####

The actual patch will be a tar file containing the following files:

Filename: README.patch.4765
Algorithm #1 (sum -r): 00851 8 README.patch.4765
Algorithm #2 (sum): 50531 8 README.patch.4765
MD5 checksum: EEF9775971EB60E31FF3EE99C3F48D05

Filename: patchSG0004765
Algorithm #1 (sum -r): 61582 2 patchSG0004765
Algorithm #2 (sum): 37142 2 patchSG0004765
MD5 checksum: 79F0A0E99AC82540FB447D147C68DF23

Filename: patchSG0004765.eoe_sw
Algorithm #1 (sum -r): 49197 8682 patchSG0004765.eoe_sw
Algorithm #2 (sum): 52920 8682 patchSG0004765.eoe_sw
MD5 checksum: AA3ABF4FB89EC7214D3F812EF8266F58

Filename: patchSG0004765.idb
Algorithm #1 (sum -r): 33635 8 patchSG0004765.idb
Algorithm #2 (sum): 28804 8 patchSG0004765.idb
MD5 checksum: 48ADB895BB57E67339D8E4C03EDF7071

Filename: README.patch.4766
Algorithm #1 (sum -r): 46520 8 README.patch.4766
Algorithm #2 (sum): 45333 8 README.patch.4766
MD5 checksum: 391B328808E4F94A27305D92634EAAE6

Filename: patchSG0004766
Algorithm #1 (sum -r): 40678 2 patchSG0004766
Algorithm #2 (sum): 37866 2 patchSG0004766
MD5 checksum: 8589BD3E333441A8F051E8BDAAB1F461

Filename: patchSG0004766.eoe_sw
Algorithm #1 (sum -r): 27708 8719 patchSG0004766.eoe_sw
Algorithm #2 (sum): 43291 8719 patchSG0004766.eoe_sw
MD5 checksum: 8619F9B9BABC2240723593F886C6E9DA

Filename: patchSG0004766.idb
Algorithm #1 (sum -r): 42539 8 patchSG0004766.idb
Algorithm #2 (sum): 28701 8 patchSG0004766.idb
MD5 checksum: EBFD5C60C84081AAB256F62A7D515991

Filename: README.patch.4767
Algorithm #1 (sum -r): 17974 8 README.patch.4767
Algorithm #2 (sum): 50521 8 README.patch.4767
MD5 checksum: 695AAF2AC022DF5548F6A08BABB8C19C

Filename: patchSG0004767
Algorithm #1 (sum -r): 50741 2 patchSG0004767
Algorithm #2 (sum): 36840 2 patchSG0004767
MD5 checksum: D40046A218262CE6C4525315574D7A93

Filename: patchSG0004767.eoe_sw
Algorithm #1 (sum -r): 06411 8634 patchSG0004767.eoe_sw
Algorithm #2 (sum): 65220 8634 patchSG0004767.eoe_sw
MD5 checksum: F311806DECAFCBE257C847BA3B90E234

Filename: patchSG0004767.idb
Algorithm #1 (sum -r): 23118 8 patchSG0004767.idb
Algorithm #2 (sum): 28772 8 patchSG0004767.idb
MD5 checksum: 59C5EDC63D888EBCD9678AA094E4AE36

Filename: README.patch.4768
Algorithm #1 (sum -r): 07449 8 README.patch.4768
Algorithm #2 (sum): 45329 8 README.patch.4768
MD5 checksum: 574EF632903897A79F2EC30EBDB749BD

Filename: patchSG0004768
Algorithm #1 (sum -r): 12854 2 patchSG0004768
Algorithm #2 (sum): 37926 2 patchSG0004768
MD5 checksum: 300D477270517404F21EBBC4EC1F9AF1

Filename: patchSG0004768.eoe_sw
Algorithm #1 (sum -r): 19153 8695 patchSG0004768.eoe_sw
Algorithm #2 (sum): 56318 8695 patchSG0004768.eoe_sw
MD5 checksum: 0F31ACA7E678DEFFC62B4470D286C168

Filename: patchSG0004768.idb
Algorithm #1 (sum -r): 10022 8 patchSG0004768.idb
Algorithm #2 (sum): 28960 8 patchSG0004768.idb
MD5 checksum: 001968D21CDAA04CF8F00929F56993D2

Filename: README.patch.4769
Algorithm #1 (sum -r): 31126 8 README.patch.4769
Algorithm #2 (sum): 50564 8 README.patch.4769
MD5 checksum: 82E480DAC43FCEED64BC15B8D9D57DEA

Filename: patchSG0004769
Algorithm #1 (sum -r): 03843 2 patchSG0004769
Algorithm #2 (sum): 36640 2 patchSG0004769
MD5 checksum: FB989211A29CF7D7ED37B20859CDC749

Filename: patchSG0004769.eoe_sw
Algorithm #1 (sum -r): 06936 8684 patchSG0004769.eoe_sw
Algorithm #2 (sum): 19463 8684 patchSG0004769.eoe_sw
MD5 checksum: 0DBAEF3ABE22AF89768A36BEBE7DB6B0

Filename: patchSG0004769.idb
Algorithm #1 (sum -r): 52255 8 patchSG0004769.idb
Algorithm #2 (sum): 28982 8 patchSG0004769.idb
MD5 checksum: CD7BDCADDC43DFCF70718701F2CB31DB

Filename: README.patch.4770
Algorithm #1 (sum -r): 47848 8 README.patch.4770
Algorithm #2 (sum): 45283 8 README.patch.4770
MD5 checksum: 62420BDB0901E3508DC24357A753F808

Filename: patchSG0004770
Algorithm #1 (sum -r): 37174 2 patchSG0004770
Algorithm #2 (sum): 37555 2 patchSG0004770
MD5 checksum: 9BEC0D64A1A37ADC457F5899B59C4924

Filename: patchSG0004770.eoe_sw
Algorithm #1 (sum -r): 39864 8731 patchSG0004770.eoe_sw
Algorithm #2 (sum): 60323 8731 patchSG0004770.eoe_sw
MD5 checksum: 8EF0379361DF58C8D1A7F1EF90BF8957

Filename: patchSG0004770.idb
Algorithm #1 (sum -r): 11481 8 patchSG0004770.idb
Algorithm #2 (sum): 28643 8 patchSG0004770.idb
MD5 checksum: 70C4D90A919D2FDC543923004923956F

Filename: README.patch.4859
Algorithm #1 (sum -r): 00935 8 README.patch.4859
Algorithm #2 (sum): 45233 8 README.patch.4859
MD5 checksum: FB019BC6CF6D404FF65C1961C5916D34

Filename: patchSG0004859
Algorithm #1 (sum -r): 48316 2 patchSG0004859
Algorithm #2 (sum): 37273 2 patchSG0004859
MD5 checksum: A4F76A969A96443ECE4EF81F03E42929

Filename: patchSG0004859.eoe_sw
Algorithm #1 (sum -r): 05200 8682 patchSG0004859.eoe_sw
Algorithm #2 (sum): 24603 8682 patchSG0004859.eoe_sw
MD5 checksum: B4E67351627AF9BD2518E130403E1F5C

Filename: patchSG0004859.idb
Algorithm #1 (sum -r): 12558 8 patchSG0004859.idb
Algorithm #2 (sum): 28929 8 patchSG0004859.idb
MD5 checksum: 2EBD54044AD96AF6E3130F7E4A831F83

Filename: README.patch.4860
Algorithm #1 (sum -r): 08551 8 README.patch.4860
Algorithm #2 (sum): 40311 8 README.patch.4860
MD5 checksum: A083EF36545E7806C503ECDC4205B30C

Filename: patchSG0004860
Algorithm #1 (sum -r): 38690 2 patchSG0004860
Algorithm #2 (sum): 37973 2 patchSG0004860
MD5 checksum: EF53D09FE2F5920C4A2FE48498F526F3

Filename: patchSG0004860.eoe_sw
Algorithm #1 (sum -r): 18758 8729 patchSG0004860.eoe_sw
Algorithm #2 (sum): 50084 8729 patchSG0004860.eoe_sw
MD5 checksum: 49663754DA52A65D1F3955EC3F61D200

Filename: patchSG0004860.idb
Algorithm #1 (sum -r): 00608 8 patchSG0004860.idb
Algorithm #2 (sum): 28685 8 patchSG0004860.idb
MD5 checksum: 89FDF54A20EBDB47F159B5B372098699

Filename: README.patch.4861
Algorithm #1 (sum -r): 55419 8 README.patch.4861
Algorithm #2 (sum): 34686 8 README.patch.4861
MD5 checksum: F67AB6C309E5CB6C14AD328FA5DAFAF9

Filename: patchSG0004861
Algorithm #1 (sum -r): 33127 2 patchSG0004861
Algorithm #2 (sum): 34079 2 patchSG0004861
MD5 checksum: 3A2E13F4214A7DE2EDC6A541AB2C884F

Filename: patchSG0004861.eoe_sw
Algorithm #1 (sum -r): 14812 8693 patchSG0004861.eoe_sw
Algorithm #2 (sum): 65234 8693 patchSG0004861.eoe_sw
MD5 checksum: 57FB55C1100BE5B07200B8AA8952F3AA

Filename: patchSG0004861.idb
Algorithm #1 (sum -r): 48910 8 patchSG0004861.idb
Algorithm #2 (sum): 28671 8 patchSG0004861.idb
MD5 checksum: 23689B4F2FEF2DE6CC4F9B80F4A2B3EA

Filename: README.patch.4862
Algorithm #1 (sum -r): 36366 8 README.patch.4862
Algorithm #2 (sum): 34677 8 README.patch.4862
MD5 checksum: 5F9EC05279B801B70BD80E4AF7265861

Filename: patchSG0004862
Algorithm #1 (sum -r): 49813 2 patchSG0004862
Algorithm #2 (sum): 35382 2 patchSG0004862
MD5 checksum: 69692CEF25EE7AE774DACB8E62AB1DEC

Filename: patchSG0004862.eoe_sw
Algorithm #1 (sum -r): 29451 8746 patchSG0004862.eoe_sw
Algorithm #2 (sum): 17026 8746 patchSG0004862.eoe_sw
MD5 checksum: 4BE770442C8DFD31AC54CCFF35F89E44

Filename: patchSG0004862.idb
Algorithm #1 (sum -r): 04107 8 patchSG0004862.idb
Algorithm #2 (sum): 28768 8 patchSG0004862.idb
MD5 checksum: AEBF11906A3322B410F93CD9F26594B1


- -------------
- --- Links ---
- -------------

SGI Security Advisories can be found at:
http://www.sgi.com/support/security/ and
ftp://patches.sgi.com/support/free/security/advisories/

SGI Security Patches can be found at:
http://www.sgi.com/support/security/ and
ftp://patches.sgi.com/support/free/security/patches/

SGI patches for IRIX can be found at the following patch servers:
http://support.sgi.com/irix/ and ftp://patches.sgi.com/

SGI freeware updates for IRIX can be found at:
http://freeware.sgi.com/

SGI fixes for SGI open sourced code can be found on:
http://oss.sgi.com/projects/

SGI patches and RPMs for Linux can be found at:
http://support.sgi.com/linux/ or
http://oss.sgi.com/projects/sgilinux-combined/download/security-fixes/

SGI patches for Windows NT or 2000 can be found at:
http://support.sgi.com/nt/

IRIX 5.2-6.4 Recommended/Required Patch Sets can be found at:
http://support.sgi.com/irix/ and ftp://patches.sgi.com/support/patchset/

IRIX 6.5 Maintenance Release Streams can be found at:
http://support.sgi.com/colls/patches/tools/relstream/index.html

IRIX 6.5 Software Update CDs can be obtained from:
http://support.sgi.com/irix/swupdates/

The primary SGI anonymous FTP site for security advisories and patches is
patches.sgi.com (216.32.174.211). Security advisories and patches are
located under the URL ftp://patches.sgi.com/support/free/security/

For security and patch management reasons, ftp.sgi.com (mirrors
patches.sgi.com security FTP repository) lags behind and does not do a
real-time update.


- -----------------------------------------
- --- SGI Security Information/Contacts ---
- -----------------------------------------

If there are questions about this document, email can be sent to
[email protected]

------oOo------

SGI provides security information and patches for use by the entire SGI
community. This information is freely available to any person needing the
information and is available via anonymous FTP and the Web.

The primary SGI anonymous FTP site for security advisories and patches is
patches.sgi.com (216.32.174.211). Security advisories and patches are
located under the URL ftp://patches.sgi.com/support/free/security/

The SGI Security Headquarters Web page is accessible at the URL:
http://www.sgi.com/support/security/

For issues with the patches on the FTP sites, email can be sent to
[email protected]

For assistance obtaining or working with security patches, please
contact your SGI support provider.

------oOo------

SGI provides a free security mailing list service called wiretap and
encourages interested parties to self-subscribe to receive (via email) all
SGI Security Advisories when they are released. Subscribing to the mailing
list can be done via the Web
(http://www.sgi.com/support/security/wiretap.html) or by sending email to
SGI as outlined below.

% mail [email protected]
subscribe wiretap
end
^d

In the example above, is the email address that you wish
the mailing list information sent to. The word end must be on a separate
line to indicate the end of the body of the message. The control-d (^d) is
used to indicate to the mail program that you are finished composing the
mail message.


------oOo------

SGI provides a comprehensive customer World Wide Web site. This site is
located at http://www.sgi.com/support/security/ .

------oOo------

If there are general security questions on SGI systems, email can be sent to
[email protected]

For reporting *NEW* SGI security issues, email can be sent to
[email protected] or contact your SGI support provider. A support
contract is not required for submitting a security report.


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »