-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ___________________________________________________________________________ SCO Security Advisory Subject: OpenServer 5.0.5 OpenServer 5.0.6: REVISED: nmap port scanner can kill inetd Advisory number: CSSA-2001-SCO.33.1 Issue date: 2003 March 24 ___________________________________________________________________________ 1. Problem Description The "nmap" port scanner can kill inetd if invoked with the -P0 flag. UPDATES: This update corrects problems with SIGPIPE handling in the previous advisory's supplied inetd. 2. Vulnerable Versions Operating System Version Affected Files ------------------------------------------------------------------ OpenServer 5.0.5 /etc/inetd OpenServer 5.0.6 /etc/inetd 3. Workaround This problem is fixed in the OpenServer 5.0.6 product. If an OpenServer 5.0.6 machine is available, the inetd binary from it can be used on the OpenServer 5.0.5 machine. However, the SIGPIPE problem is present in 5.0.6, so this advisory has been updated to include 5.0.6 as a vulnerable version. 4. OpenServer 4.1 Location of Fixed Binaries ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2001-SCO.33.1/ 4.2 Verification MD5 (inetd.Z) = 832d876b6a2c3ad9b077258e52500ee3 md5 is available for download from ftp://ftp.sco.com/pub/security/tools 4.3 Installing Fixed Binaries Upgrade the affected binaries with the following commands: Download inetd.Z into the /tmp directory # cd /tmp # uncompress inetd.Z # mv /etc/inetd /etc/inetd- # chmod 0 /etc/inetd- # mv /tmp/inetd /etc # chown bin:bin /etc/inetd # chmod 711 /etc/inetd 5. References http://lists.insecure.org/nmap-hackers/2000/Jan-Mar/0073.html SCO security resources: http://www.sco.com/support/security/index.html This advisory addresses SCO Security internal incidents sr853144, SCO-236-1787, and erg711859. 6. Disclaimer SCO is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of SCO products. ___________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (SCO_SV) Comment: For info see http://www.gnupg.org iEYEARECAAYFAj5/Yo0ACgkQaqoBO7ipriGq7wCfeg6ENa81fZmvkganqE6SRr+t +FoAni1sIvis4br1oaSJQjpzjg8XfZ1Q =2+ja -----END PGP SIGNATURE-----