__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN AIX Symlink and Buffer Overflow Vulnerabilities in LVM Commands [IBM MSS-OAR-E01-2004:0544.2] April 30, 2004 17:00 GMT Number O-131 ______________________________________________________________________________ PROBLEM: A symlink vulnerability exists in some LVM commands. Also buffer overflow vulnerabilities exist in the putlvcb and getlvcb commands used by high level LVM commands. PLATFORM: AIX 5.1 AND 5.2 DAMAGE: The symlink vulnerability may lead to data destruction or a denial service and there are no known exploits. The buffer overflow vulnerabilities may lead to arbitrary code execution by a local attacker with system group privileges and there are known exploits. SOLUTION: Install security updates. ______________________________________________________________________________ VULNERABILITY The risk is MEDIUM. A local attacker with system group ASSESSMENT: privileges may execute arbitrary code. A local attacker may cause data destruction or a denial of service. ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/o-131.shtml ORIGINAL BULLETIN: http://www-1.ibm.com/services/continuity/recover1.nsf/mss/ MSS-OAR-E01-2004.0544.2 ______________________________________________________________________________ [***** Start IBM MSS-OAR-E01-2004:0544.2 *****] IBM SECURITY ADVISORY First Issued: Thu Apr 22 15:17:51 CDT 2004 =========================================================================== VULNERABILITY SUMMARY VULNERABILITY: symlink and buffer overflow vulnerabilities in LVM commands PLATFORMS: AIX 5.1 and 5.2. SOLUTION: Apply the efixes or APARs as described below. THREAT: A local attacker may cause data destruction or a denial of service. A local attacker with system group privileges may execute arbitrary code. CERT VU Number: N/A CVE Number: N/A =========================================================================== DETAILED INFORMATION I. Description =============== A symlink vulnerability was discovered in some LVM commands that allow an attacker to overwrite arbitrary system files. This could lead to data destruction or a denial of service. These issues were discovered internally; at this time there are no known exploits in the wild. Buffer overflow vulnerabilities were discovered in the putlvcb and getlvcb commands. These commands are used by high level LVM commands to modify and query the Logical Volume Control Block. To exploit these issues, an attacker must have system group privileges. There are known exploits for this issue. The commands affected by these issues ship as part of the bos.rte.lvm fileset. To determine if this fileset is installed, execute the following command: # lslpp -L bos.rte.lvm If the fileset is installed it will be listed along with its version information, state, type and a description. II. Impact ========== A local attacker may cause data destruction or a denial of service. A local attacker with system group privileges may execute arbitrary code. III. Solutions =============== A. Official Fix IBM provides the following fixes: APAR number for AIX 5.1.0: IY55681 (available approx. 06/02/04) APAR number for AIX 5.2.0: IY55682 (available approx. 05/19/04) NOTE: Affected customers are urged to upgrade to 5.1.0 or 5.2.0 at the latest maintenance level. B. Emergency Fix Efixes are available for AIX 5.1.0 and 5.2.0. The efixes can be downloaded via ftp from: ftp://aix.software.ibm.com/aix/efixes/security/lvmcmd_efix.tar.Z lvmcmd_efx.tar.Z is a compressed tarball containing this advisory, two efix packages for 5.1.0 and 5.2.0 and cleartext PGP signatures for each efix package. Verify you have retrieved the efixes intact: - - -------------------------------------------- The checksums below were generated using the "sum" and "md5sum" commands and are as follows: Filename sum md5 ====================================================================== lvmcmd51.040422.epkg.Z 20723 485 d6016788254e40377304208870e1e54a lvmcmd52.040422.epkg.Z 49794 542 e5ec42cb05641643fce249663f75f377 These sums should match exactly. The PGP signatures in the compressed tarball and on this advisory can also be used to verify the integrity of the various files they correspond to. If the sums or signatures cannot be confirmed, double check the command results and the download site address. If those are OK, contact IBM AIX Security at security-alert@austin.ibm.com and describe the discrepancy. IMPORTANT: If possible, it is recommended that a mksysb backup of the system is created. Verify it is both bootable, and readable before proceeding. These efixes have not been fully regression tested; thus, IBM does not warrant the fully correct functioning of the efix. Customers install the efix and operate the modified version of AIX at their own risk. Efix Installation Instructions: - - ------------------------------- The efix package for AIX 5.1.0 and 5.2.0 are named lvmcmd51.040422.epkg.Z and lvmcmd52.040422.epkg.Z respectively. These packages use the new Emergency Fix Management Solution to install and manage efixes. More information can be found at: http://techsupport.services.ibm.com/server/aix.efixmgmt To preview an epkg efix installation execute the following command: # emgr -e epkg_name -p # where epkg_name is the name of the # efix package being previewed. To install an epkg efix package, execute the following command: # emgr -e epkg_name -X # where epkg_name is the name of the # efix package being installed. The "X" flag will expand any filesystems if required. IV. Obtaining Fixes =================== AIX Version 5 APARs can be downloaded from the eServer pSeries Fix Central web site: http://www-912.ibm.com/eserver/support/fixes/fcgui.jsp Security related Emergency Fixes can be downloaded from: ftp://aix.software.ibm.com/aix/efixes/security V. Contact Information ======================== If you would like to receive AIX Security Advisories via email, please visit: https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs Comments regarding the content of this announcement can be directed to: security-alert@austin.ibm.com To request the PGP public key that can be used to communicate securely with the AIX Security Team send email to security-alert@austin.ibm.com with a subject of "get key". The key can also be downloaded from a PGP Public Key Server. The key id is 0x3AE561C3. Please contact your local IBM AIX support center for any assistance. eServer is a trademark of International Business Machines Corporation. IBM, AIX and pSeries are registered trademarks of International Business Machines Corporation. All other trademarks are property of their respective holders. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (MingW32) iD8DBQFAiWnS+0ah+jrlYcMRArSKAKDsq7c/m0wm2IxAclS9Sjf8Jw38FwCgv/Oe f5LR1vIsUxjG2NNwzhmLPj0= =RLCA - -----END PGP SIGNATURE----- Shiva Persaud AIX Security Developer Phone: 512-838-1192 shivapd@us.ibm.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) Comment: IBM MSS Advisory Service iD8DBQFAj8kNxetIpAeGAXARAsbYAKD3xqN9J+nmQqmwKECnmZKlwpi3KwCdF0kt uc1MZoOavjXGg04pnhNfmDg= =2uG3 -----END PGP SIGNATURE----- [***** End IBM MSS-OAR-E01-2004:0544.2 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of IBM Global Services Managed Security Services for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) O-121: Debian linux-kernel-2.4.17 and 2.4.18 Vulnerabilities O-122: Red Hat Updated OpenOffice Packages Fix Security Vulnearbility in Neon O-123: Debian 483-1 MySQL O-124: Cisco TCP Vulnerabilities in Multiple Cisco Products O-125: Cisco Vulnerabilities in SNMP Message Processing O-126: Red Hat Updated Kernel Packages Fix Several Vulnerabilities O-127: Debian linux-kernel-2.4.16 Vulnerabilities O-128: Apache HTTP Server 2.0.49 Release Fixes Security Vulnerabilities O-129: Common Desktop Environment (CDE) dtlogin XDMCP parser Vulnerability O-130: Perl and ActivePerl win32_stat Buffer Overflow