-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 IBM SECURITY ADVISORY First Issued: Tue Dec 18 11:33:00 CST 2007 | Updated: Wed Dec 19 13:45:27 CST 2007 | Added perl PTF for APARs IY98394 and IY98395 to ifix tar file | Updated: Tue Mar 11 12:57:00 CDT 2008 | Fixed fileset levels and APAR numbers =============================================================================== VULNERABILITY SUMMARY VULNERABILITY: AIX Perl buffer overflow vulnerability PLATFORMS: AIX 5.2, 5.3, 6.1 SOLUTION: Apply the APAR, interim fix or workaround as described below. THREAT: A remote attacker may run arbitrary code. CERT VU Number: n/a CVE Number: CVE-2007-5116 =============================================================================== DETAILED INFORMATION I. OVERVIEW Perl is a free software scripting language interpreter providing a rich set of features provided as part of the base AIX Operating System environment. II. DESCRIPTION A buffer overflow vulnerability exists in the 'perl.rte' fileset. A remote attacker may execute arbitrary code if a Perl script executing on the system is listening on a network port. If exploited the attacker can execute arbitrary code with the same privileges as the script. For more details please visit: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116 III. IMPACT The successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code. IV. PLATFORM VULNERABILITY ASSESSMENT To determine if your system is vulnerable, run the following command: # lslpp -l perl.rte The following fileset levels are vulnerable: AIX Fileset AIX Level Lower Level Upper Level ---------------------------------------------------------------- perl.rte 5.2.0 5.8.0.0 5.8.0.106 | perl.rte 5.3.0 5.8.2.0 5.8.2.61 | perl.rte 5.3.7 5.8.2.70 5.8.2.70 perl.rte 6.1.0 5.8.2.70 5.8.2.70 NOTE: Affected customers are urged to upgrade to the latest applicable Technology Level and Service Pack. V. SOLUTIONS A. APARS IBM provides the following fixes: AIX Level APAR number Availability --------------------------------------------------- 5.2 IZ10220 05/14/2008 | 5.3 through TL06 IZ10244 Now | 5.3 TL07 IZ10245 Now | 6.1 IZ10245 Now Subscribe to the APARs here: http://www.ibm.com/support/docview.wss?uid=isg1IZ10220 http://www.ibm.com/support/docview.wss?uid=isg1IZ10244 By subscribing, you will receive periodic email alerting you to the status of the APAR, and a link to download the fix once it becomes available. AIX Version 5 APARs can be downloaded from: http://www.ibm.com/servers/eserver/support/unixservers/aixfixes.html NOTE: Affected customers are urged to upgrade to the latest applicable Technology Level and Service Pack. B. INTERIM FIXES Interim fixes are available. The interim fix can be downloaded via ftp from: ftp://aix.software.ibm.com/aix/efixes/security/perl_ifix.tar | The latest perl interim fixes do not include all of the files | affected by the previous perl security vulnerability, fixed by | APARs IY98394 (52) and IY98395 (53). If you have the previous | ifix for IY98394 or IY98395 installed, please remove the | previous ifix, install the appropriate PTF | (perl.rte.5.8.0.106.U or perl.rte.5.8.2.61.U), and then | install the latest ifix with the procedure below. The PTFs | have been added to the updated interim fix tar file. Please | note that the latest ifix itself has not changed with this | update, we have only added the PTFs to the tar file. The link above is to a tar file containing this signed advisory, interim fix packages, and PGP signatures for each package. The interim fixes below include prerequisite checking. This will enforce the correct mapping between the fixes and AIX Technology Levels. AIX Fileset AIX Release and Interim fix Technology Level ----------------------------------------------------------------- perl.rte 5200-08 IZ10220.071206.epkg.Z perl.rte 5200-09 IZ10220.071206.epkg.Z perl.rte 5200-10 IZ10220.071206.epkg.Z perl.rte 5300-05 IZ10244.071206.epkg.Z perl.rte 5300-06 IZ10244.071206.epkg.Z perl.rte 5300-07 IZ10244.071206.epkg.Z perl.rte 6100-00 (same as 53) IZ10244.071206.epkg.Z IMPORTANT: If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding. These interim fixes have not been fully regression tested; thus, IBM does not warrant the fully correct functionality of the interim fix. Verify you have retrieved the fixes intact: The checksums below were generated using the "sum", "cksum", "csum -h MD5" (md5sum), and "csum -h SHA1" (sha1sum) commands and are as follows: sum filename ------------------------------------ 21674 5683 IZ10220.071206.epkg.Z 43658 5880 IZ10244.071206.epkg.Z | 60869 23239 perl.rte.5.8.0.106.U | 61317 22846 perl.rte.5.8.2.61.U cksum filename ------------------------------------------ 3383682558 5819246 IZ10220.071206.epkg.Z 4001149063 6020447 IZ10244.071206.epkg.Z | 2242377008 23796736 perl.rte.5.8.0.106.U | 3794525633 23394304 perl.rte.5.8.2.61.U csum -h MD5 (md5sum) filename ---------------------------------------------------------- 208b132ee3ff67d7ac4641e1ef9b5c6b IZ10220.071206.epkg.Z 42e6ae761b9ec36ad653a3fa294fd184 IZ10244.071206.epkg.Z | 418dda5cb0f895205ab489bc2f0c0baa perl.rte.5.8.0.106.U | 4e6cad28ba5cf25512b0ce22f9dff54b perl.rte.5.8.2.61.U csum -h SHA1 (sha1sum) filename ------------------------------------------------------------------ aea47a5acc29ad3b5eee23de3cee47d53706e79a IZ10220.071206.epkg.Z 21db9fa9b433a2fc62d7897dab2c1a62e55a6a9e IZ10244.071206.epkg.Z | 4d57b03a8a558b154abfb75da6bac716b0cf3911 perl.rte.5.8.0.106.U | 0d331754e38c4fb6458219a91a2f6703b511eaba perl.rte.5.8.2.61.U To verify the sums, use the text of this advisory as input to csum, md5sum, or sha1sum. For example: csum -h SHA1 -i Advisory.asc md5sum -c Advisory.asc sha1sum -c Advisory.asc These sums should match exactly. The PGP signatures in the compressed tarball and on this advisory can also be used to verify the integrity of the various files they correspond to. If the sums or signatures cannot be confirmed, double check the command results and the download site address. If those are OK, contact IBM AIX Security at security-alert@austin.ibm.com and describe the discrepancy. C. INTERIM FIX INSTALLATION These packages use the new Interim Fix Management Solution to install and manage interim fixes. More information can be found at: http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html To preview an epkg interim fix installation execute the following command: # emgr -e ipkg_name -p # where ipkg_name is the name of the # interim fix package being previewed. To install an epkg interim fix package, execute the following command: # emgr -e ipkg_name -X # where ipkg_name is the name of the # interim fix package being installed. The "X" flag will expand any filesystems if required. VI. WORKAROUNDS If you are running perl network services there are no known workarounds. If the perl services are not needed and are running, shut them down. VII. OBTAINING FIXES AIX Version 5 APARs can be downloaded from: | http://www.ibm.com/eserver/support/fixes/fixcentral/main/pseries/aix Security related Interim Fixes can be downloaded from: ftp://aix.software.ibm.com/aix/efixes/security VIII. CONTACT INFORMATION If you would like to receive AIX Security Advisories via email, please visit: http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd Comments regarding the content of this announcement can be directed to: security-alert@austin.ibm.com To request the PGP public key that can be used to communicate securely with the AIX Security Team you can either: A. Send an email with "get key" in the subject line to: security-alert@austin.ibm.com B. Download the key from a PGP Public Key Server. The key ID is: 0xA6A36CCC Please contact your local IBM AIX support center for any assistance. eServer is a trademark of International Business Machines Corporation. IBM, AIX and pSeries are registered trademarks of International Business Machines Corporation. All other trademarks are property of their respective holders. IX. ACKNOWLEDGMENTS Tavis Ormandy and Will Drewry are credited with the discovery of this issue. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (AIX) iD8DBQFH1soz8lficKajbMwRAnN6AKCA9vFrheteUBS+MS9ANCJ6XZqe2wCfa+tR ZG4sLhhhfFQL2EfrZj8RZMY= =7PL/ -----END PGP SIGNATURE-----