rhsa-2003_229
Vulnerability from csaf_redhat
Published
2003-07-14 16:00
Modified
2024-11-21 22:45
Summary
Red Hat Security Advisory: : : : Updated ypserv packages fix various vulnerabilities

Notes

Topic
Updated ypserv packages which fix a denial of service (DoS) vulnerability and a memory leak are now available for Red Hat Linux on IBM iSeries and pSeries systems.
Details
The ypserv package contains the Network Information Service (NIS) server. For ypserv versions before 2.5 it was discovered that a memory leak which can be triggered remotely. When someone requests a map that does not exist, a previous mapname may be returned. This happens, for instance, if the command "ypmatch foo aaaaaaaaaaaaaaaaaaaa" is run. Repeatedly running this command will result in the NIS server using more memory and running more slowly. This condition can lead to the killing of the ypserv process due to the system being out of memory. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-1232 to this issue. For ypserv version 2.7 and before, a malicious client can block NIS requests. To do this, the malicious client queries ypserv via TCP and then ignores the server's response. The ypserv daemon will then wait indefinitely for a response from the client indicating it received the message. During this time no other client requests are answered by ypserv, causing a DoS. Versions 2.7 and greater of ypserv have been altered to fork a child process for each client request -- thus preventing any one request from causing a DoS. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0251 to this issue. Red Hat recommends that users of NIS immediately upgrade to the packages contained within this erratum, which are not vulnerable to these
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated ypserv packages which fix a denial of service (DoS) vulnerability\nand a memory leak are now available for Red Hat Linux on IBM iSeries and\npSeries systems.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The ypserv package contains the Network Information Service (NIS) server.\n\nFor ypserv versions before 2.5 it was discovered that a memory leak which\ncan be triggered remotely. When someone requests a map that does not exist,\na previous mapname may be returned. This happens, for instance, if the\ncommand \"ypmatch foo aaaaaaaaaaaaaaaaaaaa\" is run. Repeatedly running this\ncommand will result in the NIS server using more memory and running more\nslowly. This condition can lead to the killing of the ypserv process due to\nthe system being out of memory. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2002-1232 to this issue.\n\nFor ypserv version 2.7 and before, a malicious client can block NIS\nrequests. To do this, the malicious client queries ypserv via TCP and then\nignores the server\u0027s response. The ypserv daemon will then wait\nindefinitely for a response from the client indicating it received the\nmessage. During this time no other client requests are answered by ypserv,\ncausing a DoS. Versions 2.7 and greater of ypserv have been altered to fork\na child process for each client request -- thus preventing any one request\nfrom causing a DoS. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2003-0251 to this issue.\n\nRed Hat recommends that users of NIS immediately upgrade to the packages\ncontained within this erratum, which are not vulnerable to these",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2003:229",
        "url": "https://access.redhat.com/errata/RHSA-2003:229"
      },
      {
        "category": "external",
        "summary": "http://www.linux-nis.org/nis/ypserv/ChangeLog",
        "url": "http://www.linux-nis.org/nis/ypserv/ChangeLog"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_229.json"
      }
    ],
    "title": "Red Hat Security Advisory: : : : Updated ypserv packages fix various vulnerabilities",
    "tracking": {
      "current_release_date": "2024-11-21T22:45:45+00:00",
      "generator": {
        "date": "2024-11-21T22:45:45+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2003:229",
      "initial_release_date": "2003-07-14T16:00:00+00:00",
      "revision_history": [
        {
          "date": "2003-07-14T16:00:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2003-07-14T00:00:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-21T22:45:45+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Linux 7.1",
                "product": {
                  "name": "Red Hat Linux 7.1",
                  "product_id": "Red Hat Linux 7.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:linux:7.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2002-1232",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1616861"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Memory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Linux 7.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2002-1232"
        },
        {
          "category": "external",
          "summary": "RHBZ#1616861",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616861"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1232",
          "url": "https://www.cve.org/CVERecord?id=CVE-2002-1232"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1232",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1232"
        }
      ],
      "release_date": "2002-10-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2003-07-14T16:00:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Red Hat Linux 7.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2003:229"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2003-0251",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617010"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "ypserv NIS server before 2.7 allows remote attackers to cause a denial of service via a TCP client request that does not respond to the server, which causes ypserv to block.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Linux 7.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2003-0251"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617010",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617010"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0251",
          "url": "https://www.cve.org/CVERecord?id=CVE-2003-0251"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0251",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0251"
        }
      ],
      "release_date": "2003-08-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2003-07-14T16:00:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Red Hat Linux 7.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2003:229"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.