Security hole in netcfg

    Date08 Dec 1999
    CategorySuSE
    3295
    Posted ByLinuxSecurity Advisories
    The way in.identd is started by inetd from a standard /etc/inetd.conf on a SuSE Linux distribution may be exploited to mount a Denial-of-Service attack against the system. When inetd starts in.identd with the "wait" flag and the "-w -t120" options, the in.identd will start to listen on the well known port while inetd deactivates its own listener for the time in.identd is alive.
    ______________________________________________________________________________
    
                            SuSE Security Announcement
    
    	Package:  netcfg-x.x.x-x
    	Date:     Tue Aug 25 07:10:09 MEST 1999
    	Affected: all Unix systems using auth daemon w/o resource control
    ______________________________________________________________________________
    
    A security hole was discovered in the package mentioned above.
    Please update as soon as possible or disable the service if you are using
    this software on your SuSE Linux installation(s).
    
    Other Linux distributions or operating systems might be affected as
    well, please contact your vendor for information about this issue.
    
    Please note, that that we provide this information on as "as-is" basis only.
    There is no warranty whatsoever and no liability for any direct, indirect or
    incidental damage arising from this information or the installation of
    the update package.
    ______________________________________________________________________________
    
    1. Problem Description
    
      The way in.identd is started by inetd from a standard /etc/inetd.conf on
      a SuSE Linux distribution may be exploited to mount a Denial-of-Service
      attack against the system.
    
      When inetd starts in.identd with the "wait" flag and the "-w -t120"
      options, the in.identd will start to listen on the well known port
      while inetd deactivates its own listener for the time in.identd
      is alive.
    
    2. Impact
    
      If many requests (say more than a hundred or so) are sent to the
      server at nearly the same time, in.identd will fork one child process
      for every request. This will eventually lead to a shortage of system
      resources and the computer will become unresponsive.
    
    3. Solution
    
      To prevent the described vulnerability, change the start flag
      for in.identd in /etc/inetd.conf from "wait" to "nowait" and the
      in.identd options from "-w -t120 -e" to "-i -e".
    
      Many system administrators also decide not to run in.identd at all for
      security reasons, so this may a viable alternative in its own right.
    
    ______________________________________________________________________________
    
    Webpage for patches:
            http://www.suse.de/patches/index.html
    
    or try the following web pages for a list of mirrors:
    
            http://www.suse.de/ftp.html
            http://www.suse.com/ftp_new.html
    
    ______________________________________________________________________________
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":56.1,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.2,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":31.71,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.