[219] in Best-of-Security

home help back first fref pref prev next nref lref last post

BoS: Sun Security Bulletin #00142

daemon@ATHENA.MIT.EDU (Adam Morrison)
Fri Jun 6 11:52:24 1997

From: Adam Morrison <adam@math.tau.ac.il>
Date: Fri, 6 Jun 1997 14:44:29 +0300 (GMT+0300)
Cc: best-of-security@suburbia.net
In-Reply-To: <199706050124.LAA06752@guru.citec.qld.gov.au> from "Colin Campbell" at Jun 5, 97 11:24:25 am
Errors-To: best-of-security-request@suburbia.net
To: best-of-security@suburbia.net
Resent-From: best-of-security@suburbia.net


> I just downloaded 104331-02 for SunOS 5.5.1 and restarted rpcbind. Well
> look at that (lsof -p xxx):
> 
> rpcbind    1070     root    3u  inet   0x5012cbc8        0t0        UDP *:sunrpc
> rpcbind    1070     root    4u  inet   0x5012cc38        0t0        UDP *:0
> rpcbind    1070     root    5u  inet   0x5012cca8        0t0        UDP *:34378
> rpcbind    1070     root    6u  inet   0x5012ca78        0t0        TCP *:sunrpc
> rpcbind    1070     root    7u  inet   0x5012cb58        0t0        TCP *:39168
> 
> So what was the patch supposed to do?

Hopefully, it was not supposed to kill rpcbind's ability to handle UDP based
callits.  I admit that I haven't verified the patch, but considering the
nature of problem, I would not expect a fix to this vulnerability to stomp
this port out completely.  Unfortunately, the nature of this problem was not
fully explained to the public.

The port in question was used by rpcbind to forward UDP callit calls to other
RPC daemons on its machine; there was some flawed logic in the poll() 
handling code that caused an incoming RPC which was not a reply by said
daemons to a callit RPC to get passed to the main rpcbind boilerplate 
function.  The fix -- which I hope Sun implemented -- would be to stop this
from happening by correcting that logic.



						adam?


home help back first fref pref prev next nref lref last post