VID |
23029 |
Severity |
40 |
Port |
7100 |
Protocol |
TCP |
Class |
X11 |
Detailed Description |
A version of XFS daemon is detected as running on the host. Multiple Vendor X Font Server is vulnerable to a remote buffer overflow attack. A remotely exploitable buffer overrun condition has been reported in the fs.auto, which is the implementation of the X Window Font Service (XFS) used by multiple vendors. By sending a malformed XFS query to a vulnerable system, a remote attacker could overflow a buffer in the fs.auto Dispatch() routine to cause the service to crash or execute arbitrary code on the server with privileges of the "nobody" user.
* Note: This check doesn't perform an actually test to assess this vulnerability but solely relied on the presence of xfs daemon for the remote server, so this might be a false positive.
* References: http://www.cert.org/advisories/CA-2002-34.html http://www.kb.cert.org/vuls/id/312313 http://www.ciac.org/ciac/bulletins/n-024.shtml http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21541
* Platforms Affected: XFree86 X11R6 3.3 XFree86 X11R6 3.3.2 XFree86 X11R6 3.3.3 XFree86 X11R6 3.3.4 XFree86 X11R6 3.3.5 HP HP-UX 10.xx ~ 11.xx Sun Solaris 2.5.1, 2.6, 7, 8, 9 IBM AIX 4.3, 5.1, 5.2 |
Recommendation |
For Sun Solaris systems: Apply the appropriate patch for your system, as listed in Sun Alert ID: 48879 at http://sunsolve.sun.com/search/document.do?assetkey=1-26-56740-1
For SGI IRIX 6.5.x: Apply the appropriate patch for your system, as listed in SGI Security Advisory 20021202-01-I at ftp://patches.sgi.com/support/free/security/advisories/20021202-01-I
For IBM AIX 4.3, 5.1, and 5.2: Apply the appropriate patch for your system. IBM provides the following official fixes: APAR number for AIX 4.3.3: IY37888 (available approx. 01/29/03) APAR number for AIX 5.1.0: IY37886 (available approx. 04/28/03) APAR number for AIX 5.2.0: IY37889 (available approx. 04/28/03) A temporary patch is available through an efix package which can be found at ftp://ftp.software.ibm.com/aix/efixes/security/xfs_efix.tar.Z
For HP HP-UX: Apply the appropriate patch for your system, as listed in HP Security Bulletin: HPSBUX0212-228 at http://www.securityfocus.com/advisories/4988
-- OR --
Disable the fs.auto service if it is not required. Administrators can disable fs.auto by editing the inetd configuration file (/etc/inetd.conf) and then restart the inetd process by following the steps below:
To disable fs.auto on a Solaris system: 1. Edit the "/etc/inetd.conf" file and comment out the following line by adding the "#" symbol to the beginning of the line as follows: #fs stream tcp wait nobody /usr/openwin/lib/fs.auto fs 2. Tell the inetd process to reread the newly modified "/etc/inetd.conf" file by sending it a hangup signal, SIGHUP: # kill -HUP <inetd process id>
*Solaris 10 or later: Stop fs.auto service # svcadm disable svc:/application/x11/xfs:default # pkill -x xfs |
Related URL |
CVE-2002-1317 (CVE) |
Related URL |
6241 (SecurityFocus) |
Related URL |
10375 (ISS) |
|