IBM Information for VU#266817

Multiple Sun RPC-based libc implementations fails to provide time-out mechanism when reading data from TCP connections

Status

Affected

Vendor Statement

The AIX operating system is vulnerable to the SUN RPC libc DOS attack, as mentioned above, in releases 4.3.3, 5.1.0 and 5.2.0.

The following APARs will be available for this fix:

APAR number for AIX 4.3.3: IY36463 (available approx. 11/27/2002)
APAR number for AIX 5.1.0: IY36507 (available approx. 4/28/2003)
APAR number for AIX 5.2.0: IY36854 (available approx. 4/28/2003)

The APARs can be downloaded using the link below and then following the links for your release level.

http://techsupport.services.ibm.com/rs6k/fixes.html

An efix is available for this issue and is available from the following URL:

ftp://ftp.software.ibm.com/aix/efixes/security/rpc_efix.tar.Z

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.