Date: Thu, 28 Mar 2024 05:06:58 -0400 (EDT) Message-ID: <703313520.453.1711616818385@windcrest.sei.cmu.edu> Subject: Exported From Confluence MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_Part_452_1691630282.1711616818383" ------=_Part_452_1691630282.1711616818383 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Content-Location: file:///C:/exported.html
A complete revision history is at the end of this file.
The Computer Emergency Response Team/Coordination Center (CERT/CC) has r= eceived information concerning a vulnerability in the TFTP daemon in all ve= rsions of AIX for IBM RS/6000 machines.
IBM is aware of this problem and a fix is available as apar number "ix22= 628". This patch is available for all AIX releases from "GOLD" to the curre= nt release.
NOTE: THIS IS AN UPDATED PATCH FROM ONE RECENTLY MADE AVAILABLE and fixe= s a security hole in the original patch. The SCCS id of the correct patch i= s tftpd.c 1.13.1.3 (*not* 1.13.1.2 or earlier versions). This can be checke= d using the following "what" command.
% what /etc/tftpd /etc/tftpd: 56 1.13.1.3 tftpd.c, tcpip, tcpip312 10/10/91 09:01:48 tftpsubs.c 1.2 com/sockcmd/tftpd,3.1.2,9048312 10/8/89 17:40:55IBM customers may call IBM Support (800-237-5511) and ask that the f= ix be shipped to them. The fix will appear in the upcoming 2009 update and = the next release of AIX.=20
#tftp dgram udp wait nobody /etc/tftpd tftpd -nand then, as root, restarting inetd with the "refresh" command.=20
# refresh -s inetdFor more details on starting/stopping tftp, refer to documentation f= or the System Resource Controller (SRC) or the System Management Interface = Tool (SMIT).=20
=09# /etc/tftpaccess.ctl # By default, all files are restricted if /etc/tftpaccess.ctl exist= s. =09# Allow access to X terminal files. allow:/usr/lpp/x_st_mgr/binNOTE: Be CERTAIN to create the /etc/tftpaccess.ctl file.
Installation Instructions:
# chmod 644 /etc/tftpaccess.ctl # chown root.system /etc/tftpaccess.ctl =09 # mv /etc/tftpd /etc/tftpd.old =09 # cp tftpd /etc =09 # chmod 755 /etc/tftpd =09 # chown root.system /etc/tftpd # refresh -s inetd
The CERT/CC wishes to thank Karl Swartz of the Stanford Linear Accelerat= or Center for bringing this vulnerability to our attention.
Copyright 1991 Carnegie Mellon University.
September 18,1997 Attached Copyright Statement