Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: HP/UX :: vvault5.htm

HP-UX VirtualVault TGA buffer overflow



Vulnerability

    VirtualVault (TGAD)

Affected

    HP9000 Series 700/800 running:
           HP-UX 10.24 (VVOS) with VirtualVault A.02.00
           HP-UX 10.24 (VVOS) with VirtualVault A.03.00
           HP-UX 10.24 (VVOS) with VirtualVault A.03.01
           HP-UX 10.24 (VVOS) with VirtualVault A.03.50

Description

    John Daniele found following.   The VirtualVault operating  system
    is HP's solution to secure electronic commerce.  It is a B1 and B2
    DoD compliant  system that  is becoming  increasingly popular with
    big business, banks,  etc.  The  main security mechanism  in which
    VVOS is based upon  is data partitioning.   Data on the system  is
    classified  into  one  of  four  security  classes, or 'vaults' --
    INSIDE, OUTSIDE, SYSTEM and SYSTEM HIGH.  The INSIDE vault  houses
    the  server's  backend  applications  and  databases.  The OUTSIDE
    vault generally contains the internet front end and any  necessary
    CGI binaries,  etc.   SYSTEM and  SYSTEM HIGH  are responsible for
    maintaining  the  external  webpages  and audit logs respectively.
    These  vaults  are  totally  segregated  from  each other and work
    essentially as separate  machines.  If  a program requires  access
    to either of the vaults  it must be authenticated by  HP's Trusted
    Gateway Proxy daemon.   The TGP daemon  filters all requests  from
    the internet and forwards them to middleware server packages  that
    safely reside behind the INSIDE vault.

    While the TGP daemon does a good job of ensuring the integrity  of
    the  request  prior  to  forwarding  data  to its destination, the
    trusted  gateway  agent  that  is  responsible  for  wrapping  CGI
    requests does not check the length of the request prior to sending
    it to  TGP.   This poses  a problem  since TGA  does not correctly
    handle request messages  that are more  than 512 bytes  in length.
    The result is a trivial DoS  attack on TGA and all services  being
    wrapped by TGA.  The bug was discovered during a penetration  test
    on a client  system running VVOS  3.01. A post  was made to  a CGI
    application  residing  on  the  system  with  a  large  string  of
    characters.   This was  then sent  to the  trusted gateway  agent,
    causing  the  daemon  to  crash,  leaving  the Netscape Enterprise
    Server unable to service further HTTP/SSL requests.  The NES  logs
    show the following:

        [07/May/1999:16:16:22] security: for host xxx.xxx.xxx.xxx trying to
        GET /cgi-bin/somecgi.cgi?AAAAAAAAAAAAAAA..., vvtga_log reports:  ERROR:
        setup_connection():
        Failed to transfer execution message to TGA daemon

    And when NES is started back up:

        [07/May/1999:16:28:18] info:  successful server startup
        [07/May/1999:16:28:18] info: Netscape-Enterprise/3.5.1G B98.169.2301
        [07/May/1999:16:33:18] failure: Error accepting connection -5993 (Resource
        temporarily unavailable)

Solution

    Chris Hudel of  HP was notified  of this bug.   He stated that  HP
    was aware  of the  problem and  addressed it  in patch PHSS 10747.
    NOTE: this bug was not tested against PHSS 10747.  After some time
    new  HP  advisory  appeared,  so  apply the appropriate patches to
    correct the problem:

        HP-UX 10.24 with VirtualVault A.02.00 US/Canada
        HP-UX 10.24 with VirtualVault A.02.00 International:
                PHCO_18615 libsecalarm cumulative patch
                PHSS_19389 VirtualVault:2.00:NES:NSAPI

        HP-UX 10.24 with VirtualVault A.03.00 US/Canada
        HP-UX 10.24 with VirtualVault A.03.00 International:
                PHCO_18615 libsecalarm cumulative patch
                PHSS_19388 VirtualVault:3.00:NES:NSAPI

        HP-UX 10.24 with VirtualVault A.03.01 US/Canada
        HP-UX 10.24 with VirtualVault A.03.01 International:
                PHCO_18615 libsecalarm cumulative patch
                PHSS_19387 VirtualVault:3.01:NES:NSAPI

        HP-UX 10.24 with VirtualVault A.03.50 US/Canada
        HP-UX 10.24 with VirtualVault A.03.50 International:
                PHCO_18615 libsecalarm cumulative patch
                PHSS_19376 VirtualVault:3.50:NES:NSAPI


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH