Note: This is an archival copy of Security Sun Alert 200307 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000232.1.
Solaris 7 Operating System
Solaris 8 Operating System
Date of Resolved Release
A local or remote unprivileged user may be able to cause a Denial of Service (DoS) of an FTP server by using up all of the ports in the system.
This issue is described in CVE-1999-0079 which is available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0079.
This issue can occur in the following releases:
Note: Solaris 9 is not affected by this issue.
A number of ports that are unused will be in a "listen" state. To display this condition:
1) Determine the process id (pid) of the in.ftpd(1M) process or processes on the system using pgrep(1). For example:
$ /usr/bin/pgrep in.ftpd
2) Next, issue the pfiles(1) command as the root user for each pid displayed and check for a large number of ports in the "listen" state. The following command can be run as the root user to execute pfiles(1) against all of the in.ftpd(1M) processes on the system:
# /usr/proc/bin/pfiles `/usr/bin/pgrep in.ftpd`
There is no workaround. Please see the "Resolution" section below.
This issue is addressed in the following releases:
This solution has no attachment