-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2002.231 -- Compaq Security Advisory (SSRT0822)
                       Java(tm) Runtime Environment
             Proxy and JVM Potential Security Vulnerabilities
                                15 May 2002

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                Compaq Insight Manager XE
                        Compaq Insight Manager 7
                        Compaq Management Agents
                        Remote Insight Lights-Out Edition
                        SDK and JRE (multiple versions)
Vendor:                 Compaq
Operating System:       Compaq Tru64 UNIX
                        Compaq OpenVMS
Impact:                 Increased Privileges
Access Required:        Remote

Ref:                    ESB-2002.114
                        ESB-2002.144

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SECURITY BULLETIN

TITLE: (SSRT0822) Java(tm) Runtime Environment - Proxy and JVM
                  Potential Security Vulnerabilities

NOTICE: There are no restrictions for distribution of this Bulletin
provided that it remains complete and intact.

Posted at:
  http://www.support.compaq.com/patches/mailing-list.shtml

RELEASE DATE: May 2002

SEVERITY:   HIGH

SOURCE:
            Compaq Computer Corporation
            Compaq Services
            Software Security Response Team

REFERENCE:
            SUN Bulletin #00216 & #00218, CVE CAN-2002-0058 , CVE
            CAN-2002-0076

________________
PROBLEM SUMMARY:
 When using Microsoft Internet Explorer or NetScape Navigator to
 browse to Compaq products incorporating affected versions of the
 Java Runtime Environment, users may become vulnerable to attack
 from untrusted applets.  These applets may be able to increase
 their privileges on the user system and potentially gain un-
 authorized access to system resources. This potential problem
 would exist on either side of a corporate firewall.

 Sun Microsystems published two security bulletins regarding
 potential vulnerabilities in Java(tm).

     o The first is a security bulletin (#00216) regarding a
       potential runtime environmental redirection issue that
       may allow an untrusted applet to monitor requests to
       and responses from an HTTP proxy server when a persistent
       connection is used between a client and an HTTP proxy server.
  NOTE: Only systems that have a HTTP proxy configured would be
  vulnerable to this potential exploit.

     o The second is a security bulletin (#00218) regarding a
       potential vulnerability to attack of the Java Runtime
       Environment Bytecode Verifier. The security advisory
       states, "A vulnerability in the Java(TM) Runtime
       Environment Bytecode Verifier may be exploited by an
       untrusted applet to escalate privileges."

__________________
VERSIONS IMPACTED:

 Compaq Management Software
   Compaq Insight Manager 7, Compaq Insight Manager XE, the
   Compaq Management Agents and the Remote Insight Lights-Out
   Edition Card leverage Java technology to deliver portions of their
   functionality. The Java software causing this problem is delivered
   as part of the Java Runtime Environment used to enable access to
   these management products and as part of the server-side software
   embedded in Compaq Insight Manager XE and Compaq Insight
   Manager 7.

   o Compaq Insight Manager XE
     Compaq Insight Manager XE uses the Microsoft Java Runtime
     Environment integrated into Microsoft Internet Explorer.=3D3D20

   o Compaq Insight Manager 7
     Compaq Insight Manager 7 uses the Sun Java Runtime Environment
     version 1.3.1 in place of the Microsoft Java Runtime
     Environment.

   o Compaq Management Agents
     See resolution Section

   o Remote Insight Lights-Out Edition
     See resolution Section


 Compaq Tru64 UNIX
      V4.0f    SDK and JRE 1.1.7B-2
      V4.0g    SDK and JRE 1.1.7B-2
      V5.0a    SDK and JRE 1.1.7B-6
      V5.1     SDK and JRE 1.1.8-6 (default) and 1.2.2-6

 Compaq Nonstop Himalaya
     No applets run on the Compaq NonStop Himalaya operating systems.
     This is not a vulnerability on these systems.

 Compaq OpenVMS
      V7.2 V7.2-1  SDK and JRE 1.1.6-2
      V7.2-1h1     SDK and JRE 1.1.6-2
      V7.2-1h2     SDK and JRE 1.1.6-2
      V7.2-2       SDK and JRE 1.1.6-2
      V7.3         SDK and JRE 1.1.8-5 (includes fix)
      *Please note that this is an issue for the Alpha
       architecture only. OpenVMS on Vax does not support Java.

___________
RESOLUTION:

 The following table outlines the suggested resolutions to the
 vulnerabilities described above. Suggested remedies will be
 different on a product-by-product depending on developer of
 the Java Runtime Environment and any dependencies for
 synchronization between server and client side components.

 Compaq Insight Manager XE
   Compaq Insight Manager XE uses the Microsoft Java Runtime
   Environment integrated into Microsoft Internet Explorer.
   Compaq recommends that Compaq Insight Manager XE users
   upgrade to Compaq Insight Manager 7 SP1 that will be
   available for download in the first half of May at
   http://www.compaq.com/manage. Compaq Insight Manager 7 SP1
   leverages version 1.3.1_02 of the Sun Java Runtime Environment
   that addresses the vulnerability described above. Prior to the
   release of Compaq Insight Manager 7 SP1, Compaq recommends that
   users exercise care when browsing to sites outside of the
   internal network using a browser with a vulnerable version of
   the Microsoft Java Runtime Environment.  While it is possible
   to update the browser to the version of the Java Runtime
   Environment recommended by Microsoft, this version has not been
   tested with Compaq Insight Manager XE and Compaq cannot
   guarantee that Insight Manager XE will function properly.

 Compaq Insight Manager 7
   Compaq Insight Manager 7 uses the Sun Java Runtime Environment
   version 1.3.1 in place of the Microsoft Java Runtime Environment.
   Compaq is in the process of incorporating version 1.3.1_02 of the
   runtime environment, which fixes the aforementioned vulnerability,
   into Compaq Insight Manager 7 Service Pack 1.  Compaq Insight
   Manager 7 SP1 will be available at the beginning of May. Users
   may not use version 1.3.1_02 of the plug-in with the current
   version of Compaq Insight Manager 7 as newer versions of the Sun
   Java Runtime Environment are not backwards compatible and the
   Insight Manager 7 may not function properly if client
   and server side runtime environments are not of the same version.
   Compaq recommends that current Compaq Insight Manager 7 users
   close Microsoft Internet Explorer prior to browsing to
   untrusted sites outside of the corporate firewall.  This will
   ensure that the Java plug-in is closed prior to browsing to
   sites on the public Internet.  With Compaq Insight Manager 7 SP1,
   the requirement to close the browser prior to visiting public
   sites will be removed.

 Compaq Management Agents
   Update to the version of the Java Runtime Environment that
   Microsoft Recommends.  This information may be found at
                http://www.microsoft.com/java/vm/dl_vm40.htm

 Remote Insight Lights-Out Edition / Integrated Lights-Out
 on ProLiant DL360 G2
   Update to the Java(tm) 2 Runtime Environment, Standard Edition,
   version 1.3.1_02.  To download this software simply click on
   the hyperlink http://java.sun.com/j2se/1.3/

 Compaq TRU64 UNIX
   Tru64 UNIX - Java 1.1.7B-10
   Tru64 UNIX - Java 1.1.8-13 (includes fix)
   Tru64 UNIX - Java 1.2.2-12
   Tru64 UNIX - Java 1.3.0-1
   Tru64 UNIX - Java 1.3.1-2 (includes fix)
   It is critical that the information posted at
   http://www.compaq.com/java/alpha be reviewed before updating Java.
   Tru64 UNIX 5.0 and higher include some Java-based tools that
   depend on the Java environment version that ships with the
   operating system and is installed in /usr/bin. If you change
   the default system Java environment version, some operating
   system tools, such as the SysMan Station, the SysMan Station
   authentication daemon, and the Logical Storage Manager (LSM)
  Storage Administrator, will not work correctly.

 Compaq OpenVMS
   The following table shows Java versions that are available at
   http://www.compaq.com/java/alpha  and indicates if the version
includes
   the fix:
   Compaq OpenVMS - Java 1.1.8-5 (includes fix)
   Compaq OpenVMS - Java 1.2.2-3
   Compaq OpenVMS - Java 1.3.0-2 (includes fix)
   Compaq OpenVMS - Java 1.3.1-2 (includes fix)
   It is critical that the information posted at
   http://www.compaq.com/java/alpha be reviewed before updating Java.

__________
SUBSCRIBE:

To subscribe to automatically receive future Security
Advisories from the Compaq's Software Security Response Team via
electronic mail:
http://www.support.compaq.com/patches/mailing-list.shtml

_______
REPORT:

To report a potential security vulnerability with any Compaq
supported product, send email mailto:security-ssrt@compaq.com
or mailto:sec-alert@compaq.com

Compaq appreciates your cooperation and patience. As always,
Compaq urges you to periodically review your system management
and security procedures. Compaq will continue to review and
enhance the security features of its products and work with
our customers to maintain and improve the security and integrity
of their systems.

"Compaq is broadly distributing this Security Bulletin in order to
bring to the attention of users of the affected Compaq products the
important security information contained in this Bulletin.
Compaq recommends that all users determine the applicability of
this information to their individual situations and take appropriate
action.  Compaq does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently,
Compaq will not be responsible for any damages resulting from
user's use or disregard of the information provided in this
Bulletin."

Copyright 2002 Compaq Information Technologies Group, L.P.
Compaq shall not be liable for technical or editorial errors
or omissions contained herein. The information in this document
is subject to change without notice. Compaq and the names of
Compaq products referenced herein are, either, trademarks
and/or service marks or registered trademarks and/or service
marks of Compaq Information Technologies Group, L.P. Other product
and company names mentioned herein may be trademarks and/or service
marks of their respective owners.

- -----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.1

iQA/AwUBPOFxFDnTu2ckvbFuEQKjvQCgrIbosO8ILvkzRikR2nit/mzy1k4An3TK
aVsSiWVhRI67p1RCnquAtuf2
=VRtm
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBPOJ9lCh9+71yA2DNAQEkxgP8C6Nc3IESxvmWx54d5M3Li4iammFB2GOl
9gpgq5dFgud0OzlWoaIA9N3aBqO5qPiqBsffG4vWj8vZo76krqfFeKRDaKrnDaAJ
xm0Q7uonECiAXHVdckr3uVQ3Vs/rlN+kJqmX3AvUqGOE/+l7Kg9INS7xsQsqovKX
DrQzZevBVIY=
=EyGu
-----END PGP SIGNATURE-----