-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

    ESB-2003.0018 -- HEWLETT-PACKARD SECURITY BULLETIN: HPSBUX0301-236
    MANUAL ACTIONS fields corrected for HPSBUX0201-180, HPSBUX0110-172,
             HPSBUX0203-187, HPSBUX0203-188 and HPSBUX0207-205
                              13 January 2003

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                Hewlett-Packard Security Bulletins
Vendor:                 Hewlett-Packard
Impact:                 Provide Misleading Information

Ref:                    ESB-2001.443
                        ESB-2002.046
                        ESB-2002.148
                        ESB-2002.149
                        ESB-2002.386

- --------------------------BEGIN INCLUDED TEXT--------------------

Digest Name:  daily HP-UX security bulletins digest
    Created:  Fri Jan 10  6:00:03 EST 2003

Table of Contents:

Document ID      Title
- ---------------  -----------
HPSBUX0301-236   MANUAL ACTIONS fields corrected
HPSBUX0201-180   Sec. Vulnerability with WU-FTPD 2.6 (rev.1)
HPSBUX0110-172   Sec. Vulnerability in telnetd (rev.1)
HPSBUX0203-187   Sec. Vulnerability in JRE Bytecode Verifier (rev.1)
HPSBUX0203-188   Sec. Vulnerability in JAVA Web Start ) (rev.1)
HPSBUX0207-205   RFC 1948 ISN randomization is now available (rev.1)

The documents are listed below.
- -------------------------------------------------------------------------------

Document ID:  HPSBUX0301-236
Date Loaded:  20030109
      Title:  MANUAL ACTIONS fields corrected

 -----------------------------------------------------------------
 Source: HEWLETT-PACKARD COMPANY
 SECURITY BULLETIN: HPSBUX0301-236
 Originally issued: 10 January 2003
 MANUAL ACTIONS fields corrected
 -----------------------------------------------------------------
NOTICE: There are no restrictions for distribution of this Bulletin
provided that it remains complete and intact. 				

The information in the following Security Bulletin should be
acted upon as soon as possible.  Hewlett-Packard Company will
not be liable for any consequences to any customer resulting
from customer's failure to fully implement instructions in this
Security Bulletin as soon as possible.

 ------------------------------------------------------------------ 
PROBLEM: Some security bulletins had incorrect or incomplete 
         MANUAL ACTIONS fields.

IMPACT: Determining the correct actions was inconvenient.

PLATFORM: All

SOLUTION: The MANUAL ACTIONS fields have been corrected.

MANUAL ACTIONS: Yes - NonUpdate
                If bulletins are maintained locally, optionally
                download new copies.  Only bulletins with incorrect
                MANUAL ACTIONS fields will be mailed out. 
                Bulletins which were revised to add a missing
                MANUAL ACTIONS field or to correct the format of
                the MANUAL ACTIONS field will not be mailed out for
                this revision.

AVAILABILITY: The corrected bulletins are available now.
 ------------------------------------------------------------------ 
 A. Background

The format of the MANUAL ACTIONS line has been standardized.

   MANUAL ACTIONS: No

      The bulletin can be completely implemented by installing 
      a standard patch (for example, PHxx_12345).

   MANUAL ACTIONS: Non-HP-UX only
 
      The same as "MANUAL ACTIONS: No" for HP-UX, but the bulletin
      applies to other operating systems for which a manual
      action is required.

   MANUAL ACTIONS: Yes - Update

      The product must be updated rather than patched.

   MANUAL ACTIONS: Yes - Update plus other actions

      The product must be updated rather than patched.
      Other actions in addition to updating are required.

   MANUAL ACTIONS: Yes - NonUpdate

       Some action is required instead of or in addition to
       installing an update or a patch.

For bulletins with "MANUAL ACTIONS: No" the Security Patch Check
Tool is able to determine whether the bulletin has been implemented
on a system running HP-UX 11.X.  For 10.X, if the bulletin says
"MANUAL ACTIONS: No" and a patch listed in the Security Patch Matrix
(or a superseding patch) has been installed, the bulletin has been
implemented.

The following security bulletins were updated to conform with the
MANUAL ACTIONS format above.  The revised bulletins are listed 
in three sections:

      I. Incorrect MANUAL ACTIONS
     II. Missing or mis-formatted "MANUAL ACTIONS - Yes"
          or "MANUAL ACTIONS - Non-HP-UX only".
    III. Missing or mis-formatted "MANUAL ACTIONS - Non-HP-UX only"
     IV. Missing or mis-formatted "MANUAL ACTIONS - No"


======================================================
I. Incorrect MANUAL ACTIONS
======================================================

The MANUAL ACTIONS section in each of the following 
bulletins was incorrect or misleading.  These bulletins
have been revised and sent to the e-mail distribution.

=========================================
HPSBUX0110-172 Sec. Vulnerability in telnetd
PLATFORM: HP9000 Servers running HP-UX releases 10.X only.
MANUAL ACTIONS: No
=========================================
HPSBUX0201-180 Sec. Vulnerability with WU-FTPD 2.6
PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.0 and 11.11.
MANUAL ACTIONS: Yes - Update
                Upgrade WU-FTPD to version 2.6 (rev b01.002).
=========================================
HPSBUX0203-187 Sec. Vulnerability in JRE Bytecode Verifier
PLATFORM:  HP9000 Series 700/800 running HP-UX releases 10.20 and
           11.x only.  This security bulletin applies to Java
           on HP-UX.  It does not cover software shipped on Linux
           or Windows/NT.
MANUAL ACTIONS: Yes - Update
                JDK and JRE 1.1.8.06 or higher for HP-UX 10.20.
                JDK and JRE 1.1.8.06 or higher for HP-UX 11.x
                JDK and JRE 1.2.2.12 or higher for HP-UX 11.x.
                JDK and JRE 1.3.1.00 or higher for HP-UX 11.x
=========================================
HPSBUX0203-188 Sec. Vulnerability in JAVA Web Start
PLATFORM:  HP9000 Series 700/800 running HP-UX releases 11.x only.
           This security bulletin applies to Java Web Start on HP-UX.
           It does not cover software shipped on Linux or Windows/NT.
MANUAL ACTIONS: Yes - Update
                Web Start 1.0.1.01 or higher for HP-UX 11.x.
=========================================
HPSBUX0207-205 RFC 1948 ISN randomization is now available.
PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.00,
          11.04 and 11.11.
MANUAL ACTIONS: Yes - NonUpdate
                Install patch and enable randomization.
=========================================

======================================================
II. Missing or mis-formatted "MANUAL ACTIONS - Yes"
======================================================

The MANUAL ACTIONS section in each of the following bulletins
was either missing or was not in the new format.  These 
bulletins will not be sent to the e-mail distribution.


=========================================
HPSBUX9402-004 Promiscuous mode network interfaces
PLATFORM: HP 9000 Series 300, 400, 700, 800 running HP-UX
                Apollo Token Ring (HP-UX 8.X, 9.X; s700 only)
                STREAMS-DLPI (HP-UX 9.X)
MANUAL ACTIONS: Yes - NonUpdate
                Prevent users from gaining root access.
=========================================
HPSBUX9404-007 HP-UX does not have ftpd SITE EXEC vulnerability
PLATFORM: All HP-UX systems
MANUAL ACTIONS: Yes - NonUpdate
                Advisory only.
=========================================
HPSBUX9405-010 ftpd: SITE CHMOD / race condition vulnerability
PLATFORM: All HP-UX systems
MANUAL ACTIONS: Yes - NonUpdate
                Advisory only.
=========================================
HPSBUX9405-011 Security Vulnerability in HP GlancePlus
PLATFORM: HP 9000 series 300/400s and 700/800s.
MANUAL ACTIONS: Yes - Update
=========================================
HPSBUX9405-012 Security vulnerability in Multimedia Sharedprint
PLATFORM: HP 9000 series 700 at HP-UX revision 9.X, only
MANUAL ACTIONS: Yes - NonUpdate
                Change file permissions.
=========================================
HPSBUX9406-014 Patch file permissions vulnerability
PLATFORM:  s300/s400/s700/s800  all revisions of hp-ux
MANUAL ACTIONS: Yes - NonUpdate
                Run the fix_patch_perms script (below).
=========================================
HPSBUX9408-016 Patch sums and the MD5 program
PLATFORM: All HP-UX systems.
MANUAL ACTIONS: Yes - NonUpdate
                Advisory only.
=========================================
HPSBUX9502-021 No current vulnerability in /bin/mail (or /bin/rmail)
PLATFORM: All HP-UX systems
MANUAL ACTIONS: Yes - NonUpdate
                Advisory only.
=========================================
HPSBUX9504-026 Preparing Your HP-UX System for SATAN
PLATFORM: All HP-UX systems
MANUAL ACTIONS: Yes - NonUpdate
                Implement procedure discussed below before
                running SATAN.
=========================================
HPSBUX9511-028 Security Vulnerability in FTP
PLATFORM: HP 9000 series 300/400s and 700/800s
MANUAL ACTIONS: Yes - Update
                Update to 9.x or 10.x, then apply the
                appropriate patches.
=========================================
HPSBUX9602-030 Security Vulnerability DCE Sec. Service session key gen'rtn
PLATFORM: HP 9000/700 and 9000/800 systems running HP DCE/9000 and
          configured into DCE cells
MANUAL ACTIONS: Yes - NonUpdate
                Apply patches and change all keys
                (details below)
=========================================
HPSBUX9607-033 Security Vulnerability in expreserve
PLATFORM: HP 9000 series 300/400s and 700/800s
MANUAL ACTIONS: Yes - NonUpdate
                Apply patches (9.X, 10.X) or take documented
                actions for releases of HP-UX prior to 9.X.
=========================================
HPSBUX9607-034 Security Vulnerability in SAM remote admin
PLATFORM: HP 9000/300/400/700 and 800 systems running any currently
          supported version of HP-UX 9.X and 10.X.
MANUAL ACTIONS: Yes - NonUpdate
                Implement workaround below.
=========================================
HPSBUX9607-035 Security Vulnerability in nettune executable
PLATFORM: HP 9000/700 and 9000/800 systems running operating system
          version 10.0 or 10.01 of HP-UX.
MANUAL ACTIONS: Yes - NonUpdate
                Change permissions and ownership of 
                /usr/contrib/bin/nettune.
=========================================
HPSBUX9610-039 Security Vulnerabilities in HP Remote Watch 
PLATFORM: HP 9000 series 300/400/700/800s
MANUAL ACTIONS: Yes - NonUpdate
                Do not use Remote Watch.
=========================================
HPSBUX9611-041 Vulnerability with Large UID's and GID's in HP-UX 10.20
PLATFORM: HP 9000 series 700/800 systems running version 10.20
MANUAL ACTIONS: Yes - NonUpdate
                Apply patches and examine suid files.
=========================================
HPSBUX9612-042 Security Vulnerability in fpkg2swpkg in HP-UX 10.XX
PLATFORM: HP 9000 Series 700 and 800s
MANUAL ACTIONS: Yes - NonUpdate
                Remove suid bit from /usr/sbin/fpkg2swpkg.
=========================================
HPSBUX9701-054 Recent sendmail patches for HP-UX releases 9.X thru 10.10
PLATFORM: HP 9000 Series 700/800s running versions of HP-UX 9.X thru 10.10
MANUAL ACTIONS: Yes - NonUpdate
                Clean up password file.
=========================================
HPSBUX9704-058 Security Vulnerability in libXt for HP-UX 9.X + 10.X
PLATFORM:  HP 9000 series 700/800 systems running version 9.X or 10.X
MANUAL ACTIONS: Yes - NonUpdate
                Apply the patches listed below and relink any
                suid/sgid programs that use libXt.a.
=========================================
HPSBUX9704-060 SYN Flooding Security Vulnerability in HP-UX
PLATFORM: HP 9000 Series 700/800s running versions of HP-UX 9.X and 10.X
MANUAL ACTIONS: Yes - NonUpdate
                Apply the appropriate patch and enable/tune
                the defense mechanism.
=========================================
HPSBUX9707-065 Security Advisory in Netscape shipped with HP-UX
PLATFORM: All platforms running Netscape Navigator 2.0, 3.0, and
          Communicator 4.0.
MANUAL ACTIONS: Yes - NonUpdate
                 Apply the workaround described below.
=========================================
HPSBUX9707-068 Security Vulnerability in Novell Netware 3.12 on HP-UX
PLATFORM: HP 9000 Series 700/800s running only specific releases of HP-UX
          9.X and 10.X. See below.
MANUAL ACTIONS: Yes - Update
=========================================
HPSBUX9709-069 Security Advisory in vuefile, vuepad, et. al. in HP-UX
PLATFORM: HP9000 Series 700/800s running HP-UX releases 9.X and 10.X
MANUAL ACTIONS: Yes - NonUpdate
                Do not run vuefile, vuepad, dtfile, or dtpad
                while su'd to another account or with the 
                display set to another Xserver, unless the
                same account is logged in at each Xserver.
=========================================
HPSBUX9710-072 Sec. Vulnerability in CDE on HP-UX 10.[10, 20, 24, 30]
PLATFORM: HP9000 series 700/800, HP-UX releases 10.10, 10.20, 10.24,
          and 10.30.
MANUAL ACTIONS: Yes - NonUpdate
                Install the patches and relink any programs
                linked with archived CDE libraries.
=========================================
HPSBUX9801-074 Security Vulnerability in CUE under HP-UX
PLATFORM: HP9000 series 800, releases HP-UX 8.X, 9.X, 10.X, and 11.0
MANUAL ACTIONS: Yes - NonUpdate
                Remove the cue program.
=========================================
HPSBUX9804-078 Security Vulnerability in Openmail on HP-UX
PLATFORM: Any HP 9000 series 700/800 systems running OpenMail.
MANUAL ACTIONS: Yes - NonUpdate
                Reconfigure OpenMail per the OpenMail
                Technical Guide.
=========================================
HPSBUX9807-080 Security Advisory with Netscape servers on HP-UX
PLATFORM:  HP9000 Series 7/800 running HP-UX releases 10.X and 11.00
MANUAL ACTIONS: Yes - NonUpdate
                Download patches for Netscape 3.X and earlier
                from Netscape.
=========================================
HPSBUX9810-085 Security Vulnerability with HP OpenView Omniback II
PLATFORM: HP9000 series 7/800 running releases 9.X, 10.X, or 11.00
          Other vendor platforms as noted below.
MANUAL ACTIONS: Yes - NonUpdate
                Install patches and take other
                actions described below.
=========================================
HPSBUX9904-097 Security Vulnerability in sendmail
PLATFORM:  HP 9000 Series 700/800 Servers running HP-UX 10.20 and 11.00
MANUAL ACTIONS: Yes - Update

       For HP-UX releases prior to 10.20, upgrade from
       sendmail 5.65 to
       sendmail release 8.8.6.  See www.software.hp.com

       For HP-UX release 10.20:   PHNE_17135 ;
       For HP-UX release 11.00:   PHNE_17190.
=========================================
HPSBUX9907-100 CDE Leaves Current Directory in root PATH
PLATFORM: HP 9000 series 700/800 at HP-UX revision 10.X
MANUAL ACTIONS: Yes - NonUpdate
                For 10.10, Modify /usr/dt/bin/Xsession
                           as shown below. 
                For 10.20, install PHSS_19482 or subsequent
                For 10.24, install PHSS_19702 or subsequent
                Note: No action is needed for 10.20 or 10.24
                      beyond installing the patch.
=========================================
HPSBUX9911-105 Security Vulnerability on V Class Teststation
PLATFORM: HP9000 Series 800 S/X/V Class servers.
MANUAL ACTIONS: Yes - Update
                Install patch or update to Teststation
                or Teststation Version 1.1.2
=========================================
HPSBUX0001-109 Security Vulnerability with Audio Security File
PLATFORM: HP9000 Series 7/800 running HP-UX releases 10.X and 11.X
MANUAL ACTIONS: Yes - NonUpdate
                Apply the appropriate patch.
                10.10,10.20   PHSS_24534 or subsequent.
                11.00         PHSS_24608 or subsequent.
                If /etc/opt/audio/audio.sec exists and 
                does not have 444 permissions, 
                chmod 444 /etc/opt/audio/audio.sec 
=========================================
HPSBUX0001-110 Security Vulnerability with PMTU strategy
PLATFORM: HP-UX releases 10.30, 11.00 and 11.04 only.
MANUAL ACTIONS: Yes - NonUpdate
                Set the NDD parameter ip_pmtu_strategy to 1.
=========================================
HPSBUX0002-111 Sec. Vulnerability with Ignite on Trusted systems
PLATFORM: HP-9000 Series700/800 running release HP-UX 11.X only.
MANUAL ACTIONS: Yes - NonUpdate
                Verify that all entries in /etc/passwd have
                "*" in the password field if the
                system is trusted.
=========================================
HPSBUX0005-114 Sec. Vulnerability in BIND
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.XX and 11.XX.
MANUAL ACTIONS: Yes - Update
                Install patches (below) which upgrade BIND 
                4.9.7 or upgrade to version 8.1.2.
=========================================
HPSBUX0010-126 Sec. Vulnerability in Praesidium Web Proxy 1.0
PLATFORM: VVOS release 10.24 and 11.04 running VirtualVault 4.0,
          with HP Praesidium Proxy V1.0 only.
MANUAL ACTIONS: Yes - NonUpdate
                Reconfigure web server as necessary.
=========================================
HPSBUX0011-131 Sec. Vulnerability in EMS
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20 and 11.00.
MANUAL ACTIONS: Yes - Update
                Update to EMS A.03.20 release.
=========================================
HPSBUX0011-132 Sec. Vulnerability in JRE
PLATFORM: This security bulletin applies to Java on HP9000 Series
          700/800 running HP-UX releases 10.20, 10.24, 11.00, 11.04,
          and 11.11 only.  It does not cover software shipped on
          Linux nor on Windows/NT.
MANUAL ACTIONS: Yes - Update
                      Install the latest Java releases:
                      JDK and JRE 1.1.8.04 or higher for HP-UX 10.20,
                           10.24, 11.00, 11.04 and 11.11.
                      JDK and JRE 1.2.2.04 or higher for HP-UX 11.00,
                           11.04 and 11.11.
                      JDK and JRE 1.3.0.00 for HP-UX 11.XX
=========================================
HPSBUX0012-133 Sec. Vulnerability in ContinentalClusters
PLATFORM:  HP9000 Series 800 running ContinentalClusters all
           releases A.01.0X, and A.02.00 on HP-UX release 11.00
           and 11.11.
MANUAL ACTIONS: Yes - Update plus other actions
                Upgrade to ContinentalClusters version A.02.00
                and apply patches.
=========================================
HPSBUX0102-141 Sec. Vulnerability in JRE
PLATFORM:  HP9000 Series 700/800 running HP-UX releases 10.20, 10.24, 11.00,
           11.04, and 11.11 only.  This security bulletin applies to Java
           on HP-UX, and does not cover software shipped on Linux, nor on
           Windows/NT.
MANUAL ACTIONS: Yes - Update
                Install the latest Java releases:
                 JDK and JRE 1.1.8.05 or higher for HP-UX 10.20,
                        10.24 and 11.XX.
                 JDK and JRE 1.2.2.07 or higher for HP-UX 11.XX.
                 JDK and JRE 1.3.0.00 or higher for HP-UX 11.XX.
=========================================
HPSBUX0102-142 Sec. Vulnerability in OV OmniBack
PLATFORM: Windows NT 4.0, Windows 2000, and HP-UX Systems running
          OmniBack Version 3.00 or later.
MANUAL ACTIONS: Yes - NonUpdate
                Apply patches available at the OV website:
                http://ovweb.external.hp.com/cpe/patches/
=========================================
HPSBUX0102-144 Sec. Vulnerability in BIND
PLATFORM:  HP9000 servers and workstations running HP-UX releases
           11.11, 11.00, 11.04, 10.20, 10.24, 10.10, and 10.01.
MANUAL ACTIONS: Yes - Update
                For 11.00 (BIND 8.1.2): upgrade to BIND 8.1.3
                For 11.11 (BIND 8.1.2): apply patch.
                For Bind 4.9.7 apply patches.
=========================================
HPSBUX0103-145 Sec. Vulnerability in asecure
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.01,
          10.10, 10.20, 10.26  and 11.00 only.
MANUAL ACTIONS: Yes - NonUpdate
                Apply patches except for 10.01.
                For 10.01:
                /usr/bin/chmod 444 /var/opt/audio/asecure_log
                /usr/bin/chmod 444 /var/opt/audio/audio_error_log
=========================================
HPSBUX0104-149 Sec. Vulnerability in pcltotiff
PLATFORM:  HP9000 Series 700/800 running HP-UX releases 10.01,
           10.10, 10.20, and 10.26.
MANUAL ACTIONS: Yes - NonUpdate
                /sbin/chmod 555 /opt/sharedprint/bin/pcltotiff
                /sbin/chmod o+r /usr/lib/X11/fonts/ifo.st/typefaces
=========================================
HPSBUX0106-155 Security Vulnerability in CIFS/9000
PLATFORM: HP 9000 servers running CIFS/9000 Server version A.01.06,
          or lower.
MANUAL ACTIONS: Yes - Update plus other actions
                Upgrade to CIFS/9000 Server A.01.06 and install
                patch PHNE_24164 or
                upgrade to CIFS/9000 Server A.01.07.
=========================================
HPSBUX0107-157 Security Vulnerability in CIFS/9000 Server #2
PLATFORM: HP 9000 servers running CIFS/9000 Server version A.01.07 or
          lower; HP 3000 servers running Samba/iX
MANUAL ACTIONS: Yes - NonUpdate
                Edit the smb.conf file to remove all occurances
                of the macro "%m". See below for details.
=========================================
HPSBUX0108-164 Sec. Vulnerability in CIFS/9000 Server password
PLATFORM: HP 9000 servers running CIFS/9000 Server version
          A.01.07, or lower.
MANUAL ACTIONS: Yes - NonUpdate
                Ensure that the "passwd program" option contains the
                %u substitution string as follows:
                      passwd program = /bin/passwd %u.
=========================================
HPSBUX0110-173 Sec. Vulnerability in Tomcat 3.2.1 (VVOS)
PLATFORM: HP9000 Servers running HP-UX 11.04 (VVOS),
          Virtualvault A.04.50 only.
MANUAL ACTIONS: Yes - Update plus other actions
                Apply patches and install Tomcat 3.2.3
                runtime JAR files.
=========================================
HPSBUX0110-174 Sec. Vulnerability in JRE
PLATFORM:  HP9000 Series 700/800 running HP-UX releases 10.20 and
           11.x only.  This security bulletin applies to Java
           on HP-UX.  It does not cover software shipped on Linux
           or Windows/NT.
MANUAL ACTIONS: Yes - Update
                Update to:
                JDK and JRE 1.2.2.10 or higher for HP-UX 11.x.
                JDK and JRE 1.3.0.02 or higher for HP-UX 11.x.
                JDK and JRE 1.3.1.01 or higher for HP-UX 11.x.
=========================================
HPSBUX0201-181 Sec. Vulnerability in IPFilter/9000
PLATFORM: IPFilter/9000 product running on HP-UX 11.00 or 11.11
MANUAL ACTIONS: Yes - Update
                Upgrade to
                IPFilter/9000 version A.03.05.02 or greater
=========================================
HPSBUX0202-182 Sec. Vulnerability in Netscape 6.01
PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.00 and
          11.11.
MANUAL ACTIONS: Yes - Update
                Update to Netscape 6.2.1
=========================================
HPSBUX0202-184 Sec. Vulnerability in SNMP
PLATFORM: HP 9000 Series 700 and Series 800 running HP-UX
          releases 10.X and 11.X
          HP Procurve switches
          HP TopTools Remote Control Card
          JetDirect Firmware
          MC/ServiceGuard, EMS HA Monitors
          Solaris running OpenView or NNM
          Windows/NT running OpenView or NNM
MANUAL ACTIONS: Yes - Update plus other actions
=========================================
HPSBUX0202-185 Sec. Vulnerability with HP AdvanceStack hubs
PLATFORM: HP AdvanceStack J3200A, J3201A, J3202A, J3203A, J3204A,
          J3205A, J3210A with firmware version A.03.07 and 
          earlier.
MANUAL ACTIONS: Yes - NonUpdate
                Until a fix is available work around the
                problem by either disabling web access or
                removing the management IP address.
=========================================
HPSBUX0203-186 Sec. Vulnerability in JAVA JRE
PLATFORM:  HP9000 Series 700/800 running HP-UX releases 10.20 and
           11.x (including 11.04 - VVOS) only.  This security bulletin 
           applies to Java on HP-UX (including 11.04 - VVOS). It does 
           not cover software shipped on Linux or Windows/NT.
MANUAL ACTIONS: Yes - Update plus other actions
                Update Java:
                JDK/JRE 1.1.8.06 or higher for HP-UX 10.20,
                JDK/JRE 1.2.2.12 or higher for HP-UX 11.x,
                JDK/JRE 1.3.1.00 or higher for HP-UX 11.x.

                JDK/JRE for outside Apache web servers on
                Virtualvault A.04.50 should be upgraded to
                Java version 1.3.1 or higher.

                For the inside administration Apache web
                server on Virtualvault A.04.50, install PHSS_26673.
=========================================
HPSBUX0206-195 Sec. Vulnerability in OpenSSH on HP-UX
PLATFORM: HP 9000 Servers running HP-UX release 11.00, and 11.11
          only with the T1471AA HP-UX Secure Shell product 
          installed.
MANUAL ACTIONS: Yes - Update
                Install new binary version A.03.10.003 or
                subsequent, which can be
                found on www.software.hp.com
                under "Internet and Security solutions".

=========================================
HPSBUX0207-197 Sec. Vulnerability in Apache Server Chunk Encoding
PLATFORM: HP9000 Servers running HP-UX release 11.00, 11.04, 11.11
          11.20, and 11.22 with the HP Apache product installed.
          affected OpenView Products:
          Network Node Manager (NNM) 6.01, 6.1, 6.2, 6.31
          running on HP-UX and Solaris
          NNM on Windows NT/W2K is not affected.
          OV Service Information Portal (OVSIP) 1.0, 2.0, 3.0
MANUAL ACTIONS: Yes - NonUpdate
                Install repaired binary.

                For HP-UX 11.00, 11.11, 11.20 and 11.22
                download new product bundles from
                http://www.software.hp.com/ISS_products_list.html

                For HP-UX 11.04, OV NNM 6.2, OV NNM 6.1,
                OV SIP 3.0 apply the applicable patch.
=========================================
HPSBUX0207-200 Sec. Vulnerability in CIFS/9000
PLATFORM: HP9000 systems running CIFS/9000 Client version A.01.06
          or earlier on HP-UX releases 11.00 and 11.11.
MANUAL ACTIONS: Yes - Update
                Update to CIFS/9000 Client version A.01.07,
                or later
=========================================
HPSBUX0207-202 Sec. Vulnerability in BIND 9
PLATFORM: HP9000 Series 700/800 running HP-UX release 11.11 (11i)
          only with the BINDv920.INETSVCS-BIND fileset installed.
MANUAL ACTIONS: Yes - NonUpdate
                Install BIND920v2.depot.
=========================================
HPSBUX0207-204 Sec. Vulnerability in JetDirect EWS
PLATFORM:  HP peripherals or printers that have an Embedded Web
           Server (EWS).
MANUAL ACTIONS: Yes - Update
                Update to firmware version X.22.09 or later.
=========================================
HPSBUX0208-207 Sec. Vulnerability in HP Apache Server PHP
PLATFORM: HP9000 Servers running HP-UX release 11.00, 11.11, 11.20,
          and 11.22 with the HP Apache product installed.
MANUAL ACTIONS: Yes - Update
                hp apache-based web server v.1.3.26.03
                             on hp-ux 11.0 and 11i (pa-risc)
                hp apache-based web server v.1.3.26.03
                             on hp-ux 11i version 1.5 and 1.6 (ipf)
                hp apache-based web server v.2.0.39.03
                             on hp-ux 11.0 and 11i (pa-risc)
                hp apache-based web server v.2.0.39.03
                             on hp-ux 11i (pa-risc) for ipv6
                hp apache-based web server v.2.0.39.03
                             on hp-ux 11i version 1.5 and 1.6 (ipf)
=========================================

======================================================
III. Missing or mis-formatted "MANUAL ACTIONS - Non-HP-UX only"
======================================================

The MANUAL ACTIONS section in each of the following bulletins
was either missing or was not in the new format.  These
bulletins will not be sent to the e-mail distribution.


=========================================
HPSBUX0006-116 Sec. Vulnerability in Web JetAdmin 6.0
PLATFORM: Microsoft Windows NT 4.0 / Windows 2000 only.
MANUAL ACTIONS: Non-HP-UX only
                Install latest version of Web JetAdmin 6.0
                (6.0.1233)
=========================================
HPSBUX0208-212 Sec. Vulnerability in OpenSSL for JetDirect
PLATFORM: HP Jetdirect Print Servers with Jetdirect Firmware
          Versions X.22.00 through X.23.99 ( where X = L through U )
          only.
MANUAL ACTIONS: Non-HP-UX only
                Until a firmware update is available, disable the
                Embedded Web Server on Jetdirect Print Servers
                with Jetdirect Firmware Versions X.22.00 through
                X.23.99 ( where X = L through U ).
=========================================




======================================================
IV. Missing or mis-formatted "MANUAL ACTIONS - No"
======================================================

The MANUAL ACTIONS section in each of the following bulletins
was either missing or was not in the new format.  These 
bulletins will not be sent to the e-mail distribution.

All the following bulletins now have:

MANUAL ACTIONS: No

HPSBUX9311-001 HPSBUX9311-002 HPSBUX9402-003 HPSBUX9402-005
HPSBUX9402-006 HPSBUX9404-008 HPSBUX9405-009 HPSBUX9406-013
HPSBUX9407-015 HPSBUX9409-017 HPSBUX9410-018 HPSBUX9411-019
HPSBUX9501-020 HPSBUX9502-022 HPSBUX9502-023 HPSBUX9502-024
HPSBUX9503-025 HPSBUX9504-027 HPSBUX9602-029 HPSBUX9604-031
HPSBUX9607-032 HPSBUX9608-036 HPSBUX9608-037 HPSBUX9609-038
HPSBUX9610-040 HPSBUX9612-043 HPSBUX9701-044 HPSBUX9701-045
HPSBUX9701-046 HPSBUX9701-047 HPSBUX9701-048 HPSBUX9701-049
HPSBUX9701-050 HPSBUX9701-051 HPSBUX9702-052 HPSBUX9702-053
HPSBUX9702-055 HPSBUX9702-056 HPSBUX9704-057 HPSBUX9704-059
HPSBUX9704-061 HPSBUX9707-064 HPSBUX9707-067 HPSBUX9710-070
HPSBUX9710-071 HPSBUX9711-073 HPSBUX9801-075 HPSBUX9801-076
HPSBUX9803-077 HPSBUX9807-079 HPSBUX9807-081 HPSBUX9808-082
HPSBUX9808-083 HPSBUX9808-084 HPSBUX9810-086 HPSBUX9811-087
HPSBUX9811-088 HPSBUX9812-089 HPSBUX9812-090 HPSBUX9902-091
HPSBUX9903-092 HPSBUX9903-093 HPSBUX9903-094 HPSBUX9903-095
HPSBUX9903-096 HPSBUX9906-098 HPSBUX9906-099 HPSBUX9907-101
HPSBUX9908-102 HPSBUX9910-104 HPSBUX9912-106 HPSBUX9912-107
HPSBUX0001-108 HPSBUX0004-112 HPSBUX0005-113 HPSBUX0006-115
HPSBUX0007-117 HPSBUX0008-118 HPSBUX0008-119 HPSBUX0009-120
HPSBUX0009-121 HPSBUX0009-122 HPSBUX0010-123 HPSBUX0010-124
HPSBUX0010-125 HPSBUX0010-127 HPSBUX0011-129 HPSBUX0011-130
HPSBUX0012-134 HPSBUX0012-135 HPSBUX0101-136 HPSBUX0101-137
HPSBUX0101-138 HPSBUX0102-139 HPSBUX0102-140 HPSBUX0102-142
HPSBUX0102-143 HPSBUX0103-146 HPSBUX0103-147 HPSBUX0104-148
HPSBUX0105-151 HPSBUX0106-152 HPSBUX0106-153 HPSBUX0106-154
HPSBUX0107-156 HPSBUX0107-158 HPSBUX0107-159 HPSBUX0107-160
HPSBUX0107-161 HPSBUX0107-162 HPSBUX0108-163 HPSBUX0108-165
HPSBUX0109-166 HPSBUX0109-167 HPSBUX0110-168 HPSBUX0110-169
HPSBUX0110-170 HPSBUX0110-171 HPSBUX0110-172 HPSBUX0111-175
HPSBUX0111-176 HPSBUX0112-177 HPSBUX0201-179 HPSBUX0202-183
HPSBUX0203-189 HPSBUX0204-190 HPSBUX0204-191 HPSBUX0205-192
HPSBUX0205-193 HPSBUX0205-194 HPSBUX0207-196 HPSBUX0207-198
HPSBUX0207-201 HPSBUX0208-206 HPSBUX0208-208 HPSBUX0208-210
HPSBUX0208-211 HPSBUX0208-213
======================================================

 B. Recommended solution

    If bulletins are maintained locally, optionally download
    new copies.  Only bulletins with incorrect MANUAL ACTIONS
    fields will be mailed out.  Bulletins which were revised
    to add a missing MANUAL ACTIONS field or to correct the 
    format of the MANUAL ACTIONS field will not be mailed
    out for this revision.
    

 C. To subscribe to automatically receive future NEW HP Security
    Bulletins from the HP IT Resource Center via electronic
    mail, do the following:

    Use your browser to get to the HP IT Resource Center page
    at:

       http://itrc.hp.com

    Use the 'Login' tab at the left side of the screen to login
    using your ID and password.  Use your existing login or the
    "Register" button at the left to create a login, in order to
    gain access to many areas of the ITRC.  Remember to save the
    User ID assigned to you, and your password.

    In the left most frame select "Maintenance and Support".

    Under the "Notifications" section (near the bottom of
    the page), select "Support Information Digests".
     
    To -subscribe- to future HP Security Bulletins or other
    Technical Digests, click the check box (in the left column)
    for the appropriate digest and then click the "Update
    Subscriptions" button at the bottom of the page.

    or

    To -review- bulletins already released, select the link
    (in the middle column) for the appropriate digest.

    To -gain access- to the Security Patch Matrix, select
    the link for "The Security Bulletins Archive".  (near the
    bottom of the page)  Once in the archive the third link is
    to the current Security Patch Matrix. Updated daily, this
    matrix categorizes security patches by platform/OS release,
    and by bulletin topic.  Security Patch Check completely
    automates the process of reviewing the patch matrix for
    11.XX systems.

    For information on the Security Patch Check tool, see:
    http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
    displayProductInfo.pl?productNumber=B6834AA

    The security patch matrix is also available via anonymous
    ftp:

    ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix/

    On the "Support Information Digest Main" page:
    click on the "HP Security Bulletin Archive".

 D. To report new security vulnerabilities, send email to

    security-alert@hp.com

    Please encrypt any exploit information using the
    security-alert PGP key, available from your local key
    server, or by sending a message with a -subject- (not body)
    of 'get key' (no quotes) to security-alert@hp.com.

 ------------------------------------------------------------------ 

(c)Copyright 2002 Hewlett-Packard Company  
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
in this document is subject to change without notice.
Hewlett-Packard Company and the names of HP products referenced
herein are trademarks and/or service marks of Hewlett-Packard
Company.  Other product and company names mentioned herein may be
trademarks and/or service marks of their respective owners. 


- -----End of Document ID:  HPSBUX0301-236--------------------------------------

Document ID:  HPSBUX0201-180
Date Loaded:  20020122
      Title:  Sec. Vulnerability with WU-FTPD 2.6 (rev.1)

- --------------------------------------------------------------------
**REVISED 01**
 Source: HEWLETT-PACKARD COMPANY
 SECURITY BULLETIN:   HPSBUX0201-180
 Originally issued: 22 January 2002
 Last Revised: 10 January 2003

 --------------------------------------------------------------------

The information in the following Security Bulletin should be acted
upon as soon as possible.  Hewlett-Packard Company will not be
liable for any consequences to any customer resulting from customer's
failure to fully implement instructions in this Security Bulletin as
soon as possible.

 ------------------------------------------------------------------
PROBLEM:  Security vulnerability in WU-FTPD 2.6., Format String.
          CVE identifier: CAN-2001-0187
          http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0187

PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.0 and 11.11.

DAMAGE:   A remote user may execute arbitrary code on the server.

SOLUTION: Use the latest WEB upgrade which will upgrade WU-FTPD to
          version 2.6 (rev b01.002)

**REVISED 01**
MANUAL ACTIONS: Yes - Update
                Upgrade WU-FTPD to version 2.6 (rev b01.002).


AVAILABILITY: It is available now for 11.0 and 11.11.

CHANGE SUMMARY: Revision 01 correct MANUAL ACTIONS field

 ------------------------------------------------------------------
A. Background
   There is a format string vulnerability in wu-ftpd.
   The Common Vulnerabilities and Exposures (CVE) group
   has assigned the identifier: CAN-2001-0187

  http://www.securityfocus.com/bid/2296

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0187


B. Fixing the problem
   To determine if wu-ftpd version 2.6 is installed on a system:

     what /usr/lbin/ftpd | grep wuftpd-2.6

   If version 2.6 IS installed, then apply the latest web
   upgrade now. Registration for the download is necessary:

   http://www.software.hp.com/

   and search on "wu-ftpd" (without the quotes)

   or:

http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo
.pl?productNumber=WUFTPD26

   If revision 2.6 is NOT installed, then make sure you have
   installed the current patches for HP Security Bulletin
   "HPSBUX0107-162 Security Vulnerability in ftpd".


C. To subscribe to automatically receive future NEW HP Security
   Bulletins from the HP IT Resource Center via electronic
   mail, do the following:

   Use your browser to get to the HP IT Resource Center page
   at:

       http://itrc.hp.com

    Use the 'Login' tab at the left side of the screen to login
    using your ID and password.  Use your existing login or the
    "Register" button at the left to create a login, in order to
    gain access to many areas of the ITRC.  Remember to save the
    User ID assigned to you, and your password.

    In the left most frame select "Maintenance and Support".

    Under the "Notifications" section (near the bottom of
    the page), select "Support Information Digests".

    To -subscribe- to future HP Security Bulletins or other
    Technical Digests, click the check box (in the left column)
    for the appropriate digest and then click the "Update
    Subscriptions" button at the bottom of the page.

    or

    To -review- bulletins already released, select the link
    (in the middle column) "Search Technical Knowledge
    Database".

    To -gain access- to the Security Patch Matrix, or the
    "The Security Bulletins Archive" select the link for
    "The Security Bulletins Archive" (near the bottom of
    the page).  Once in the archive the third link is
    to the current Security Patch Matrix. Updated daily, this
    matrix categorizes security patches by platform/OS release,
    and by bulletin topic.  Security Patch Check completely
    automates the process of reviewing the patch matrix for
    11.XX systems.

    For information on the Security Patch Check tool, see:
    http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
    displayProductInfo.pl?productNumber=B6834AA"

    The security patch matrix is also available via anonymous
    ftp:

    ftp.itrc.hp.com:~ftp/export/patches/hp-ux_patch_matrix

    On the "Support Information Digest Main" page:
    click on the "HP Security Bulletin Archive".


 D. To report new security vulnerabilities, send email to

    security-alert@hp.com

    Please encrypt any exploit information using the
    security-alert PGP key, available from your local key
    server, or by sending a message with a -subject- (not body)
    of 'get key' (no quotes) to security-alert@hp.com.

    Permission is granted for copying and circulating this
    Bulletin to Hewlett-Packard (HP) customers (or the Internet
    community) for the purpose of alerting them to problems,
    if and only if, the Bulletin is not edited or changed in
    any way, is attributed to HP, and provided such reproduction
    and/or distribution is performed for non-commercial purposes.

    Any other use of this information is prohibited. HP is not
    liable for any misuse of this information by any third party.

- -----End of Document ID:  HPSBUX0201-180--------------------------------------

Document ID:  HPSBUX0110-172
Date Loaded:  20011016
      Title:  Sec. Vulnerability in telnetd (rev.1)

- -----------------------------------------------------------------
**REVISED 01**
 Source: HEWLETT-PACKARD COMPANY
 SECURITY BULLETIN:  HPSBUX0110-172
 Originally issued: 16 October 2001
 Last Revised: 10 January 2003

 -----------------------------------------------------------------

The information in the following Security Bulletin should be acted
upon as soon as possible.  Hewlett-Packard Company will not be
liable for any consequences to any customer resulting from customer's
failure to fully implement instructions in this Security Bulletin as
soon as possible.

 ------------------------------------------------------------------
PROBLEM: Systems running telnetd may permit unauthorized remote
         access.
         See: http://www.cert.org/advisories/CA-2001-21.html

         This vulnerability has been assigned the identifier
         CAN-2001-0554 by the Common Vulnerabilities and Exposures
         (CVE) group:
     http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0554


PLATFORM: HP9000 Servers running HP-UX releases 10.X only.

DAMAGE:  An intruder can potentially execute arbitrary code
         with the privileges of the telnetd process.

SOLUTION: Apply the following patches to the release specified.

        10.01       PHNE_24820 ,
        10.10       PHNE_24820 ,
        10.20       PHNE_24821 ,
    SIS 10.20       PHNE_24822  (Telnet kerberos Patch),
        10.24       PHNE_25217.

**REVISED 01**
Note: The Secure Internet Services (SIS) product, if
                enabled, has to be disabled before the installation
                or removal of PHNE_24822  (Telnet kerberos Patch).

**REVISED 01**
MANUAL ACTIONS: No

AVAILABILITY:   The patches are available now from http://itrc.hp.com.

CHANGE SUMMARY: Revision 01 correct MANUAL ACTIONS field
 ------------------------------------------------------------------
 A. Background
     A potential remotely exploitable buffer overflow in telnetd has
     been reported to Hewlett-Packard Company.  It is unique to HP-UX
     releases 10.X only.

 B. Fixing the problem
     Disable telnetd (by commenting out the /etc/inetd.conf entry for
     telnetd and running '/usr/sbin/inetd -c') if telentd is not needed
     on your system.

     Install the appropriate patch from the list below.

 C. Recommended solution

    Apply the following patches to the release specified.


        10.01       PHNE_24820 ,
        10.10       PHNE_24820 ,
        10.20       PHNE_24821 ,
    SIS 10.20       PHNE_24822  (Telnet kerberos Patch),
        10.24       PHNE_25217.


    All patches are available now from http://itrc.hp.com.

 D. To subscribe to automatically receive future NEW HP Security
    Bulletins from the HP IT Resource Center via electronic
    mail, do the following:

    Use your browser to get to the HP IT Resource Center page
    at:

       http://itrc.hp.com

    Use the 'Login' tab at the left side of the screen to login
    using your ID and password.  Use your existing login or the
    "Register" button at the left to create a login, in order to
    gain access to many areas of the ITRC.  Remember to save the
    User ID assigned to you, and your password.

    In the left most frame select "Maintenance and Support".

    Under the "Notifications" section (near the bottom of
    the page), select "Support Information Digests".

    To -subscribe- to future HP Security Bulletins or other
    Technical Digests, click the check box (in the left column)
    for the appropriate digest and then click the "Update
    Subscriptions" button at the bottom of the page.

    or

    To -review- bulletins already released, select the link
    (in the middle column) for the appropriate digest.

    To -gain access- to the Security Patch Matrix, select
    the link for "The Security Bulletins Archive".  (near the
    bottom of the page)  Once in the archive the third link is
    to the current Security Patch Matrix. Updated daily, this
    matrix categorizes security patches by platform/OS release,
    and by bulletin topic.  Security Patch Check completely
    automates the process of reviewing the patch matrix for
    11.XX systems.

    For information on the Security Patch Check tool, see:
    http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
    displayProductInfo.pl?productNumber=B6834AA"

    The security patch matrix is also available via anonymous
    ftp:

    ftp.itrc.hp.com:~ftp/export/patches/hp-ux_patch_matrix

    On the "Support Information Digest Main" page:
    click on the "HP Security Bulletin Archive".


 E. To report new security vulnerabilities, send email to

    security-alert@hp.com

    Please encrypt any exploit information using the
    security-alert PGP key, available from your local key
    server, or by sending a message with a -subject- (not body)
    of 'get key' (no quotes) to security-alert@hp.com.

    Permission is granted for copying and circulating this
    Bulletin to Hewlett-Packard (HP) customers (or the Internet
    community) for the purpose of alerting them to problems,
    if and only if, the Bulletin is not edited or changed in
    any way, is attributed to HP, and provided such reproduction
    and/or distribution is performed for non-commercial purposes.

    Any other use of this information is prohibited. HP is not
    liable for any misuse of this information by any third party.

- -----End of Document ID:  HPSBUX0110-172--------------------------------------

Document ID:  HPSBUX0203-187
Date Loaded:  20020318
      Title:  Sec. Vulnerability in JRE Bytecode Verifier (rev.1)

 -------------------------------------------------------------------
**REVISED 01**
 Source: HEWLETT-PACKARD COMPANY
 SECURITY BULLETIN:   HPSBUX0203-187
 Originally issued: 08 March 2002
 Last Revised: 10 January 2003

 -------------------------------------------------------------------

The information in the following Security Bulletin should be acted
upon as soon as possible.  Hewlett-Packard Company will not be
liable for any consequences to any customer resulting from customer's
failure to fully implement instructions in this Security Bulletin as
soon as possible.

 -------------------------------------------------------------------
ISSUE:  A vulnerability in the Java(TM) Runtime Environment Bytecode
        Verifier may be exploited by an untrusted applet to escalate
        privileges.

PLATFORM:  HP9000 Series 700/800 running HP-UX releases 10.20 and
           11.x only.  This security bulletin applies to Java
           on HP-UX.  It does not cover software shipped on Linux
           or Windows/NT.

POSSIBLE RESULT:  Privileges are escalated improperly.

**REVISED 01**
MANUAL ACTIONS: Yes - Update
                JDK and JRE 1.1.8.06 or higher for HP-UX 10.20.
                JDK and JRE 1.1.8.06 or higher for HP-UX 11.x
                JDK and JRE 1.2.2.12 or higher for HP-UX 11.x.
                JDK and JRE 1.3.1.00 or higher for HP-UX 11.x


SOLUTION:  Install the latest Java releases, as described below.

AVAILABILITY: These fixed releases are on www.hp.com/go/java now.
              They are not available from itrc.hp.com 

CHANGE SUMMARY: Revision 01 correct MANUAL ACTIONS field
 --------------------------------------------------------------------
A. Background

   A vulnerability in certain versions of the Java(TM) Runtime
   Environment may be exploited by an untrusted applet to escalate
   privileges.

   There are no known attacks reported based on this vulnerability
   to the best of Sun's knowledge.

B. Fixing the problem

     Obtain and install the latest releases of the Java products.
     For JDK/JRE 1.1.8, 1.2.2 and JDK/JRE 1.3.0 based releases go to
              www.hp.com/go/java.
     Section C. 1.) below will guide you in determining your
     installed Java version on HP-UX.  The vulnerability is
     fixed in releases 1.3.1 and higher.  Users of 1.3.0.x will
     need to update to 1.3.1.

     The releases described in HP Security Bulletin #0186, issued
     4 March 2002, also correct the vulnerability described here.
     In other words, the releases in Section C. below will correct
     both vulnerabilities.

C. Recommended solution

         JDK and JRE 1.1.8.06 or higher for HP-UX 10.20 or 11.x.
         JDK and JRE 1.2.2.12 or higher for HP-UX 11.x.
         JDK and JRE 1.3.1.00 or higher for HP-UX 11.x

 --------------------------------------------------------------------
   HP-UX: Determining Java version information for JDK, JRE, and JPI
 --------------------------------------------------------------------
There are two mechanisms to determine which versions of the Java
JDK/SDK (developer kit), JRE (runtime), or JPI (Java Plugin for
Netscape) you have installed.

First, you can use the following command to list the bundle revisions
for any installed Java products:

      /usr/sbin/swlist -l bundle | grep -i java

Second, you can ask Java to identify itself by executing the
following:

      <path>/bin/java -version
           where path is typically

      /opt/java - for Java 1.1
      /opt/java1.2 - for Java 1.2
      /opt/java1.3 - for Java 1.3

but may be an alternate location as specified during setup.

The plugin (JPI) is installed in user's home directories, so
you will need to check its version using the following.

For Java 1.2:

      $HOME/.netscape/java/bin/java -version

For Java 1.1, you must use:

      what $HOME/.netscape/java/bin/PA_RISC/green_threads/jre

   NOTE: Do not rely on Netscape's Help/About_Plug-ins menu to
         find the version number of the Plugin, because in some
         cases the version number is incorrect.

    a.) Unplugging the Plugin (Since the Plugin is manually
        installed into Netscape, it must be manually removed as well.)

    If you have a plugin that you wish to remove because it has a
    security issue, in addition to doing a swremove of the product
    you must also do the following for Java 1.1 and Java 1.2:

    rm -f $HOME/.netscape/plugins/javaplugin.sl
    rm -rf $HOME/.netscape/java

 -------------------------------------------------------------------

D. To subscribe to automatically receive future NEW HP Security
   Bulletins from the HP IT Resource Center via electronic
   mail, do the following:

   Use your browser to get to the HP IT Resource Center page
   at:

       http://itrc.hp.com

    Use the 'Login' tab at the left side of the screen to login
    using your ID and password.  Use your existing login or the
    "Register" button at the left to create a login, in order to
    gain access to many areas of the ITRC.  Remember to save the
    User ID assigned to you, and your password.

    In the left most frame select "Maintenance and Support".

    Under the "Notifications" section (near the bottom of
    the page), select "Support Information Digests".
      
    To -subscribe- to future HP Security Bulletins or other
    Technical Digests, click the check box (in the left column)
    for the appropriate digest and then click the "Update
    Subscriptions" button at the bottom of the page.

    or

    To -review- bulletins already released, select the link
    (in the middle column) for the appropriate digest.

    To -gain access- to the Security Patch Matrix, select
    the link for "The Security Bulletins Archive".  (near the
    bottom of the page)  Once in the archive the third link is
    to the current Security Patch Matrix. Updated daily, this
    matrix categorizes security patches by platform/OS release,
    and by bulletin topic.  Security Patch Check completely
    automates the process of reviewing the patch matrix for
    11.XX systems.

    For information on the Security Patch Check tool, see:
    http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
    displayProductInfo.pl?productNumber=B6834AA"

    The security patch matrix is also available via anonymous
    ftp:

    ftp.itrc.hp.com:~ftp/export/patches/hp-ux_patch_matrix

    On the "Support Information Digest Main" page:
    click on the "HP Security Bulletin Archive".


E. To report new security vulnerabilities, send email to

    security-alert@hp.com

    Please encrypt any exploit information using the
    security-alert PGP key, available from your local key
    server, or by sending a message with a -subject- (not body)
    of 'get key' (no quotes) to security-alert@hp.com.

    Permission is granted for copying and circulating this
    Bulletin to Hewlett-Packard (HP) customers (or the Internet
    community) for the purpose of alerting them to problems,
    if and only if, the Bulletin is not edited or changed in
    any way, is attributed to HP, and provided such reproduction
    and/or distribution is performed for non-commercial purposes.

    Any other use of this information is prohibited. HP is not
    liable for any misuse of this information by any third party.

- -----End of Document ID:  HPSBUX0203-187--------------------------------------

Document ID:  HPSBUX0203-188
Date Loaded:  20020318
      Title:  Sec. Vulnerability in JAVA Web Start ) (rev.1)

 -------------------------------------------------------------------
**REVISED 01**
 Source: HEWLETT-PACKARD COMPANY
 SECURITY BULLETIN:   HPSBUX0203-188
 Originally issued: 18 March 2002
 Last Revised: 10 January 2003

 -------------------------------------------------------------------

The information in the following Security Bulletin should be acted
upon as soon as possible.  Hewlett-Packard Company will not be
liable for any consequences to any customer resulting from customer's
ailure to fully implement instructions in this Security Bulletin as
soon as possible.

 -------------------------------------------------------------------
ISSUE:  A vulnerability in Java(TM) Web Start may allow an application
        using it to gain access to restricted resources.

PLATFORM:  HP9000 Series 700/800 running HP-UX releases 11.x only.
           This security bulletin applies to Java Web Start on HP-UX.
           It does not cover software shipped on Linux or Windows/NT.

POSSIBLE RESULT:  Restricted resources are accessed improperly.

**REVISED 01**
MANUAL ACTIONS: Yes - Update
                Web Start 1.0.1.01 or higher for HP-UX 11.x.


SOLUTION:  Install the latest Java Web Start release, as described below.

AVAILABILITY: These fixed releases are on www.hp.com/go/java now.
              They are not available from itrc.hp.com 

CHANGE SUMMARY: Revision 01 correct MANUAL ACTIONS field
 --------------------------------------------------------------------
A. Background

   A vulnerability in certain versions of Java(TM) Web Start may be
   exploited by an application to access restricted resources.

   There are no known attacks reported based on this vulnerability
   to the best of Sun's knowledge.

B. Fixing the problem

     Obtain and install the latest release of the Java Web Start
     product.  This will be found by going to
              www.hp.com/go/java.
     Section C. 1.) below will guide you in determining your
     installed Java Web Start version on HP-UX.  The vulnerability is
     fixed in release 1.0.1.01 or higher.

C. Recommended solution

         Web Start 1.0.1.01 or higher for HP-UX 11.x.

 --------------------------------------------------------------------
   HP-UX: Determining Java version information for Java Web Start
 --------------------------------------------------------------------
To find the version string, execute Java Web Start:

      <installdir>/javaws/javaws
      then click on Help -> About Java Web Start menu.

 -------------------------------------------------------------------

D. To subscribe to automatically receive future NEW HP Security
   Bulletins from the HP IT Resource Center via electronic
   mail, do the following:

   Use your browser to get to the HP IT Resource Center page
   at:

       http://itrc.hp.com

    Use the 'Login' tab at the left side of the screen to login
    using your ID and password.  Use your existing login or the
    "Register" button at the left to create a login, in order to
    gain access to many areas of the ITRC.  Remember to save the
    User ID assigned to you, and your password.

    In the left most frame select "Maintenance and Support".

    Under the "Notifications" section (near the bottom of
    the page), select "Support Information Digests".

    To -subscribe- to future HP Security Bulletins or other
    Technical Digests, click the check box (in the left column)
    for the appropriate digest and then click the "Update
    Subscriptions" button at the bottom of the page.

    or

    To -review- bulletins already released, select the link
    (in the middle column) for the appropriate digest.

    To -gain access- to the Security Patch Matrix, select
    the link for "The Security Bulletins Archive".  (near the
    bottom of the page)  Once in the archive the third link is
    to the current Security Patch Matrix. Updated daily, this
    matrix categorizes security patches by platform/OS release,
    and by bulletin topic.  Security Patch Check completely
    automates the process of reviewing the patch matrix for
    11.XX systems.

    For information on the Security Patch Check tool, see:
    http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
    displayProductInfo.pl?productNumber=B6834AA"

    The security patch matrix is also available via anonymous
    ftp:

    ftp.itrc.hp.com:~ftp/export/patches/hp-ux_patch_matrix

    On the "Support Information Digest Main" page:
    click on the "HP Security Bulletin Archive".


E. To report new security vulnerabilities, send email to

    security-alert@hp.com

    Please encrypt any exploit information using the
    security-alert PGP key, available from your local key
    server, or by sending a message with a -subject- (not body)
    of 'get key' (no quotes) to security-alert@hp.com.

    Permission is granted for copying and circulating this
    Bulletin to Hewlett-Packard (HP) customers (or the Internet
    community) for the purpose of alerting them to problems,
    if and only if, the Bulletin is not edited or changed in
    any way, is attributed to HP, and provided such reproduction
    and/or distribution is performed for non-commercial purposes.

    Any other use of this information is prohibited. HP is not
    liable for any misuse of this information by any third party.

- -----End of Document ID:  HPSBUX0203-188--------------------------------------

Document ID:  HPSBUX0207-205
Date Loaded:  20020728
      Title:  RFC 1948 ISN randomization is now available (rev.1)

 -----------------------------------------------------------------
**REVISED 01**
 Source: HEWLETT-PACKARD COMPANY
 SECURITY BULLETIN:   HPSBUX0207-205
 Originally issued: 29 July 2002
 Last Revised: 10 January 2003

 -----------------------------------------------------------------
NOTICE: There are no restrictions for distribution of this Bulletin
provided that it remains complete and intact.

The information in the following Security Bulletin should be
acted upon as soon as possible.  Hewlett-Packard Company will
not be liable for any consequences to any customer resulting
from customer's failure to fully implement instructions in this
Security Bulletin as soon as possible.
 ------------------------------------------------------------------
ANNOUNCEMENT:  RFC 1948 ISN randomization is now available.

PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.00,
          11.04 and 11.11.

DAMAGE:   Possible increase in privilege

SOLUTION: Apply the appropriate patch as follows:

         for HP randomization on releases:
            HP-UX 11.00:       PHNE_22397 or subsequent,
            HP-UX 11.11:       default mode.

         for RFC 1948 ISN randomization
            HP-UX 11.00:       PHNE_26771 or subsequent,
            HP-UX 11.04:       PHNE_26101 or subsequent,
            HP-UX 11.11:       PHNE_25644 or subsequent.

**REVISED 01**
MANUAL ACTIONS: Yes - NonUpdate
                Install patch and enable randomization.

AVAILABILITY:  All patches are available now.

CHANGE SUMMARY: Revision 01 correct MANUAL ACTIONS field

 ------------------------------------------------------------------
A. Background
   As discussed in CERT Advisory CA-2001-09, Hewlett-Packard now
   provides RFC1948 compliant randomization.

B. Recommended solution
   The following tcp randomizations are now available:

        HP-UX releases 11.00, 11.04, and 11.11 (11i):
             HP randomization
             RFC 1948 ISN randomization

 =================================================================
 To enable tcp randomization on HP-UX 11.00, 11.04, and 11.11(11i):
 =================================================================

  HP randomization

     HP-UX release 11.00:
     Install PHNE_22397 or subsequent.  The HP randomization will
     then be the default tcp randomization.

       NOTE: This patch has dependencies.

     HP-UX release 11.11 (11i):
     No patch is required.  The HP randomization has always been
     implemented in HP-UX 11.11 (11i) and is the default tcp
     randomization.

  RFC 1948 ISN randomization

     HP-UX 11.00:       Apply PHNE_26771 or subsequent.
     HP-UX 11.04:       Apply PHNE_26101 or subsequent.
     HP-UX 11.11 (11i): Apply PHNE_25644 or subsequent.

     Once the appropriate patch has been applied the RFC 1948 ISN
     randomization can be enabled on HP-UX 11.00, 11.04 and 11.11
     by executing the following command as root:

         ndd -set /dev/tcp tcp_isn_passphrase <secret passphrase>
              where <secret passphrase> is any length character
              string.  Only the first 32 characters will be 
              retained.  If the passphrase is changed the system
              should be rebooted.

     NOTE: RFC 1948 ISN randomization is not available on
           HP-UX release 10.20.  Customers who want RFC 1948
           ISN randomization should upgrade to HP-UX 11.X and
           apply necessary patches as discussed herein.


 C. To subscribe to automatically receive future NEW HP Security
    Bulletins from the HP IT Resource Center via electronic
    mail, do the following:

    Use your browser to get to the HP IT Resource Center page
    at:

       http://itrc.hp.com

    Use the 'Login' tab at the left side of the screen to login
    using your ID and password.  Use your existing login or the
    "Register" button at the left to create a login, in order to
    gain access to many areas of the ITRC.  Remember to save the
    User ID assigned to you, and your password.

    In the left most frame select "Maintenance and Support".

    Under the "Notifications" section (near the bottom of
    the page), select "Support Information Digests".

    To -subscribe- to future HP Security Bulletins or other
    Technical Digests, click the check box (in the left column)
    for the appropriate digest and then click the "Update
    Subscriptions" button at the bottom of the page.

    or

    To -review- bulletins already released, select the link
    (in the middle column) for the appropriate digest.

    To -gain access- to the Security Patch Matrix, select
    the link for "The Security Bulletins Archive".  (near the
    bottom of the page)  Once in the archive the third link is
    to the current Security Patch Matrix. Updated daily, this
    matrix categorizes security patches by platform/OS release,
    and by bulletin topic.  Security Patch Check completely
    automates the process of reviewing the patch matrix for
    11.XX systems.

    For information on the Security Patch Check tool, see:
    http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
    displayProductInfo.pl?productNumber=B6834AA

    The security patch matrix is also available via anonymous
    ftp:

    ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix/

    On the "Support Information Digest Main" page:
    click on the "HP Security Bulletin Archive".

 D. To report new security vulnerabilities, send email to

    security-alert@hp.com

    Please encrypt any exploit information using the
    security-alert PGP key, available from your local key
    server, or by sending a message with a -subject- (not body)
    of 'get key' (no quotes) to security-alert@hp.com.

 ------------------------------------------------------------------

(c)Copyright 2002 Hewlett-Packard Company
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
in this document is subject to change without notice.
Hewlett-Packard Company and the names of HP products referenced
herein are trademarks and/or service marks of Hewlett-Packard
Company.  Other product and company names mentioned herein may be
trademarks and/or service marks of their respective owners.

- -----End of Document ID:  HPSBUX0207-205--------------------------------------

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBPiKu+ih9+71yA2DNAQEaQAP/c6Pj1veCRHGCbPhoQ6seLwU3rH4VbafB
M10x1ipIN9vmqt9/RnmxW3+QqxDs5fvYT+9kxTGBy8KdvTm93L7nUk3AAMjaHh0w
X/0SuL+jH7Y7JIZIFJcwDCPAvFlsMTVByNoTHTrRvlYFImi+4TBxWROLO6XDGofF
y1N612Nul7U=
=tp0D
-----END PGP SIGNATURE-----