Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2003.0018 -- HEWLETT-PACKARD SECURITY BULLETIN: HPSBUX0301-236 MANUAL ACTIONS fields corrected for HPSBUX0201-180, HPSBUX0110-172, HPSBUX0203-187, HPSBUX0203-188 and HPSBUX0207-205 13 January 2003 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Hewlett-Packard Security Bulletins Vendor: Hewlett-Packard Impact: Provide Misleading Information Ref: ESB-2001.443 ESB-2002.046 ESB-2002.148 ESB-2002.149 ESB-2002.386 - --------------------------BEGIN INCLUDED TEXT-------------------- Digest Name: daily HP-UX security bulletins digest Created: Fri Jan 10 6:00:03 EST 2003 Table of Contents: Document ID Title - --------------- ----------- HPSBUX0301-236 MANUAL ACTIONS fields corrected HPSBUX0201-180 Sec. Vulnerability with WU-FTPD 2.6 (rev.1) HPSBUX0110-172 Sec. Vulnerability in telnetd (rev.1) HPSBUX0203-187 Sec. Vulnerability in JRE Bytecode Verifier (rev.1) HPSBUX0203-188 Sec. Vulnerability in JAVA Web Start ) (rev.1) HPSBUX0207-205 RFC 1948 ISN randomization is now available (rev.1) The documents are listed below. - ------------------------------------------------------------------------------- Document ID: HPSBUX0301-236 Date Loaded: 20030109 Title: MANUAL ACTIONS fields corrected ----------------------------------------------------------------- Source: HEWLETT-PACKARD COMPANY SECURITY BULLETIN: HPSBUX0301-236 Originally issued: 10 January 2003 MANUAL ACTIONS fields corrected ----------------------------------------------------------------- NOTICE: There are no restrictions for distribution of this Bulletin provided that it remains complete and intact. The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------ PROBLEM: Some security bulletins had incorrect or incomplete MANUAL ACTIONS fields. IMPACT: Determining the correct actions was inconvenient. PLATFORM: All SOLUTION: The MANUAL ACTIONS fields have been corrected. MANUAL ACTIONS: Yes - NonUpdate If bulletins are maintained locally, optionally download new copies. Only bulletins with incorrect MANUAL ACTIONS fields will be mailed out. Bulletins which were revised to add a missing MANUAL ACTIONS field or to correct the format of the MANUAL ACTIONS field will not be mailed out for this revision. AVAILABILITY: The corrected bulletins are available now. ------------------------------------------------------------------ A. Background The format of the MANUAL ACTIONS line has been standardized. MANUAL ACTIONS: No The bulletin can be completely implemented by installing a standard patch (for example, PHxx_12345). MANUAL ACTIONS: Non-HP-UX only The same as "MANUAL ACTIONS: No" for HP-UX, but the bulletin applies to other operating systems for which a manual action is required. MANUAL ACTIONS: Yes - Update The product must be updated rather than patched. MANUAL ACTIONS: Yes - Update plus other actions The product must be updated rather than patched. Other actions in addition to updating are required. MANUAL ACTIONS: Yes - NonUpdate Some action is required instead of or in addition to installing an update or a patch. For bulletins with "MANUAL ACTIONS: No" the Security Patch Check Tool is able to determine whether the bulletin has been implemented on a system running HP-UX 11.X. For 10.X, if the bulletin says "MANUAL ACTIONS: No" and a patch listed in the Security Patch Matrix (or a superseding patch) has been installed, the bulletin has been implemented. The following security bulletins were updated to conform with the MANUAL ACTIONS format above. The revised bulletins are listed in three sections: I. Incorrect MANUAL ACTIONS II. Missing or mis-formatted "MANUAL ACTIONS - Yes" or "MANUAL ACTIONS - Non-HP-UX only". III. Missing or mis-formatted "MANUAL ACTIONS - Non-HP-UX only" IV. Missing or mis-formatted "MANUAL ACTIONS - No" ====================================================== I. Incorrect MANUAL ACTIONS ====================================================== The MANUAL ACTIONS section in each of the following bulletins was incorrect or misleading. These bulletins have been revised and sent to the e-mail distribution. ========================================= HPSBUX0110-172 Sec. Vulnerability in telnetd PLATFORM: HP9000 Servers running HP-UX releases 10.X only. MANUAL ACTIONS: No ========================================= HPSBUX0201-180 Sec. Vulnerability with WU-FTPD 2.6 PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.0 and 11.11. MANUAL ACTIONS: Yes - Update Upgrade WU-FTPD to version 2.6 (rev b01.002). ========================================= HPSBUX0203-187 Sec. Vulnerability in JRE Bytecode Verifier PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20 and 11.x only. This security bulletin applies to Java on HP-UX. It does not cover software shipped on Linux or Windows/NT. MANUAL ACTIONS: Yes - Update JDK and JRE 1.1.8.06 or higher for HP-UX 10.20. JDK and JRE 1.1.8.06 or higher for HP-UX 11.x JDK and JRE 1.2.2.12 or higher for HP-UX 11.x. JDK and JRE 1.3.1.00 or higher for HP-UX 11.x ========================================= HPSBUX0203-188 Sec. Vulnerability in JAVA Web Start PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.x only. This security bulletin applies to Java Web Start on HP-UX. It does not cover software shipped on Linux or Windows/NT. MANUAL ACTIONS: Yes - Update Web Start 1.0.1.01 or higher for HP-UX 11.x. ========================================= HPSBUX0207-205 RFC 1948 ISN randomization is now available. PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.00, 11.04 and 11.11. MANUAL ACTIONS: Yes - NonUpdate Install patch and enable randomization. ========================================= ====================================================== II. Missing or mis-formatted "MANUAL ACTIONS - Yes" ====================================================== The MANUAL ACTIONS section in each of the following bulletins was either missing or was not in the new format. These bulletins will not be sent to the e-mail distribution. ========================================= HPSBUX9402-004 Promiscuous mode network interfaces PLATFORM: HP 9000 Series 300, 400, 700, 800 running HP-UX Apollo Token Ring (HP-UX 8.X, 9.X; s700 only) STREAMS-DLPI (HP-UX 9.X) MANUAL ACTIONS: Yes - NonUpdate Prevent users from gaining root access. ========================================= HPSBUX9404-007 HP-UX does not have ftpd SITE EXEC vulnerability PLATFORM: All HP-UX systems MANUAL ACTIONS: Yes - NonUpdate Advisory only. ========================================= HPSBUX9405-010 ftpd: SITE CHMOD / race condition vulnerability PLATFORM: All HP-UX systems MANUAL ACTIONS: Yes - NonUpdate Advisory only. ========================================= HPSBUX9405-011 Security Vulnerability in HP GlancePlus PLATFORM: HP 9000 series 300/400s and 700/800s. MANUAL ACTIONS: Yes - Update ========================================= HPSBUX9405-012 Security vulnerability in Multimedia Sharedprint PLATFORM: HP 9000 series 700 at HP-UX revision 9.X, only MANUAL ACTIONS: Yes - NonUpdate Change file permissions. ========================================= HPSBUX9406-014 Patch file permissions vulnerability PLATFORM: s300/s400/s700/s800 all revisions of hp-ux MANUAL ACTIONS: Yes - NonUpdate Run the fix_patch_perms script (below). ========================================= HPSBUX9408-016 Patch sums and the MD5 program PLATFORM: All HP-UX systems. MANUAL ACTIONS: Yes - NonUpdate Advisory only. ========================================= HPSBUX9502-021 No current vulnerability in /bin/mail (or /bin/rmail) PLATFORM: All HP-UX systems MANUAL ACTIONS: Yes - NonUpdate Advisory only. ========================================= HPSBUX9504-026 Preparing Your HP-UX System for SATAN PLATFORM: All HP-UX systems MANUAL ACTIONS: Yes - NonUpdate Implement procedure discussed below before running SATAN. ========================================= HPSBUX9511-028 Security Vulnerability in FTP PLATFORM: HP 9000 series 300/400s and 700/800s MANUAL ACTIONS: Yes - Update Update to 9.x or 10.x, then apply the appropriate patches. ========================================= HPSBUX9602-030 Security Vulnerability DCE Sec. Service session key gen'rtn PLATFORM: HP 9000/700 and 9000/800 systems running HP DCE/9000 and configured into DCE cells MANUAL ACTIONS: Yes - NonUpdate Apply patches and change all keys (details below) ========================================= HPSBUX9607-033 Security Vulnerability in expreserve PLATFORM: HP 9000 series 300/400s and 700/800s MANUAL ACTIONS: Yes - NonUpdate Apply patches (9.X, 10.X) or take documented actions for releases of HP-UX prior to 9.X. ========================================= HPSBUX9607-034 Security Vulnerability in SAM remote admin PLATFORM: HP 9000/300/400/700 and 800 systems running any currently supported version of HP-UX 9.X and 10.X. MANUAL ACTIONS: Yes - NonUpdate Implement workaround below. ========================================= HPSBUX9607-035 Security Vulnerability in nettune executable PLATFORM: HP 9000/700 and 9000/800 systems running operating system version 10.0 or 10.01 of HP-UX. MANUAL ACTIONS: Yes - NonUpdate Change permissions and ownership of /usr/contrib/bin/nettune. ========================================= HPSBUX9610-039 Security Vulnerabilities in HP Remote Watch PLATFORM: HP 9000 series 300/400/700/800s MANUAL ACTIONS: Yes - NonUpdate Do not use Remote Watch. ========================================= HPSBUX9611-041 Vulnerability with Large UID's and GID's in HP-UX 10.20 PLATFORM: HP 9000 series 700/800 systems running version 10.20 MANUAL ACTIONS: Yes - NonUpdate Apply patches and examine suid files. ========================================= HPSBUX9612-042 Security Vulnerability in fpkg2swpkg in HP-UX 10.XX PLATFORM: HP 9000 Series 700 and 800s MANUAL ACTIONS: Yes - NonUpdate Remove suid bit from /usr/sbin/fpkg2swpkg. ========================================= HPSBUX9701-054 Recent sendmail patches for HP-UX releases 9.X thru 10.10 PLATFORM: HP 9000 Series 700/800s running versions of HP-UX 9.X thru 10.10 MANUAL ACTIONS: Yes - NonUpdate Clean up password file. ========================================= HPSBUX9704-058 Security Vulnerability in libXt for HP-UX 9.X + 10.X PLATFORM: HP 9000 series 700/800 systems running version 9.X or 10.X MANUAL ACTIONS: Yes - NonUpdate Apply the patches listed below and relink any suid/sgid programs that use libXt.a. ========================================= HPSBUX9704-060 SYN Flooding Security Vulnerability in HP-UX PLATFORM: HP 9000 Series 700/800s running versions of HP-UX 9.X and 10.X MANUAL ACTIONS: Yes - NonUpdate Apply the appropriate patch and enable/tune the defense mechanism. ========================================= HPSBUX9707-065 Security Advisory in Netscape shipped with HP-UX PLATFORM: All platforms running Netscape Navigator 2.0, 3.0, and Communicator 4.0. MANUAL ACTIONS: Yes - NonUpdate Apply the workaround described below. ========================================= HPSBUX9707-068 Security Vulnerability in Novell Netware 3.12 on HP-UX PLATFORM: HP 9000 Series 700/800s running only specific releases of HP-UX 9.X and 10.X. See below. MANUAL ACTIONS: Yes - Update ========================================= HPSBUX9709-069 Security Advisory in vuefile, vuepad, et. al. in HP-UX PLATFORM: HP9000 Series 700/800s running HP-UX releases 9.X and 10.X MANUAL ACTIONS: Yes - NonUpdate Do not run vuefile, vuepad, dtfile, or dtpad while su'd to another account or with the display set to another Xserver, unless the same account is logged in at each Xserver. ========================================= HPSBUX9710-072 Sec. Vulnerability in CDE on HP-UX 10.[10, 20, 24, 30] PLATFORM: HP9000 series 700/800, HP-UX releases 10.10, 10.20, 10.24, and 10.30. MANUAL ACTIONS: Yes - NonUpdate Install the patches and relink any programs linked with archived CDE libraries. ========================================= HPSBUX9801-074 Security Vulnerability in CUE under HP-UX PLATFORM: HP9000 series 800, releases HP-UX 8.X, 9.X, 10.X, and 11.0 MANUAL ACTIONS: Yes - NonUpdate Remove the cue program. ========================================= HPSBUX9804-078 Security Vulnerability in Openmail on HP-UX PLATFORM: Any HP 9000 series 700/800 systems running OpenMail. MANUAL ACTIONS: Yes - NonUpdate Reconfigure OpenMail per the OpenMail Technical Guide. ========================================= HPSBUX9807-080 Security Advisory with Netscape servers on HP-UX PLATFORM: HP9000 Series 7/800 running HP-UX releases 10.X and 11.00 MANUAL ACTIONS: Yes - NonUpdate Download patches for Netscape 3.X and earlier from Netscape. ========================================= HPSBUX9810-085 Security Vulnerability with HP OpenView Omniback II PLATFORM: HP9000 series 7/800 running releases 9.X, 10.X, or 11.00 Other vendor platforms as noted below. MANUAL ACTIONS: Yes - NonUpdate Install patches and take other actions described below. ========================================= HPSBUX9904-097 Security Vulnerability in sendmail PLATFORM: HP 9000 Series 700/800 Servers running HP-UX 10.20 and 11.00 MANUAL ACTIONS: Yes - Update For HP-UX releases prior to 10.20, upgrade from sendmail 5.65 to sendmail release 8.8.6. See www.software.hp.com For HP-UX release 10.20: PHNE_17135 ; For HP-UX release 11.00: PHNE_17190. ========================================= HPSBUX9907-100 CDE Leaves Current Directory in root PATH PLATFORM: HP 9000 series 700/800 at HP-UX revision 10.X MANUAL ACTIONS: Yes - NonUpdate For 10.10, Modify /usr/dt/bin/Xsession as shown below. For 10.20, install PHSS_19482 or subsequent For 10.24, install PHSS_19702 or subsequent Note: No action is needed for 10.20 or 10.24 beyond installing the patch. ========================================= HPSBUX9911-105 Security Vulnerability on V Class Teststation PLATFORM: HP9000 Series 800 S/X/V Class servers. MANUAL ACTIONS: Yes - Update Install patch or update to Teststation or Teststation Version 1.1.2 ========================================= HPSBUX0001-109 Security Vulnerability with Audio Security File PLATFORM: HP9000 Series 7/800 running HP-UX releases 10.X and 11.X MANUAL ACTIONS: Yes - NonUpdate Apply the appropriate patch. 10.10,10.20 PHSS_24534 or subsequent. 11.00 PHSS_24608 or subsequent. If /etc/opt/audio/audio.sec exists and does not have 444 permissions, chmod 444 /etc/opt/audio/audio.sec ========================================= HPSBUX0001-110 Security Vulnerability with PMTU strategy PLATFORM: HP-UX releases 10.30, 11.00 and 11.04 only. MANUAL ACTIONS: Yes - NonUpdate Set the NDD parameter ip_pmtu_strategy to 1. ========================================= HPSBUX0002-111 Sec. Vulnerability with Ignite on Trusted systems PLATFORM: HP-9000 Series700/800 running release HP-UX 11.X only. MANUAL ACTIONS: Yes - NonUpdate Verify that all entries in /etc/passwd have "*" in the password field if the system is trusted. ========================================= HPSBUX0005-114 Sec. Vulnerability in BIND PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.XX and 11.XX. MANUAL ACTIONS: Yes - Update Install patches (below) which upgrade BIND 4.9.7 or upgrade to version 8.1.2. ========================================= HPSBUX0010-126 Sec. Vulnerability in Praesidium Web Proxy 1.0 PLATFORM: VVOS release 10.24 and 11.04 running VirtualVault 4.0, with HP Praesidium Proxy V1.0 only. MANUAL ACTIONS: Yes - NonUpdate Reconfigure web server as necessary. ========================================= HPSBUX0011-131 Sec. Vulnerability in EMS PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20 and 11.00. MANUAL ACTIONS: Yes - Update Update to EMS A.03.20 release. ========================================= HPSBUX0011-132 Sec. Vulnerability in JRE PLATFORM: This security bulletin applies to Java on HP9000 Series 700/800 running HP-UX releases 10.20, 10.24, 11.00, 11.04, and 11.11 only. It does not cover software shipped on Linux nor on Windows/NT. MANUAL ACTIONS: Yes - Update Install the latest Java releases: JDK and JRE 1.1.8.04 or higher for HP-UX 10.20, 10.24, 11.00, 11.04 and 11.11. JDK and JRE 1.2.2.04 or higher for HP-UX 11.00, 11.04 and 11.11. JDK and JRE 1.3.0.00 for HP-UX 11.XX ========================================= HPSBUX0012-133 Sec. Vulnerability in ContinentalClusters PLATFORM: HP9000 Series 800 running ContinentalClusters all releases A.01.0X, and A.02.00 on HP-UX release 11.00 and 11.11. MANUAL ACTIONS: Yes - Update plus other actions Upgrade to ContinentalClusters version A.02.00 and apply patches. ========================================= HPSBUX0102-141 Sec. Vulnerability in JRE PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20, 10.24, 11.00, 11.04, and 11.11 only. This security bulletin applies to Java on HP-UX, and does not cover software shipped on Linux, nor on Windows/NT. MANUAL ACTIONS: Yes - Update Install the latest Java releases: JDK and JRE 1.1.8.05 or higher for HP-UX 10.20, 10.24 and 11.XX. JDK and JRE 1.2.2.07 or higher for HP-UX 11.XX. JDK and JRE 1.3.0.00 or higher for HP-UX 11.XX. ========================================= HPSBUX0102-142 Sec. Vulnerability in OV OmniBack PLATFORM: Windows NT 4.0, Windows 2000, and HP-UX Systems running OmniBack Version 3.00 or later. MANUAL ACTIONS: Yes - NonUpdate Apply patches available at the OV website: http://ovweb.external.hp.com/cpe/patches/ ========================================= HPSBUX0102-144 Sec. Vulnerability in BIND PLATFORM: HP9000 servers and workstations running HP-UX releases 11.11, 11.00, 11.04, 10.20, 10.24, 10.10, and 10.01. MANUAL ACTIONS: Yes - Update For 11.00 (BIND 8.1.2): upgrade to BIND 8.1.3 For 11.11 (BIND 8.1.2): apply patch. For Bind 4.9.7 apply patches. ========================================= HPSBUX0103-145 Sec. Vulnerability in asecure PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.01, 10.10, 10.20, 10.26 and 11.00 only. MANUAL ACTIONS: Yes - NonUpdate Apply patches except for 10.01. For 10.01: /usr/bin/chmod 444 /var/opt/audio/asecure_log /usr/bin/chmod 444 /var/opt/audio/audio_error_log ========================================= HPSBUX0104-149 Sec. Vulnerability in pcltotiff PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.01, 10.10, 10.20, and 10.26. MANUAL ACTIONS: Yes - NonUpdate /sbin/chmod 555 /opt/sharedprint/bin/pcltotiff /sbin/chmod o+r /usr/lib/X11/fonts/ifo.st/typefaces ========================================= HPSBUX0106-155 Security Vulnerability in CIFS/9000 PLATFORM: HP 9000 servers running CIFS/9000 Server version A.01.06, or lower. MANUAL ACTIONS: Yes - Update plus other actions Upgrade to CIFS/9000 Server A.01.06 and install patch PHNE_24164 or upgrade to CIFS/9000 Server A.01.07. ========================================= HPSBUX0107-157 Security Vulnerability in CIFS/9000 Server #2 PLATFORM: HP 9000 servers running CIFS/9000 Server version A.01.07 or lower; HP 3000 servers running Samba/iX MANUAL ACTIONS: Yes - NonUpdate Edit the smb.conf file to remove all occurances of the macro "%m". See below for details. ========================================= HPSBUX0108-164 Sec. Vulnerability in CIFS/9000 Server password PLATFORM: HP 9000 servers running CIFS/9000 Server version A.01.07, or lower. MANUAL ACTIONS: Yes - NonUpdate Ensure that the "passwd program" option contains the %u substitution string as follows: passwd program = /bin/passwd %u. ========================================= HPSBUX0110-173 Sec. Vulnerability in Tomcat 3.2.1 (VVOS) PLATFORM: HP9000 Servers running HP-UX 11.04 (VVOS), Virtualvault A.04.50 only. MANUAL ACTIONS: Yes - Update plus other actions Apply patches and install Tomcat 3.2.3 runtime JAR files. ========================================= HPSBUX0110-174 Sec. Vulnerability in JRE PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20 and 11.x only. This security bulletin applies to Java on HP-UX. It does not cover software shipped on Linux or Windows/NT. MANUAL ACTIONS: Yes - Update Update to: JDK and JRE 1.2.2.10 or higher for HP-UX 11.x. JDK and JRE 1.3.0.02 or higher for HP-UX 11.x. JDK and JRE 1.3.1.01 or higher for HP-UX 11.x. ========================================= HPSBUX0201-181 Sec. Vulnerability in IPFilter/9000 PLATFORM: IPFilter/9000 product running on HP-UX 11.00 or 11.11 MANUAL ACTIONS: Yes - Update Upgrade to IPFilter/9000 version A.03.05.02 or greater ========================================= HPSBUX0202-182 Sec. Vulnerability in Netscape 6.01 PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.00 and 11.11. MANUAL ACTIONS: Yes - Update Update to Netscape 6.2.1 ========================================= HPSBUX0202-184 Sec. Vulnerability in SNMP PLATFORM: HP 9000 Series 700 and Series 800 running HP-UX releases 10.X and 11.X HP Procurve switches HP TopTools Remote Control Card JetDirect Firmware MC/ServiceGuard, EMS HA Monitors Solaris running OpenView or NNM Windows/NT running OpenView or NNM MANUAL ACTIONS: Yes - Update plus other actions ========================================= HPSBUX0202-185 Sec. Vulnerability with HP AdvanceStack hubs PLATFORM: HP AdvanceStack J3200A, J3201A, J3202A, J3203A, J3204A, J3205A, J3210A with firmware version A.03.07 and earlier. MANUAL ACTIONS: Yes - NonUpdate Until a fix is available work around the problem by either disabling web access or removing the management IP address. ========================================= HPSBUX0203-186 Sec. Vulnerability in JAVA JRE PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20 and 11.x (including 11.04 - VVOS) only. This security bulletin applies to Java on HP-UX (including 11.04 - VVOS). It does not cover software shipped on Linux or Windows/NT. MANUAL ACTIONS: Yes - Update plus other actions Update Java: JDK/JRE 1.1.8.06 or higher for HP-UX 10.20, JDK/JRE 1.2.2.12 or higher for HP-UX 11.x, JDK/JRE 1.3.1.00 or higher for HP-UX 11.x. JDK/JRE for outside Apache web servers on Virtualvault A.04.50 should be upgraded to Java version 1.3.1 or higher. For the inside administration Apache web server on Virtualvault A.04.50, install PHSS_26673. ========================================= HPSBUX0206-195 Sec. Vulnerability in OpenSSH on HP-UX PLATFORM: HP 9000 Servers running HP-UX release 11.00, and 11.11 only with the T1471AA HP-UX Secure Shell product installed. MANUAL ACTIONS: Yes - Update Install new binary version A.03.10.003 or subsequent, which can be found on www.software.hp.com under "Internet and Security solutions". ========================================= HPSBUX0207-197 Sec. Vulnerability in Apache Server Chunk Encoding PLATFORM: HP9000 Servers running HP-UX release 11.00, 11.04, 11.11 11.20, and 11.22 with the HP Apache product installed. affected OpenView Products: Network Node Manager (NNM) 6.01, 6.1, 6.2, 6.31 running on HP-UX and Solaris NNM on Windows NT/W2K is not affected. OV Service Information Portal (OVSIP) 1.0, 2.0, 3.0 MANUAL ACTIONS: Yes - NonUpdate Install repaired binary. For HP-UX 11.00, 11.11, 11.20 and 11.22 download new product bundles from http://www.software.hp.com/ISS_products_list.html For HP-UX 11.04, OV NNM 6.2, OV NNM 6.1, OV SIP 3.0 apply the applicable patch. ========================================= HPSBUX0207-200 Sec. Vulnerability in CIFS/9000 PLATFORM: HP9000 systems running CIFS/9000 Client version A.01.06 or earlier on HP-UX releases 11.00 and 11.11. MANUAL ACTIONS: Yes - Update Update to CIFS/9000 Client version A.01.07, or later ========================================= HPSBUX0207-202 Sec. Vulnerability in BIND 9 PLATFORM: HP9000 Series 700/800 running HP-UX release 11.11 (11i) only with the BINDv920.INETSVCS-BIND fileset installed. MANUAL ACTIONS: Yes - NonUpdate Install BIND920v2.depot. ========================================= HPSBUX0207-204 Sec. Vulnerability in JetDirect EWS PLATFORM: HP peripherals or printers that have an Embedded Web Server (EWS). MANUAL ACTIONS: Yes - Update Update to firmware version X.22.09 or later. ========================================= HPSBUX0208-207 Sec. Vulnerability in HP Apache Server PHP PLATFORM: HP9000 Servers running HP-UX release 11.00, 11.11, 11.20, and 11.22 with the HP Apache product installed. MANUAL ACTIONS: Yes - Update hp apache-based web server v.1.3.26.03 on hp-ux 11.0 and 11i (pa-risc) hp apache-based web server v.1.3.26.03 on hp-ux 11i version 1.5 and 1.6 (ipf) hp apache-based web server v.2.0.39.03 on hp-ux 11.0 and 11i (pa-risc) hp apache-based web server v.2.0.39.03 on hp-ux 11i (pa-risc) for ipv6 hp apache-based web server v.2.0.39.03 on hp-ux 11i version 1.5 and 1.6 (ipf) ========================================= ====================================================== III. Missing or mis-formatted "MANUAL ACTIONS - Non-HP-UX only" ====================================================== The MANUAL ACTIONS section in each of the following bulletins was either missing or was not in the new format. These bulletins will not be sent to the e-mail distribution. ========================================= HPSBUX0006-116 Sec. Vulnerability in Web JetAdmin 6.0 PLATFORM: Microsoft Windows NT 4.0 / Windows 2000 only. MANUAL ACTIONS: Non-HP-UX only Install latest version of Web JetAdmin 6.0 (6.0.1233) ========================================= HPSBUX0208-212 Sec. Vulnerability in OpenSSL for JetDirect PLATFORM: HP Jetdirect Print Servers with Jetdirect Firmware Versions X.22.00 through X.23.99 ( where X = L through U ) only. MANUAL ACTIONS: Non-HP-UX only Until a firmware update is available, disable the Embedded Web Server on Jetdirect Print Servers with Jetdirect Firmware Versions X.22.00 through X.23.99 ( where X = L through U ). ========================================= ====================================================== IV. Missing or mis-formatted "MANUAL ACTIONS - No" ====================================================== The MANUAL ACTIONS section in each of the following bulletins was either missing or was not in the new format. These bulletins will not be sent to the e-mail distribution. All the following bulletins now have: MANUAL ACTIONS: No HPSBUX9311-001 HPSBUX9311-002 HPSBUX9402-003 HPSBUX9402-005 HPSBUX9402-006 HPSBUX9404-008 HPSBUX9405-009 HPSBUX9406-013 HPSBUX9407-015 HPSBUX9409-017 HPSBUX9410-018 HPSBUX9411-019 HPSBUX9501-020 HPSBUX9502-022 HPSBUX9502-023 HPSBUX9502-024 HPSBUX9503-025 HPSBUX9504-027 HPSBUX9602-029 HPSBUX9604-031 HPSBUX9607-032 HPSBUX9608-036 HPSBUX9608-037 HPSBUX9609-038 HPSBUX9610-040 HPSBUX9612-043 HPSBUX9701-044 HPSBUX9701-045 HPSBUX9701-046 HPSBUX9701-047 HPSBUX9701-048 HPSBUX9701-049 HPSBUX9701-050 HPSBUX9701-051 HPSBUX9702-052 HPSBUX9702-053 HPSBUX9702-055 HPSBUX9702-056 HPSBUX9704-057 HPSBUX9704-059 HPSBUX9704-061 HPSBUX9707-064 HPSBUX9707-067 HPSBUX9710-070 HPSBUX9710-071 HPSBUX9711-073 HPSBUX9801-075 HPSBUX9801-076 HPSBUX9803-077 HPSBUX9807-079 HPSBUX9807-081 HPSBUX9808-082 HPSBUX9808-083 HPSBUX9808-084 HPSBUX9810-086 HPSBUX9811-087 HPSBUX9811-088 HPSBUX9812-089 HPSBUX9812-090 HPSBUX9902-091 HPSBUX9903-092 HPSBUX9903-093 HPSBUX9903-094 HPSBUX9903-095 HPSBUX9903-096 HPSBUX9906-098 HPSBUX9906-099 HPSBUX9907-101 HPSBUX9908-102 HPSBUX9910-104 HPSBUX9912-106 HPSBUX9912-107 HPSBUX0001-108 HPSBUX0004-112 HPSBUX0005-113 HPSBUX0006-115 HPSBUX0007-117 HPSBUX0008-118 HPSBUX0008-119 HPSBUX0009-120 HPSBUX0009-121 HPSBUX0009-122 HPSBUX0010-123 HPSBUX0010-124 HPSBUX0010-125 HPSBUX0010-127 HPSBUX0011-129 HPSBUX0011-130 HPSBUX0012-134 HPSBUX0012-135 HPSBUX0101-136 HPSBUX0101-137 HPSBUX0101-138 HPSBUX0102-139 HPSBUX0102-140 HPSBUX0102-142 HPSBUX0102-143 HPSBUX0103-146 HPSBUX0103-147 HPSBUX0104-148 HPSBUX0105-151 HPSBUX0106-152 HPSBUX0106-153 HPSBUX0106-154 HPSBUX0107-156 HPSBUX0107-158 HPSBUX0107-159 HPSBUX0107-160 HPSBUX0107-161 HPSBUX0107-162 HPSBUX0108-163 HPSBUX0108-165 HPSBUX0109-166 HPSBUX0109-167 HPSBUX0110-168 HPSBUX0110-169 HPSBUX0110-170 HPSBUX0110-171 HPSBUX0110-172 HPSBUX0111-175 HPSBUX0111-176 HPSBUX0112-177 HPSBUX0201-179 HPSBUX0202-183 HPSBUX0203-189 HPSBUX0204-190 HPSBUX0204-191 HPSBUX0205-192 HPSBUX0205-193 HPSBUX0205-194 HPSBUX0207-196 HPSBUX0207-198 HPSBUX0207-201 HPSBUX0208-206 HPSBUX0208-208 HPSBUX0208-210 HPSBUX0208-211 HPSBUX0208-213 ====================================================== B. Recommended solution If bulletins are maintained locally, optionally download new copies. Only bulletins with incorrect MANUAL ACTIONS fields will be mailed out. Bulletins which were revised to add a missing MANUAL ACTIONS field or to correct the format of the MANUAL ACTIONS field will not be mailed out for this revision. C. To subscribe to automatically receive future NEW HP Security Bulletins from the HP IT Resource Center via electronic mail, do the following: Use your browser to get to the HP IT Resource Center page at: http://itrc.hp.com Use the 'Login' tab at the left side of the screen to login using your ID and password. Use your existing login or the "Register" button at the left to create a login, in order to gain access to many areas of the ITRC. Remember to save the User ID assigned to you, and your password. In the left most frame select "Maintenance and Support". Under the "Notifications" section (near the bottom of the page), select "Support Information Digests". To -subscribe- to future HP Security Bulletins or other Technical Digests, click the check box (in the left column) for the appropriate digest and then click the "Update Subscriptions" button at the bottom of the page. or To -review- bulletins already released, select the link (in the middle column) for the appropriate digest. To -gain access- to the Security Patch Matrix, select the link for "The Security Bulletins Archive". (near the bottom of the page) Once in the archive the third link is to the current Security Patch Matrix. Updated daily, this matrix categorizes security patches by platform/OS release, and by bulletin topic. Security Patch Check completely automates the process of reviewing the patch matrix for 11.XX systems. For information on the Security Patch Check tool, see: http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/ displayProductInfo.pl?productNumber=B6834AA The security patch matrix is also available via anonymous ftp: ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix/ On the "Support Information Digest Main" page: click on the "HP Security Bulletin Archive". D. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. ------------------------------------------------------------------ (c)Copyright 2002 Hewlett-Packard Company Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of HP products referenced herein are trademarks and/or service marks of Hewlett-Packard Company. Other product and company names mentioned herein may be trademarks and/or service marks of their respective owners. - -----End of Document ID: HPSBUX0301-236-------------------------------------- Document ID: HPSBUX0201-180 Date Loaded: 20020122 Title: Sec. Vulnerability with WU-FTPD 2.6 (rev.1) - -------------------------------------------------------------------- **REVISED 01** Source: HEWLETT-PACKARD COMPANY SECURITY BULLETIN: HPSBUX0201-180 Originally issued: 22 January 2002 Last Revised: 10 January 2003 -------------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------ PROBLEM: Security vulnerability in WU-FTPD 2.6., Format String. CVE identifier: CAN-2001-0187 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0187 PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.0 and 11.11. DAMAGE: A remote user may execute arbitrary code on the server. SOLUTION: Use the latest WEB upgrade which will upgrade WU-FTPD to version 2.6 (rev b01.002) **REVISED 01** MANUAL ACTIONS: Yes - Update Upgrade WU-FTPD to version 2.6 (rev b01.002). AVAILABILITY: It is available now for 11.0 and 11.11. CHANGE SUMMARY: Revision 01 correct MANUAL ACTIONS field ------------------------------------------------------------------ A. Background There is a format string vulnerability in wu-ftpd. The Common Vulnerabilities and Exposures (CVE) group has assigned the identifier: CAN-2001-0187 http://www.securityfocus.com/bid/2296 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0187 B. Fixing the problem To determine if wu-ftpd version 2.6 is installed on a system: what /usr/lbin/ftpd | grep wuftpd-2.6 If version 2.6 IS installed, then apply the latest web upgrade now. Registration for the download is necessary: http://www.software.hp.com/ and search on "wu-ftpd" (without the quotes) or: http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo .pl?productNumber=WUFTPD26 If revision 2.6 is NOT installed, then make sure you have installed the current patches for HP Security Bulletin "HPSBUX0107-162 Security Vulnerability in ftpd". C. To subscribe to automatically receive future NEW HP Security Bulletins from the HP IT Resource Center via electronic mail, do the following: Use your browser to get to the HP IT Resource Center page at: http://itrc.hp.com Use the 'Login' tab at the left side of the screen to login using your ID and password. Use your existing login or the "Register" button at the left to create a login, in order to gain access to many areas of the ITRC. Remember to save the User ID assigned to you, and your password. In the left most frame select "Maintenance and Support". Under the "Notifications" section (near the bottom of the page), select "Support Information Digests". To -subscribe- to future HP Security Bulletins or other Technical Digests, click the check box (in the left column) for the appropriate digest and then click the "Update Subscriptions" button at the bottom of the page. or To -review- bulletins already released, select the link (in the middle column) "Search Technical Knowledge Database". To -gain access- to the Security Patch Matrix, or the "The Security Bulletins Archive" select the link for "The Security Bulletins Archive" (near the bottom of the page). Once in the archive the third link is to the current Security Patch Matrix. Updated daily, this matrix categorizes security patches by platform/OS release, and by bulletin topic. Security Patch Check completely automates the process of reviewing the patch matrix for 11.XX systems. For information on the Security Patch Check tool, see: http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/ displayProductInfo.pl?productNumber=B6834AA" The security patch matrix is also available via anonymous ftp: ftp.itrc.hp.com:~ftp/export/patches/hp-ux_patch_matrix On the "Support Information Digest Main" page: click on the "HP Security Bulletin Archive". D. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. - -----End of Document ID: HPSBUX0201-180-------------------------------------- Document ID: HPSBUX0110-172 Date Loaded: 20011016 Title: Sec. Vulnerability in telnetd (rev.1) - ----------------------------------------------------------------- **REVISED 01** Source: HEWLETT-PACKARD COMPANY SECURITY BULLETIN: HPSBUX0110-172 Originally issued: 16 October 2001 Last Revised: 10 January 2003 ----------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------ PROBLEM: Systems running telnetd may permit unauthorized remote access. See: http://www.cert.org/advisories/CA-2001-21.html This vulnerability has been assigned the identifier CAN-2001-0554 by the Common Vulnerabilities and Exposures (CVE) group: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0554 PLATFORM: HP9000 Servers running HP-UX releases 10.X only. DAMAGE: An intruder can potentially execute arbitrary code with the privileges of the telnetd process. SOLUTION: Apply the following patches to the release specified. 10.01 PHNE_24820 , 10.10 PHNE_24820 , 10.20 PHNE_24821 , SIS 10.20 PHNE_24822 (Telnet kerberos Patch), 10.24 PHNE_25217. **REVISED 01** Note: The Secure Internet Services (SIS) product, if enabled, has to be disabled before the installation or removal of PHNE_24822 (Telnet kerberos Patch). **REVISED 01** MANUAL ACTIONS: No AVAILABILITY: The patches are available now from http://itrc.hp.com. CHANGE SUMMARY: Revision 01 correct MANUAL ACTIONS field ------------------------------------------------------------------ A. Background A potential remotely exploitable buffer overflow in telnetd has been reported to Hewlett-Packard Company. It is unique to HP-UX releases 10.X only. B. Fixing the problem Disable telnetd (by commenting out the /etc/inetd.conf entry for telnetd and running '/usr/sbin/inetd -c') if telentd is not needed on your system. Install the appropriate patch from the list below. C. Recommended solution Apply the following patches to the release specified. 10.01 PHNE_24820 , 10.10 PHNE_24820 , 10.20 PHNE_24821 , SIS 10.20 PHNE_24822 (Telnet kerberos Patch), 10.24 PHNE_25217. All patches are available now from http://itrc.hp.com. D. To subscribe to automatically receive future NEW HP Security Bulletins from the HP IT Resource Center via electronic mail, do the following: Use your browser to get to the HP IT Resource Center page at: http://itrc.hp.com Use the 'Login' tab at the left side of the screen to login using your ID and password. Use your existing login or the "Register" button at the left to create a login, in order to gain access to many areas of the ITRC. Remember to save the User ID assigned to you, and your password. In the left most frame select "Maintenance and Support". Under the "Notifications" section (near the bottom of the page), select "Support Information Digests". To -subscribe- to future HP Security Bulletins or other Technical Digests, click the check box (in the left column) for the appropriate digest and then click the "Update Subscriptions" button at the bottom of the page. or To -review- bulletins already released, select the link (in the middle column) for the appropriate digest. To -gain access- to the Security Patch Matrix, select the link for "The Security Bulletins Archive". (near the bottom of the page) Once in the archive the third link is to the current Security Patch Matrix. Updated daily, this matrix categorizes security patches by platform/OS release, and by bulletin topic. Security Patch Check completely automates the process of reviewing the patch matrix for 11.XX systems. For information on the Security Patch Check tool, see: http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/ displayProductInfo.pl?productNumber=B6834AA" The security patch matrix is also available via anonymous ftp: ftp.itrc.hp.com:~ftp/export/patches/hp-ux_patch_matrix On the "Support Information Digest Main" page: click on the "HP Security Bulletin Archive". E. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. - -----End of Document ID: HPSBUX0110-172-------------------------------------- Document ID: HPSBUX0203-187 Date Loaded: 20020318 Title: Sec. Vulnerability in JRE Bytecode Verifier (rev.1) ------------------------------------------------------------------- **REVISED 01** Source: HEWLETT-PACKARD COMPANY SECURITY BULLETIN: HPSBUX0203-187 Originally issued: 08 March 2002 Last Revised: 10 January 2003 ------------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------- ISSUE: A vulnerability in the Java(TM) Runtime Environment Bytecode Verifier may be exploited by an untrusted applet to escalate privileges. PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20 and 11.x only. This security bulletin applies to Java on HP-UX. It does not cover software shipped on Linux or Windows/NT. POSSIBLE RESULT: Privileges are escalated improperly. **REVISED 01** MANUAL ACTIONS: Yes - Update JDK and JRE 1.1.8.06 or higher for HP-UX 10.20. JDK and JRE 1.1.8.06 or higher for HP-UX 11.x JDK and JRE 1.2.2.12 or higher for HP-UX 11.x. JDK and JRE 1.3.1.00 or higher for HP-UX 11.x SOLUTION: Install the latest Java releases, as described below. AVAILABILITY: These fixed releases are on www.hp.com/go/java now. They are not available from itrc.hp.com CHANGE SUMMARY: Revision 01 correct MANUAL ACTIONS field -------------------------------------------------------------------- A. Background A vulnerability in certain versions of the Java(TM) Runtime Environment may be exploited by an untrusted applet to escalate privileges. There are no known attacks reported based on this vulnerability to the best of Sun's knowledge. B. Fixing the problem Obtain and install the latest releases of the Java products. For JDK/JRE 1.1.8, 1.2.2 and JDK/JRE 1.3.0 based releases go to www.hp.com/go/java. Section C. 1.) below will guide you in determining your installed Java version on HP-UX. The vulnerability is fixed in releases 1.3.1 and higher. Users of 1.3.0.x will need to update to 1.3.1. The releases described in HP Security Bulletin #0186, issued 4 March 2002, also correct the vulnerability described here. In other words, the releases in Section C. below will correct both vulnerabilities. C. Recommended solution JDK and JRE 1.1.8.06 or higher for HP-UX 10.20 or 11.x. JDK and JRE 1.2.2.12 or higher for HP-UX 11.x. JDK and JRE 1.3.1.00 or higher for HP-UX 11.x -------------------------------------------------------------------- HP-UX: Determining Java version information for JDK, JRE, and JPI -------------------------------------------------------------------- There are two mechanisms to determine which versions of the Java JDK/SDK (developer kit), JRE (runtime), or JPI (Java Plugin for Netscape) you have installed. First, you can use the following command to list the bundle revisions for any installed Java products: /usr/sbin/swlist -l bundle | grep -i java Second, you can ask Java to identify itself by executing the following: <path>/bin/java -version where path is typically /opt/java - for Java 1.1 /opt/java1.2 - for Java 1.2 /opt/java1.3 - for Java 1.3 but may be an alternate location as specified during setup. The plugin (JPI) is installed in user's home directories, so you will need to check its version using the following. For Java 1.2: $HOME/.netscape/java/bin/java -version For Java 1.1, you must use: what $HOME/.netscape/java/bin/PA_RISC/green_threads/jre NOTE: Do not rely on Netscape's Help/About_Plug-ins menu to find the version number of the Plugin, because in some cases the version number is incorrect. a.) Unplugging the Plugin (Since the Plugin is manually installed into Netscape, it must be manually removed as well.) If you have a plugin that you wish to remove because it has a security issue, in addition to doing a swremove of the product you must also do the following for Java 1.1 and Java 1.2: rm -f $HOME/.netscape/plugins/javaplugin.sl rm -rf $HOME/.netscape/java ------------------------------------------------------------------- D. To subscribe to automatically receive future NEW HP Security Bulletins from the HP IT Resource Center via electronic mail, do the following: Use your browser to get to the HP IT Resource Center page at: http://itrc.hp.com Use the 'Login' tab at the left side of the screen to login using your ID and password. Use your existing login or the "Register" button at the left to create a login, in order to gain access to many areas of the ITRC. Remember to save the User ID assigned to you, and your password. In the left most frame select "Maintenance and Support". Under the "Notifications" section (near the bottom of the page), select "Support Information Digests". To -subscribe- to future HP Security Bulletins or other Technical Digests, click the check box (in the left column) for the appropriate digest and then click the "Update Subscriptions" button at the bottom of the page. or To -review- bulletins already released, select the link (in the middle column) for the appropriate digest. To -gain access- to the Security Patch Matrix, select the link for "The Security Bulletins Archive". (near the bottom of the page) Once in the archive the third link is to the current Security Patch Matrix. Updated daily, this matrix categorizes security patches by platform/OS release, and by bulletin topic. Security Patch Check completely automates the process of reviewing the patch matrix for 11.XX systems. For information on the Security Patch Check tool, see: http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/ displayProductInfo.pl?productNumber=B6834AA" The security patch matrix is also available via anonymous ftp: ftp.itrc.hp.com:~ftp/export/patches/hp-ux_patch_matrix On the "Support Information Digest Main" page: click on the "HP Security Bulletin Archive". E. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. - -----End of Document ID: HPSBUX0203-187-------------------------------------- Document ID: HPSBUX0203-188 Date Loaded: 20020318 Title: Sec. Vulnerability in JAVA Web Start ) (rev.1) ------------------------------------------------------------------- **REVISED 01** Source: HEWLETT-PACKARD COMPANY SECURITY BULLETIN: HPSBUX0203-188 Originally issued: 18 March 2002 Last Revised: 10 January 2003 ------------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from customer's ailure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------- ISSUE: A vulnerability in Java(TM) Web Start may allow an application using it to gain access to restricted resources. PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.x only. This security bulletin applies to Java Web Start on HP-UX. It does not cover software shipped on Linux or Windows/NT. POSSIBLE RESULT: Restricted resources are accessed improperly. **REVISED 01** MANUAL ACTIONS: Yes - Update Web Start 1.0.1.01 or higher for HP-UX 11.x. SOLUTION: Install the latest Java Web Start release, as described below. AVAILABILITY: These fixed releases are on www.hp.com/go/java now. They are not available from itrc.hp.com CHANGE SUMMARY: Revision 01 correct MANUAL ACTIONS field -------------------------------------------------------------------- A. Background A vulnerability in certain versions of Java(TM) Web Start may be exploited by an application to access restricted resources. There are no known attacks reported based on this vulnerability to the best of Sun's knowledge. B. Fixing the problem Obtain and install the latest release of the Java Web Start product. This will be found by going to www.hp.com/go/java. Section C. 1.) below will guide you in determining your installed Java Web Start version on HP-UX. The vulnerability is fixed in release 1.0.1.01 or higher. C. Recommended solution Web Start 1.0.1.01 or higher for HP-UX 11.x. -------------------------------------------------------------------- HP-UX: Determining Java version information for Java Web Start -------------------------------------------------------------------- To find the version string, execute Java Web Start: <installdir>/javaws/javaws then click on Help -> About Java Web Start menu. ------------------------------------------------------------------- D. To subscribe to automatically receive future NEW HP Security Bulletins from the HP IT Resource Center via electronic mail, do the following: Use your browser to get to the HP IT Resource Center page at: http://itrc.hp.com Use the 'Login' tab at the left side of the screen to login using your ID and password. Use your existing login or the "Register" button at the left to create a login, in order to gain access to many areas of the ITRC. Remember to save the User ID assigned to you, and your password. In the left most frame select "Maintenance and Support". Under the "Notifications" section (near the bottom of the page), select "Support Information Digests". To -subscribe- to future HP Security Bulletins or other Technical Digests, click the check box (in the left column) for the appropriate digest and then click the "Update Subscriptions" button at the bottom of the page. or To -review- bulletins already released, select the link (in the middle column) for the appropriate digest. To -gain access- to the Security Patch Matrix, select the link for "The Security Bulletins Archive". (near the bottom of the page) Once in the archive the third link is to the current Security Patch Matrix. Updated daily, this matrix categorizes security patches by platform/OS release, and by bulletin topic. Security Patch Check completely automates the process of reviewing the patch matrix for 11.XX systems. For information on the Security Patch Check tool, see: http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/ displayProductInfo.pl?productNumber=B6834AA" The security patch matrix is also available via anonymous ftp: ftp.itrc.hp.com:~ftp/export/patches/hp-ux_patch_matrix On the "Support Information Digest Main" page: click on the "HP Security Bulletin Archive". E. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. - -----End of Document ID: HPSBUX0203-188-------------------------------------- Document ID: HPSBUX0207-205 Date Loaded: 20020728 Title: RFC 1948 ISN randomization is now available (rev.1) ----------------------------------------------------------------- **REVISED 01** Source: HEWLETT-PACKARD COMPANY SECURITY BULLETIN: HPSBUX0207-205 Originally issued: 29 July 2002 Last Revised: 10 January 2003 ----------------------------------------------------------------- NOTICE: There are no restrictions for distribution of this Bulletin provided that it remains complete and intact. The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------ ANNOUNCEMENT: RFC 1948 ISN randomization is now available. PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.00, 11.04 and 11.11. DAMAGE: Possible increase in privilege SOLUTION: Apply the appropriate patch as follows: for HP randomization on releases: HP-UX 11.00: PHNE_22397 or subsequent, HP-UX 11.11: default mode. for RFC 1948 ISN randomization HP-UX 11.00: PHNE_26771 or subsequent, HP-UX 11.04: PHNE_26101 or subsequent, HP-UX 11.11: PHNE_25644 or subsequent. **REVISED 01** MANUAL ACTIONS: Yes - NonUpdate Install patch and enable randomization. AVAILABILITY: All patches are available now. CHANGE SUMMARY: Revision 01 correct MANUAL ACTIONS field ------------------------------------------------------------------ A. Background As discussed in CERT Advisory CA-2001-09, Hewlett-Packard now provides RFC1948 compliant randomization. B. Recommended solution The following tcp randomizations are now available: HP-UX releases 11.00, 11.04, and 11.11 (11i): HP randomization RFC 1948 ISN randomization ================================================================= To enable tcp randomization on HP-UX 11.00, 11.04, and 11.11(11i): ================================================================= HP randomization HP-UX release 11.00: Install PHNE_22397 or subsequent. The HP randomization will then be the default tcp randomization. NOTE: This patch has dependencies. HP-UX release 11.11 (11i): No patch is required. The HP randomization has always been implemented in HP-UX 11.11 (11i) and is the default tcp randomization. RFC 1948 ISN randomization HP-UX 11.00: Apply PHNE_26771 or subsequent. HP-UX 11.04: Apply PHNE_26101 or subsequent. HP-UX 11.11 (11i): Apply PHNE_25644 or subsequent. Once the appropriate patch has been applied the RFC 1948 ISN randomization can be enabled on HP-UX 11.00, 11.04 and 11.11 by executing the following command as root: ndd -set /dev/tcp tcp_isn_passphrase <secret passphrase> where <secret passphrase> is any length character string. Only the first 32 characters will be retained. If the passphrase is changed the system should be rebooted. NOTE: RFC 1948 ISN randomization is not available on HP-UX release 10.20. Customers who want RFC 1948 ISN randomization should upgrade to HP-UX 11.X and apply necessary patches as discussed herein. C. To subscribe to automatically receive future NEW HP Security Bulletins from the HP IT Resource Center via electronic mail, do the following: Use your browser to get to the HP IT Resource Center page at: http://itrc.hp.com Use the 'Login' tab at the left side of the screen to login using your ID and password. Use your existing login or the "Register" button at the left to create a login, in order to gain access to many areas of the ITRC. Remember to save the User ID assigned to you, and your password. In the left most frame select "Maintenance and Support". Under the "Notifications" section (near the bottom of the page), select "Support Information Digests". To -subscribe- to future HP Security Bulletins or other Technical Digests, click the check box (in the left column) for the appropriate digest and then click the "Update Subscriptions" button at the bottom of the page. or To -review- bulletins already released, select the link (in the middle column) for the appropriate digest. To -gain access- to the Security Patch Matrix, select the link for "The Security Bulletins Archive". (near the bottom of the page) Once in the archive the third link is to the current Security Patch Matrix. Updated daily, this matrix categorizes security patches by platform/OS release, and by bulletin topic. Security Patch Check completely automates the process of reviewing the patch matrix for 11.XX systems. For information on the Security Patch Check tool, see: http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/ displayProductInfo.pl?productNumber=B6834AA The security patch matrix is also available via anonymous ftp: ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix/ On the "Support Information Digest Main" page: click on the "HP Security Bulletin Archive". D. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. ------------------------------------------------------------------ (c)Copyright 2002 Hewlett-Packard Company Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of HP products referenced herein are trademarks and/or service marks of Hewlett-Packard Company. Other product and company names mentioned herein may be trademarks and/or service marks of their respective owners. - -----End of Document ID: HPSBUX0207-205-------------------------------------- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBPiKu+ih9+71yA2DNAQEaQAP/c6Pj1veCRHGCbPhoQ6seLwU3rH4VbafB M10x1ipIN9vmqt9/RnmxW3+QqxDs5fvYT+9kxTGBy8KdvTm93L7nUk3AAMjaHh0w X/0SuL+jH7Y7JIZIFJcwDCPAvFlsMTVByNoTHTrRvlYFImi+4TBxWROLO6XDGofF y1N612Nul7U= =tp0D -----END PGP SIGNATURE-----