-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1096
HPESBHF03741 rev.1 - HPE Network products including Comware 7, IMC, and VCX
   running OpenSSL, Local Unauthorized Disclosure of Information, Remote
      Denial of Service (DoS), Unauthorized Disclosure of Information
                                4 May 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           HPE Network products including Comware 7, IMC, and VCX
Publisher:         Hewlett-Packard
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-2842 CVE-2016-0800 CVE-2016-0799
                   CVE-2016-0798 CVE-2016-0797 CVE-2016-0705
                   CVE-2016-0704 CVE-2016-0703 CVE-2016-0702

Reference:         ASB-2017.0011
                   ASB-2016.0079
                   ESB-2016.0544
                   ESB-2016.0543.2

Original Bulletin: 
   https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03741en_us

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03741en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03741en_us
Version: 1

HPESBHF03741 rev.1 - HPE Network products including Comware 7, IMC, and VCX
running OpenSSL, Local Unauthorized Disclosure of Information, Remote Denial
of Service (DoS), Unauthorized Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-02
Last Updated: 2017-05-02

Potential Security Impact: Local: Unauthorized Disclosure of Information;
Remote: Denial of Service (DoS), Unauthorized Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities with OpenSSL have been addressed for HPE
Network products including Comware 7, IMC, and VCX. The vulnerabilities could
be remotely exploited resulting in Denial of Service (DoS) or disclosure of
sensitive information, or locally exploited resulting in unauthorized
disclosure of information.

References:

  - CVE-2016-0702 - Local unauthorized disclosure of information
  - CVE-2016-0703 - Remote unauthorized disclosure of information
  - CVE-2016-0704 - Remote unauthorized disclosure of information
  - CVE-2016-0705 - Remote Denial of Service (DoS)
  - CVE-2016-0797 - Remote Denial of Service (DoS)
  - CVE-2016-0798 - Remote Denial of Service (DoS)
  - CVE-2016-0799 - Remote Denial of Service (DoS)
  - CVE-2016-0800 - Remote unauthorized disclosure of information
  - CVE-2016-2842 - Remote Denial of Service (DoS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware v7 (CW7) Products Products All versions - Please refer to the
RESOLUTION below for a list of updated products. 
  - HPE Intelligent Management Center (iMC) Products All versions - Please
refer to the RESOLUTION below for a list of updated products. 
  - VCX Products Products All versions - Please refer to the RESOLUTION below
for a list of updated products. 

BACKGROUND

  CVSS Base Metrics
  =================
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

    CVE-2016-0702
      5.1 CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
      1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)

    CVE-2016-0703
      5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
      4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

    CVE-2016-0704
      5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
      4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

    CVE-2016-0705
      9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
      10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

    CVE-2016-0797
      7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
      5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

    CVE-2016-0798
      7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
      7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

    CVE-2016-0799
      9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
      10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

    CVE-2016-0800
      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
      4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

    CVE-2016-2842
      9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
      10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

    Information on CVSS is documented in
    HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates to resolve the vulnerabilities in
the Comware, IMC and VCX products running OpenSSL. 

**IMC Products**

  + **IMC UAM_TAM - Version: 7.2 E0408**
    * HP Network Products
      - JD144A HPE A-IMC User Access Management Software Module with 200-user
License
      - JF388A HP IMC UAM S/W MODULE W/200-USER LICENSE
      - JF388AAE HP IMC UAM S/W MODULE W/200-USER E-LTU
      - JG752AAE HP IMC UAM SW MOD W/ 50-USER E-LTU
      - JG483A HP IMC TAM S/W MODULE W/100-NODE LIC
      - JG483AAE HP IMC TAM S/W MODULE W/100-NODE E-LTU
      - JG764AAE HP IMC TAM SW MOD W/ 50-NODE E-LTU
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0703
      - CVE-2016-0704
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-0800


**VCX Products**

  + **VCX - Version: 9.8.19**
    * HP Network Products
      - J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr
      - J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr
      - JC517A HP VCX V7205 Platform w/DL 360 G6 Server
      -  JE355A HP VCX V6000 Branch Platform 9.0
      - JC516A HP VCX V7005 Platform w/DL 120 G6 Server
      - JC518A HP VCX Connect 200 Primry 120 G6 Server
      - J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr
      - JE341A HP VCX Connect 100 Secondary
      - JE252A HP VCX Connect Primary MIM Module
      - JE253A HP VCX Connect Secondary MIM Module
      - JE254A HP VCX Branch MIM Module
      - JE355A HP VCX V6000 Branch Platform 9.0
      - JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod
      - JD023A HP MSR30-40 Router with VCX MIM Module
      - JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM
      - JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod
      - JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod
      - JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod
      - JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS
      - JE340A HP VCX Connect 100 Pri Server 9.0
      - JE342A HP VCX Connect 100 Sec Server 9.0
    * CVEs
      - CVE-2016-0798
      - CVE-2016-0799


**COMWARE 7 Products**

  + **12500 (Comware 7) - Version: R7377P01**
    * HP Network Products
      - JC072B HP 12500 Main Processing Unit
      - JC085A HP A12518 Switch Chassis
      - JC086A HP A12508 Switch Chassis
      - JC652A HP 12508 DC Switch Chassis
      - JC653A HP 12518 DC Switch Chassis
      - JC654A HP 12504 AC Switch Chassis
      - JC655A HP 12504 DC Switch Chassis
      - JF430A HP A12518 Switch Chassis
      - JF430B HP 12518 Switch Chassis
      - JF430C HP 12518 AC Switch Chassis
      - JF431A HP A12508 Switch Chassis
      - JF431B HP 12508 Switch Chassis
      - JF431C HP 12508 AC Switch Chassis
      - JG497A HP 12500 MPU w/Comware V7 OS
      - JG782A HP FF 12508E AC Switch Chassis
      - JG783A HP FF 12508E DC Switch Chassis
      - JG784A HP FF 12518E AC Switch Chassis
      - JG785A HP FF 12518E DC Switch Chassis
      - JG802A HP FF 12500E MPU
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **10500 (Comware 7) - Version: R7183**
    * HP Network Products
      - JC611A HP 10508-V Switch Chassis
      - JC612A HP 10508 Switch Chassis
      - JC613A HP 10504 Switch Chassis
      - JC748A HP 10512 Switch Chassis
      - JG608A HP FlexFabric 11908-V Switch Chassis
      - JG609A HP FlexFabric 11900 Main Processing Unit
      - JG820A HP 10504 TAA Switch Chassis
      - JG821A HP 10508 TAA Switch Chassis
      - JG822A HP 10508-V TAA Switch Chassis
      - JG823A HP 10512 TAA Switch Chassis
      - JG496A HP 10500 Type A MPU w/Comware v7 OS
      - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System
      - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System Main Processing Unit
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **12900E (Comware 7) - Version: R2606**
    * HP Network Products
      - JH103A HP FlexFabric 12916E Switch Chassis
      - JH104A HP FlexFabric 12900E Main Processing Unit
      - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
      - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
      - JH255A HP FlexFabric 12908E Switch Chassis
      - JH262A HP FlexFabric 12904E Switch Chassis
      - JH263A HP FlexFabric 12904E Main Processing Unit
      - JH357A HPE FlexFabric 12900E 36-port 100GbE QSFP28 HB Module
      - JH359A HPE FlexFabric 12900E 48-port 40GbE QSFP+ HB Module
      - JH360A HPE FlexFabric 12900E 48-port 1/10GbE SFP+ 2-port 100GbE QSFP28 HB Module
      - JH361A HPE FlexFabric 12916E 21.6Tbps Type H Fabric Module
      - JH362A HPE FlexFabric 12908E 14.4Tbps Type H Fabric Module
      - JH364A HPE FlexFabric 12904E 7.2Tbps Type H Fabric Module
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **5900 (Comware 7) - Version: R2432P01**
    * HP Network Products
      - JC772A HP 5900AF-48XG-4QSFP+ Switch
      - JG296A HP 5920AF-24XG Switch
      - JG336A HP 5900AF-48XGT-4QSFP+ Switch
      - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
      - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
      - JG555A HP 5920AF-24XG TAA Switch
      - JG838A HP FF 5900CP-48XG-4QSFP+ Switch
      - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
      - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
      - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **MSR1000 (Comware 7) - Version: R0306P30**
    * HP Network Products
      - JG875A HP MSR1002-4 AC Router
      - JH060A HP MSR1003-8S AC Router
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **MSR2000 (Comware 7) - Version: R0306P30**
    * HP Network Products
      - JG411A HP MSR2003 AC Router
      - JG734A HP MSR2004-24 AC Router
      - JG735A HP MSR2004-48 Router
      - JG866A HP MSR2003 TAA-compliant AC Router
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **MSR3000 (Comware 7) - Version: R0306P30**
    * HP Network Products
      - JG404A HP MSR3064 Router
      - JG405A HP MSR3044 Router
      - JG406A HP MSR3024 AC Router
      - JG409A HP MSR3012 AC Router
      - JG409B HPE MSR3012 AC Router
      - JG861A HP MSR3024 TAA-compliant AC Router
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **MSR4000 (Comware 7) - Version: R0306P30**
    * HP Network Products
      - JG402A HP MSR4080 Router Chassis
      - JG403A HP MSR4060 Router Chassis
      - JG412A HP MSR4000 MPU-100 Main Processing Unit
      - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **VSR (Comware 7) - Version: E0322P01**
    * HP Network Products
      - JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
      - JG811AAE HP VSR1001 Comware 7 Virtual Services Router
      - JG812AAE HP VSR1004 Comware 7 Virtual Services Router
      - JG813AAE HP VSR1008 Comware 7 Virtual Services Router
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **7900 (Comware 7) - Version: R2152**
    * HP Network Products
      - JG682A HP FlexFabric 7904 Switch Chassis
      - JG841A HP FlexFabric 7910 Switch Chassis
      - JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit
      - JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit
      - JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis
      - JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis
      - JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main Processing Unit
      - JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main Processing Unit
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **5130EI (Comware 7) - Version: R3113P02**
    * HP Network Products
      - JG932A HP 5130-24G-4SFP+ EI Switch
      - JG933A HP 5130-24G-SFP-4SFP+ EI Switch
      - JG934A HP 5130-48G-4SFP+ EI Switch
      - JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch
      - JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch
      - JG938A HP 5130-24G-2SFP+-2XGT EI Switch
      - JG939A HP 5130-48G-2SFP+-2XGT EI Switch
      - JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch
      - JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch
      - JG975A HP 5130-24G-4SFP+ EI Brazil Switch
      - JG976A HP 5130-48G-4SFP+ EI Brazil Switch
      - JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch
      - JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **6125XLG - Version: R2432P01**
    * HP Network Products
      - 711307-B21 HP 6125XLG Blade Switch
      - 737230-B21 HP 6125XLG Blade Switch with TAA
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **6127XLG - Version: R2432P01**
    * HP Network Products
      - 787635-B21 HP 6127XLG Blade Switch Opt Kit
      - 787635-B22 HP 6127XLG Blade Switch with TAA
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **Moonshot - Version: R2432P01**
    * HP Network Products
      - 786617-B21 - HP Moonshot-45Gc Switch Module
      - 704654-B21 - HP Moonshot-45XGc Switch Module
      - 786619-B21 - HP Moonshot-180XGc Switch Module
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **5700 (Comware 7) - Version: R2432P01**
    * HP Network Products
      - JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch
      - JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch
      - JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch
      - JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch
      - JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch
      - JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **5930 (Comware 7) - Version: R2432P01**
    * HP Network Products
      - JG726A HP FlexFabric 5930 32QSFP+ Switch
      - JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch
      - JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch
      - JH179A HP FlexFabric 5930 4-slot Switch
      - JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch
      - JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **1950 (Comware 7) - Version: R3113P02**
    * HP Network Products
      - JG960A HP 1950-24G-4XG Switch
      - JG961A HP 1950-48G-2SFP+-2XGT Switch
      - JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch
      - JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **7500 (Comware 7) - Version: R7183**
    * HP Network Products
      - JD238C HP 7510 Switch Chassis
      - JD239C HP 7506 Switch Chassis
      - JD240C HP 7503 Switch Chassis
      - JD242C HP 7502 Switch Chassis
      - JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only Main Processing Unit
      - JH208A HP 7502 Main Processing Unit
      - JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port 40GbE QSFP+ Main Processing Unit
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **5130HI (Comware 7) - Version: R1120P07**
    * HP Network Products
      - JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch
      - JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch
      - JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch
      - JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842
  + **5510HI (Comware 7) - Version: R1120P07**
    * HP Network Products
      - JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch
      - JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch
      - JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch
      - JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch
      - JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch
    * CVEs
      - CVE-2016-0702
      - CVE-2016-0705
      - CVE-2016-0797
      - CVE-2016-0798
      - CVE-2016-0799
      - CVE-2016-2842

**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 2 May 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-alert@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJZCKAaAAoJELXhAxt7SZaiFpcIALfg+2ORWm0E3RAakylK1Erf
+PhfT5uFtYuBWrWSoKvXsZfnX91LHnbz94PuyIbWGGG7QggYszhoKIouwSTtwray
dh1bJARLHAco+PXb2Vbp8DPhMZZqkkQTyaJ4P9PAQrs4QVB/OxsPlUV24Ycrddak
f6oCV9KDRAAd/ELFfCyAKMmxgmHJmtRsQ0f3PGmspVWg4zl/KjECzQk/+2w3j73W
anM4bD5CVJByY0gdESRl4yqtsu4pKt7fAaN+tF5bHkaSzVCIRnyGZsYenjqLJ1c+
t3O/cX7gRHS07RnErLk7kZoojO0pXBeUT+v3u2qxtCPMpaaRFXTGvCYlos75SGo=
=j+Vo
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWQp/14x+lLeg9Ub1AQh97RAAgmtM8SYoOPxMnzDJ3d3UYD0F7Amacpam
ZNGzbvhx+VPTA72mccXoRNlRaV1ATwxTf26qxkq4EDRVxd+LYbSKcSILNcCYKuvl
wOqcJ0DaOpFTYiIP+b1hp3FJUAFmOyT7GwRHxnDFUfVJ6N5Zw5AAsL0JuFAJOhNx
XXFrrszUKz5n9WMLVbWp6stfgy6P054fKBWTIXIxaSxx6Eh+QT5kSnOmudBOlsic
dVrjJA92yvFeTcY57kXmc9HDDzGtrpumZ0gihHvNLvRHmIySzytYfarXJ7PER+ei
1FIeMoWujMeypOJeyATFTUsteULC7GO4OgZjjj/zNWuBbxr8S64Lpw0kxz0lBnLQ
iKrGWeu0CbFINM5vWuPF6e2O3mQaZAzR6NEKaPM8b3b4DEklkc+PMs8U7q5fdNtV
ijdmRZvix5SL2S8TOIoaKOXrmwAe9vney3y1miITT+BfVetbtI/anCLxwcpWT5lM
zm4voB70j1XybP9O1o7JiSSc/q69kGZVP5DXiAqbQ/ofAvrjnNfAAd4jMDyp6xU5
gHam3weIaDs9iMKSELr8vDm6R38mH0IxCrq1H0y5HFZMV1GHoANkBHOFwIfY+P3E
dkRBBWBtaBFJgKsVwhPtnCtJNgUkdwwN0c5uvierFulce7ls23nMz1KGqZjKXadP
hOxkFKZCuXo=
=IjD4
-----END PGP SIGNATURE-----