-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2017.1482.2
        HPESBHF03760 rev.1 - HPE Network Products including Comware
             7 running NTP, Remote Unauthorized Data Injection
                               14 June 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           HPE Network Products
Publisher:         Hewlett-Packard
Operating System:  Network Appliance
Impact/Access:     Provide Misleading Information -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-0036  

Reference:         ASB-2015.0070
                   ESB-2012.0622
                   ESB-2012.0458
                   ESB-2012.0097.2

Original Bulletin: 
   https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03760en_us

Revision History:  June 14 2017: Updated OS
                   June 14 2017: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03760en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03760en_us
Version: 1

HPESBHF03760 rev.1 - HPE Network Products including Comware 7 running NTP,
Remote Unauthorized Data Injection

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-06-13
Last Updated: 2017-06-13

Potential Security Impact: Remote: Unauthorized Data Injection

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability with NTP has been addressed for HPE
network products including Comware 7. The vulnerability could be remotely
exploited resulting in unauthorized data injection.

References:

  - CVE-2012-0036

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware v7 (CW7) Products All versions - Please refer to the RESOLUTION
below for a list of updated products. 

BACKGROUND

  CVSS Base Metrics
  =================
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

    CVE-2012-0036
      7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
      7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

    Information on CVSS is documented in
    HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates available to resolve the
vulnerability in Comware 7 products running NTP. 

**COMWARE 7 Products**

  + 12500 (Comware 7) - Version: R7377P02
    * HPE Branded Products Impacted
      - JC072B HP 12500 Main Processing Unit
      - JC085A HP A12518 Switch Chassis
      - JC086A HP A12508 Switch Chassis
      - JC652A HP 12508 DC Switch Chassis
      - JC653A HP 12518 DC Switch Chassis
      - JC654A HP 12504 AC Switch Chassis
      - JC655A HP 12504 DC Switch Chassis
      - JF430A HP A12518 Switch Chassis
      - JF430B HP 12518 Switch Chassis
      - JF430C HP 12518 AC Switch Chassis
      - JF431A HP A12508 Switch Chassis
      - JF431B HP 12508 Switch Chassis
      - JF431C HP 12508 AC Switch Chassis
      - JG497A HP 12500 MPU w/Comware V7 OS
      - JG782A HP FF 12508E AC Switch Chassis
      - JG783A HP FF 12508E DC Switch Chassis
      - JG784A HP FF 12518E AC Switch Chassis
      - JG785A HP FF 12518E DC Switch Chassis
      - JG802A HP FF 12500E MPU
  + 10500 (Comware 7) - Version: R7184
    * HPE Branded Products Impacted
      - JC611A HP 10508-V Switch Chassis
      - JC612A HP 10508 Switch Chassis
      - JC613A HP 10504 Switch Chassis
      - JC748A HP 10512 Switch Chassis
      - JG608A HP FlexFabric 11908-V Switch Chassis
      - JG609A HP FlexFabric 11900 Main Processing Unit
      - JG820A HP 10504 TAA Switch Chassis
      - JG821A HP 10508 TAA Switch Chassis
      - JG822A HP 10508-V TAA Switch Chassis
      - JG823A HP 10512 TAA Switch Chassis
      - JG496A HP 10500 Type A MPU w/Comware v7 OS
      - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating
System
      - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System
Main Processing Unit
  + 5900/5920 (Comware 7) - Version: R2432
    * HPE Branded Products Impacted
      - JC772A HP 5900AF-48XG-4QSFP+ Switch
      - JG296A HP 5920AF-24XG Switch
      - JG336A HP 5900AF-48XGT-4QSFP+ Switch
      - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
      - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
      - JG555A HP 5920AF-24XG TAA Switch
      - JG838A HP FF 5900CP-48XG-4QSFP+ Switch
      - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
      - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
      - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
  + MSR1000 (Comware 7) - Version: R0306P80
    * HPE Branded Products Impacted
      - JG875A HP MSR1002-4 AC Router
      - JH060A HP MSR1003-8S AC Router
  + MSR2000 (Comware 7) - Version: R0306P80
    * HPE Branded Products Impacted
      - JG411A HP MSR2003 AC Router
      - JG734A HP MSR2004-24 AC Router
      - JG735A HP MSR2004-48 Router
      - JG866A HP MSR2003 TAA-compliant AC Router
  + MSR3000 (Comware 7) - Version: R0306P80
    * HPE Branded Products Impacted
      - JG404A HP MSR3064 Router
      - JG405A HP MSR3044 Router
      - JG406A HP MSR3024 AC Router
      - JG407A HP MSR3024 DC Router
      - JG408A HP MSR3024 PoE Router
      - JG409A HP MSR3012 AC Router
      - JG410A HP MSR3012 DC Router
      - JG861A HP MSR3024 TAA-compliant AC Router
  + MSR4000 (Comware 7) - Version: R0306P80
    * HPE Branded Products Impacted
      - JG402A HP MSR4080 Router Chassis
      - JG403A HP MSR4060 Router Chassis
      - JG412A HP MSR4000 MPU-100 Main Processing Unit
      - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit
  + VSR (Comware 7) - Version: E0324
    * HPE Branded Products Impacted
      - JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation
Software
      - JG811AAE HP VSR1001 Comware 7 Virtual Services Router
      - JG812AAE HP VSR1004 Comware 7 Virtual Services Router
      - JG813AAE HP VSR1008 Comware 7 Virtual Services Router
  + 7900 (Comware 7) - Version: R2152
    * HPE Branded Products Impacted
      - JG682A HP FlexFabric 7904 Switch Chassis
      - JG841A HP FlexFabric 7910 Switch Chassis
      - JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit
      - JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit
      - JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis
      - JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis
      - JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main
Processing Unit
      - JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main
Processing Unit
  + 5130EI (Comware 7) - Version: R3115P03
    * HPE Branded Products Impacted
      - JG932A HP 5130-24G-4SFP+ EI Switch
      - JG933A HP 5130-24G-SFP-4SFP+ EI Switch
      - JG934A HP 5130-48G-4SFP+ EI Switch
      - JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch
      - JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch
      - JG938A HP 5130-24G-2SFP+-2XGT EI Switch
      - JG939A HP 5130-48G-2SFP+-2XGT EI Switch
      - JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch
      - JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch
      - JG975A HP 5130-24G-4SFP+ EI Brazil Switch
      - JG976A HP 5130-48G-4SFP+ EI Brazil Switch
      - JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch
      - JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch
  + 6125XLG - Version: R2432
    * HPE Branded Products Impacted
      - 711307-B21 HP 6125XLG Blade Switch
      - 737230-B21 HP 6125XLG Blade Switch with TAA
  + 6127XLG - Version: R2432
    * HPE Branded Products Impacted
      - 787635-B21 HP 6127XLG Blade Switch Opt Kit
      - 787635-B22 HP 6127XLG Blade Switch with TAA
  + Moonshot - Version: R2432
    * HPE Branded Products Impacted
      - 786617-B21 - HP Moonshot-45Gc Switch Module
      - 704654-B21 - HP Moonshot-45XGc Switch Module
      - 786619-B21 - HP Moonshot-180XGc Switch Module
  + 5700 (Comware 7) - Version: R2432
    * HPE Branded Products Impacted
      - JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch
      - JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch
      - JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch
      - JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch
      - JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch
      - JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch
  + 5930 (Comware 7) - Version: R2432
    * HPE Branded Products Impacted
      - JG726A HP FlexFabric 5930 32QSFP+ Switch
      - JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch
      - JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch
      - JH179A HP FlexFabric 5930 4-slot Switch
      - JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch
      - JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch
  + 1950 (Comware 7) - Version: R3115P03
    * HPE Branded Products Impacted
      - JG960A HP 1950-24G-4XG Switch
      - JG961A HP 1950-48G-2SFP+-2XGT Switch
      - JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch
      - JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch
  + 7500 (Comware 7) - Version: R7184
    * HPE Branded Products Impacted
      - JD238C HP 7510 Switch Chassis
      - JD239C HP 7506 Switch Chassis
      - JD240C HP 7503 Switch Chassis
      - JD242C HP 7502 Switch Chassis
      - JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only
Main Processing Unit
      - JH208A HP 7502 Main Processing Unit
      - JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port
40GbE QSFP+ Main Processing Unit
  + 5510HI (Comware 7) - Version: R1121
    * HPE Branded Products Impacted
      - JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch
      - JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch
      - JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch
      - JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch
      - JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch
  + 5130HI (Comware 7) - Version: R1121
    * HPE Branded Products Impacted
      - JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch
      - JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch
      - JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch
      - JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch

**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 13 June 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-alert@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJZQATPAAoJELXhAxt7SZai/lYIAKEmtZQwh9YZI2lj6e08cDrJ
zitnTpOJJzu3xCxDxcvRappsCvl5q4CoySj9LP/FQfFACesq+u75J8DkEuQYgagO
ukXbzZw5XHiQIvzgHWlB8E4ypEYebSGFiepFdZMCMgpELEaNs3WPR4XG2Vc1aNdT
PX4SLex9VOBqfaaAGeYXjex5OASREUjtySGVngd2XwSrneyVWmRJiSzC9lhXw5NK
h0qJT387JfcYjdN+LgGT1diY0RO503rNzepNwCfGe100uHLZ8j88KqhG7S14DMMq
qrzzJNoil/xbVzqByF+H/XMtfNeoE+ellsJM1p4d7FPIrcnZG44yqoSe+AEQZZU=
=8Mrc
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=YwM8
-----END PGP SIGNATURE-----