![]() |
|
ESB-2000.392 -- HP Support Information Digests HPSBUX0012-133 -- Sec. Vulnerability in ContinentalClusters |
|
Date: 08 December 2000 Original URL: http://www.auscert.org.au/render.html?cid=1&it=1098 References: ESB-2000.381 Click here for PGP verifiable version -----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2000.392 -- HP Support Information Digests HPSBUX0012-133
Sec. Vulnerability in ContinentalClusters
8 December 2000
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: ContinentalClusters
Vendor: Hewlett-Packard
Operating System: HP-UX 11.00, 11.11
Platform: HP9000 Series 800
Impact: Increased Privileges
Access Required: Remote
Ref: ESB-2000.381
- --------------------------BEGIN INCLUDED TEXT--------------------
Document ID: HPSBUX0012-133
Date Loaded: 20001206
Title: Sec. Vulnerability in ContinentalClusters
- ----------------------------------------------------------------------
HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #0133, 07 Dec '00
- ----------------------------------------------------------------------
The information in the following Security Bulletin should be
acted upon as soon as possible. Hewlett-Packard Company will
not be liable for any consequences to any customer resulting
from customer's failure to fully implement instructions in
this Security Bulletin as soon as possible.
- ----------------------------------------------------------------------
ISSUE: ContinentalClusters includes the Java Runtime Environment
(JRE) which is affected by the security issue described
in Hewlett-Packard Company Security Bulletin #0132,
30 Nov. '00, ITRC Technical Knowledge base Document ID
HPSBUX0011-132.
PLATFORM: HP9000 Series 800 running ContinentalClusters all
releases A.01.0X, and A.02.00 on HP-UX release 11.00
and 11.11.
POSSIBLE RESULT: Improper access rights may be granted in some cases.
SOLUTION: Upgrade to ContinentalClusters version A.02.00, and
for HP-UX Release 11.00: PHSS_22678,
for HP-UX Release 11.11: PHSS_22678.
AVAILABILITY: The patch is available immediately.
- -----------------------------------------------------------------------
I.
A. Background
Please reference the Hewlett-Packard Company Security Bulletin
#0132, issued on 30 NOV '00, Document ID HPSBUX0011-132 for
complete background information.
B. Fixing the problem
ContinentalClusters bundles the Java Runtime Environment (JRE),
therefore a patch is required to address the problem therein.
To identify if you already have the patch, run the following
command on each affected machine.
/usr/sbin/swlist -l product PH* | grep PHSS_22678
If the patch has been installed, you will see it listed in the
output of this command. If you do not have the patch, contact
ITRC to obtain it (see below).
C. Recommended solution
If you have ContinentalClusters version A.02.00, apply patch
PHSS_22678 on each affected machine.
If you have any ContinentalClusters version A.01.0X, upgrade to
version A.02.00 and then apply patch PHSS_22678 on each
affected machine.
D. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP IT Resource Center via electronic mail,
do the following:
Use your browser to get to the HP IT Resource Center page
at:
http://itrc.hp.com
Under the Maintenance and Support Menu (Electronic Support
Center): click on the "more..." link. Then -
Use the 'Login' tab at the left side of the screen to login
using your ID and password. Check with your system
administrator to see if you have an existing login or use
the "Register" button at the left to create a login. You
will need to login in order to gain access to many areas of
the ITRC. Remember to save the User ID assigned to you, and
your password.
Under the Maintenance and Support Menu, click on the "more..."
link. Under the "Notifications" section (near the bottom of
the page), select "Support Information Digests".
To -subscribe- to future HP Security Bulletins or other
Technical Digests, click the check box (in the left column)
for the appropriate digest and then click the "Update
Subscriptions" button at the bottom of the page.
or
To -review- bulletins already released, select the link
(in the middle column) for the appropriate digest.
To -gain access- to the Security Patch Matrix, select
the link for "hp security bulletins archive" near the bottom.
Once in the archive the top link is to our current Security
Patch Matrix. Updated daily, this matrix categorizes security
patches by platform/OS release, and by bulletin topic.
The security patch matrix is also available via anonymous ftp:
ftp.itrc.hp.com
~ftp/export/patches/hp-ux_patch_matrix"
On the "Support Information Digest Main" page:
click on the "HP Security Bulletin Archive".
E. To report new security vulnerabilities, send email to
security-alert@hp.com
Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.
Permission is granted for copying and circulating this Bulletin
to Hewlett-Packard (HP) customers (or the Internet community)
for the purpose of alerting them to problems, if and only if,
the Bulletin is not edited or changed in any way, is attributed
to HP, and provided such reproduction and/or distribution is
performed for non-commercial purposes.
Any other use of this information is prohibited. HP is not
liable for any misuse of this information by any third party.
________________________________________________________________________
- -----End of Document ID: HPSBUX0012-133--------------------------------------
- --------------------------END INCLUDED TEXT--------------------
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/Information/advisories.html
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
iQCVAwUBOlSNbCh9+71yA2DNAQG8XQP/bWoiJ1hdZdXVDgOvQo1Gf8OyvIIXWLHA
naeYJHlepAB6yqYN0kEfluwuqt46nZ4BJAhzaqS2zKyB1kZYdzyGK7cqQJMCp2mX
EVN3gsjzD6MiHleA5F4HPttW3ziEd1S82pXTMURpCpMjLuZWpPZ5Ktd5VrvApLYq
648BQ1y1E/o=
=pWF1
-----END PGP SIGNATURE-----
|