![]() |
|
ESB-2013.0586 - [Win] HP Managed Printing Administration (MPA): Cross-site scripting - Remote with user interaction |
|
Date: 26 April 2013 Original URL: http://www.auscert.org.au/render.html?cid=1980&it=17434 Click here for PGP verifiable version -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2013.0586
SSRT101017 rev.1 - HP Managed Printing Administration (MPA),
Remote Cross Site Scripting (XSS)
26 April 2013
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: HP Managed Printing Administration (MPA)
Publisher: Hewlett-Packard
Operating System: Windows
Impact/Access: Cross-site Scripting -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2012-5219
Original Bulletin:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03570121
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03737200
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03737200
Version: 1
HPSBPI02868 SSRT101017 rev.1 - HP Managed Printing Administration (MPA),
Remote Cross Site Scripting (XSS)
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2013-04-25
Last Updated: 2013-04-25
Potential Security Impact: Remote cross site scripting (XSS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP Managed
Printing Administration (MPA). The vulnerability could be exploited remotely
resulting in cross site scripting (XSS).
References: CVE-2012-5219 (ZDI-CAN-1668)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Managed Printing Administration (MPA) before v2.7.0
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2012-5219 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Andrea Micalizzi aka rgod along with
TippingPoint's Zero Day Initiative for reporting these vulnerabilities to
security-alert@hp.com.
RESOLUTION
HP has made HP Managed Printing Administration (MPA) v2.7.0 or subsequent
available to resolve the vulnerabilities.
HP Managed Printing Administration can be downloaded as follows.
Browse to http://www.hp.com/go/upd then
Click "Download software"
Select a print driver
Verify your language
Select an operating system
- - From the table that lists the HP Printer Administrators Resource Kit , click
the Download button
Unzip the downloaded package
Double click the HP PARK directory
Double click the managed print administrator folder to view the HPMPAInstall
executable
Run the NPMPAInstall executable
HISTORY
Version:1 (rev.1) - 25 April 2013 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated
periodically, is contained in HP Security Notice HPSN-2011-001:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2013 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits;damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
iEYEARECAAYFAlF5grgACgkQ4B86/C0qfVmDGgCgh++EVo/8bJTDViUoFe+/8IL7
l+kAoI19Ex92HBAfGx1SNcL1jBWwwPjK
=81Lk
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=/iUx
-----END PGP SIGNATURE-----
|