Date: 16 July 1997
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-97.085 -- Hewlett-Packard Security Bulletin #00064
Security Vulnerability in swinstall command
16 July 1997
===========================================================================
Hewlett Packard has released the following advisory concerning a security
vulnerability in the swinstall command. This vulnerability may allow
local users to gain root access.
The following security bulletin is provided as a service to AUSCERT's
members. As AUSCERT did not write this document, AUSCERT has had no
control over its content. As such, the decision to use any or all of this
information is the responsibility of each user or organisation, and should
be done so in accordance with site policies and procedures.
Contact information for Hewlett Packard is included in the Security Bulletin
below. If you have any questions or need further information, please
contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/information/advisories.html
If you believe that your system has been compromised, contact AUSCERT or your
representative in FIRST (Forum of Incident Response and Security Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 4477
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AUSCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -------------------------------------------------------------------------
HEWLETT-PACKARD SECURITY BULLETIN: #00064, 15 July 97
- -------------------------------------------------------------------------
The information in the following Security Bulletin should be acted upon
as soon as possible. Hewlett Packard will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Bulletin as soon as possible.
- -------------------------------------------------------------------------
PROBLEM: Security Vulnerability in swinstall command
PLATFORM: HP 9000 Series 700/800s running HP-UX releases 9.X and 10.X
DAMAGE: Allows local users unauthorized root access.
SOLUTION: Apply the following patches as needed:
PHCO_10652 for HP-UX release 10.00 and 10.01,
PHCO_10028 for HP-UX release 10.10,
PHCO_11004 for HP-UX release 10.20,
PHCO_11185 for HP-UX release 10.16,
PHCO_11183 for HP-UX release 10.24.
For SD OV (released on 9.X) PHCO_11162 9.0[04]
PHCO_11161 9.0[1357]
AVAILABILITY: All patches are available now.
- -------------------------------------------------------------------------
I.
A. Background
Hewlett-Packard Company has learned of a defect in the Software
Distributor (SD) product, as documented in CERT Advisory CA-96.27.
The patches mentioned herein remove the need for the workaround
published in that advisory.
B. Fixing the problem
Before continuing the use of SD, the system administrator needs to
obtain and apply the patches mentioned above.
C. Recommended solution
The patch is a cumulative libc patch and and fully fixes a
vulnerability discovered in the utility.
D. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP SupportLine Digest service via electronic
mail, do the following:
1) From your Web browser, access the URL:
http://us-support.external.hp.com
(for US,Canada, Asia-Pacific, and Latin-America)
http://europe-support.external.hp.com (for Europe)
2) On the HP Electronic Support Center main screen, select
the hyperlink "Support Information Digests".
3) On the "Welcome to HP's Support Information Digests" screen,
under the heading "Register Now", select the appropriate
hyperlink "Americas and Asia-Pacific", or "Europe".
4) On the "New User Registration" screen, fill in the fields for
the User Information and Password and then select the button
labeled "Submit New User".
5) On the "User ID Assigned" screen, select the hyperlink
"Support Information Digests".
** Note what your assigned user ID and password are for
future reference.
6) You should now be on the "HP Support Information Digests Main"
screen. You might want to verify that your email address is
correct as displayed on the screen. From this screen, you may
also view/subscribe to the digests, including the security
bulletins digest.
To get a patch matrix of current HP-UX and BLS security patches
referenced by either Security Bulletin or Platform/OS, click on
following screens in order:
Technical Knowledge Database
Browse Security Bulletins
Security Bulletins Archive
HP-UX Security Patch Matrix
E. To report new security vulnerabilities, send email to
security-alert@hp.com
Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.
Permission is granted for copying and circulating this Bulletin to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Bulletin is
not edited or changed in any way, is attributed to HP, and provided
such reproduction and/or distribution is performed for non-commercial
purposes.
Any other use of this information is prohibited. HP is not liable
for any misuse of this information by any third party.
_______________________________________________________________________
- -----End of Document ID: HPSBUX9707-064--------------------------------------
- --------------------------END INCLUDED TEXT--------------------
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
iQCVAwUBM8ymVih9+71yA2DNAQEXPgQAmJUHjaz1X+at2ORv4NEJ63ylPZKnGVx/
mlS13HIhm6u51Tu+den8EVwnTZpcKN9JCSvPDvLpZngRepUwsXJ6EzP1rU4jEFyd
l6EYvMvMQjvxS6t0hgBBmqK47WOoCTNFkgXYT124ISI8JTsOwsuHkPH13ker7IoX
Wdc1Yk6yUHE=
=4jUf
-----END PGP SIGNATURE-----
|