Date: 17 January 2003
References: ESB-2003.0018
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2003.0029 -- HEWLETT-PACKARD SECURITY BULLETIN: HPSBUX0301-236
(rev.1)
MANUAL ACTIONS fields corrected for various bulletins
17 January 2003
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Hewlett-Packard Security Bulletins
Vendor: Hewlett-Packard
Impact: Provide Misleading Information
Ref: ESB-2003.0018
- --------------------------BEGIN INCLUDED TEXT--------------------
Document ID: HPSBUX0301-236
Date Loaded: 20030109
Title: MANUAL ACTIONS fields corrected (rev.1)
-----------------------------------------------------------------
**REVISED 01**
Source: HEWLETT-PACKARD COMPANY
SECURITY BULLETIN: HPSBUX0301-236
Originally issued: 10 January 2003
Last revision: 16 January 2003
MANUAL ACTIONS fields corrected
-----------------------------------------------------------------
NOTICE: There are no restrictions for distribution of this Bulletin
provided that it remains complete and intact.
The information in the following Security Bulletin should be
acted upon as soon as possible. Hewlett-Packard Company will
not be liable for any consequences to any customer resulting
from customer's failure to fully implement instructions in this
Security Bulletin as soon as possible.
------------------------------------------------------------------
PROBLEM: Some security bulletins had incorrect or incomplete
MANUAL ACTIONS fields.
IMPACT: Determining the correct actions was inconvenient.
PLATFORM: All
SOLUTION: The MANUAL ACTIONS fields have been corrected.
MANUAL ACTIONS: Yes - NonUpdate
If bulletins are maintained locally, optionally
download new copies. Only bulletins with incorrect
MANUAL ACTIONS fields will be mailed out.
Bulletins which were revised to add a missing
MANUAL ACTIONS field or to correct the format of
the MANUAL ACTIONS field will not be mailed out for
this revision.
AVAILABILITY: The corrected bulletins are available now.
CHANGE SUMMARY: Revision 01 - correct version number for
HPSBUX0206-195 -
should be A.03.10.002
------------------------------------------------------------------
A. Background
The format of the MANUAL ACTIONS line has been standardized.
MANUAL ACTIONS: No
The bulletin can be completely implemented by installing
a standard patch (for example, PHxx_12345).
MANUAL ACTIONS: Non-HP-UX only
The same as "MANUAL ACTIONS: No" for HP-UX, but the bulletin
applies to other operating systems for which a manual
action is required.
MANUAL ACTIONS: Yes - Update
The product must be updated rather than patched.
MANUAL ACTIONS: Yes - Update plus other actions
The product must be updated rather than patched.
Other actions in addition to updating are required.
MANUAL ACTIONS: Yes - NonUpdate
Some action is required instead of or in addition to
installing an update or a patch.
For bulletins with "MANUAL ACTIONS: No" the Security Patch Check
Tool is able to determine whether the bulletin has been implemented
on a system running HP-UX 11.X. For 10.X, if the bulletin says
"MANUAL ACTIONS: No" and a patch listed in the Security Patch Matrix
(or a superseding patch) has been installed, the bulletin has been
implemented.
The following security bulletins were updated to conform with the
MANUAL ACTIONS format above. The revised bulletins are listed
in three sections:
I. Incorrect MANUAL ACTIONS
II. Missing or mis-formatted "MANUAL ACTIONS - Yes"
or "MANUAL ACTIONS - Non-HP-UX only".
III. Missing or mis-formatted "MANUAL ACTIONS - Non-HP-UX only"
IV. Missing or mis-formatted "MANUAL ACTIONS - No"
======================================================
I. Incorrect MANUAL ACTIONS
======================================================
The MANUAL ACTIONS section in each of the following
bulletins was incorrect or misleading. These bulletins
have been revised and sent to the e-mail distribution.
=========================================
HPSBUX0110-172 Sec. Vulnerability in telnetd
PLATFORM: HP9000 Servers running HP-UX releases 10.X only.
MANUAL ACTIONS: No
=========================================
HPSBUX0201-180 Sec. Vulnerability with WU-FTPD 2.6
PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.0 and 11.11.
MANUAL ACTIONS: Yes - Update
Upgrade WU-FTPD to version 2.6 (rev b01.002).
=========================================
HPSBUX0203-187 Sec. Vulnerability in JRE Bytecode Verifier
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20 and
11.x only. This security bulletin applies to Java
on HP-UX. It does not cover software shipped on Linux
or Windows/NT.
MANUAL ACTIONS: Yes - Update
JDK and JRE 1.1.8.06 or higher for HP-UX 10.20.
JDK and JRE 1.1.8.06 or higher for HP-UX 11.x
JDK and JRE 1.2.2.12 or higher for HP-UX 11.x.
JDK and JRE 1.3.1.00 or higher for HP-UX 11.x
=========================================
HPSBUX0203-188 Sec. Vulnerability in JAVA Web Start
PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.x only.
This security bulletin applies to Java Web Start on HP-UX.
It does not cover software shipped on Linux or Windows/NT.
MANUAL ACTIONS: Yes - Update
Web Start 1.0.1.01 or higher for HP-UX 11.x.
=========================================
HPSBUX0207-205 RFC 1948 ISN randomization is now available.
PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.00,
11.04 and 11.11.
MANUAL ACTIONS: Yes - NonUpdate
Install patch and enable randomization.
=========================================
======================================================
II. Missing or mis-formatted "MANUAL ACTIONS - Yes"
======================================================
The MANUAL ACTIONS section in each of the following bulletins
was either missing or was not in the new format. These
bulletins will not be sent to the e-mail distribution.
=========================================
HPSBUX9402-004 Promiscuous mode network interfaces
PLATFORM: HP 9000 Series 300, 400, 700, 800 running HP-UX
Apollo Token Ring (HP-UX 8.X, 9.X; s700 only)
STREAMS-DLPI (HP-UX 9.X)
MANUAL ACTIONS: Yes - NonUpdate
Prevent users from gaining root access.
=========================================
HPSBUX9404-007 HP-UX does not have ftpd SITE EXEC vulnerability
PLATFORM: All HP-UX systems
MANUAL ACTIONS: Yes - NonUpdate
Advisory only.
=========================================
HPSBUX9405-010 ftpd: SITE CHMOD / race condition vulnerability
PLATFORM: All HP-UX systems
MANUAL ACTIONS: Yes - NonUpdate
Advisory only.
=========================================
HPSBUX9405-011 Security Vulnerability in HP GlancePlus
PLATFORM: HP 9000 series 300/400s and 700/800s.
MANUAL ACTIONS: Yes - Update
=========================================
HPSBUX9405-012 Security vulnerability in Multimedia Sharedprint
PLATFORM: HP 9000 series 700 at HP-UX revision 9.X, only
MANUAL ACTIONS: Yes - NonUpdate
Change file permissions.
=========================================
HPSBUX9406-014 Patch file permissions vulnerability
PLATFORM: s300/s400/s700/s800 all revisions of hp-ux
MANUAL ACTIONS: Yes - NonUpdate
Run the fix_patch_perms script (below).
=========================================
HPSBUX9408-016 Patch sums and the MD5 program
PLATFORM: All HP-UX systems.
MANUAL ACTIONS: Yes - NonUpdate
Advisory only.
=========================================
HPSBUX9502-021 No current vulnerability in /bin/mail (or /bin/rmail)
PLATFORM: All HP-UX systems
MANUAL ACTIONS: Yes - NonUpdate
Advisory only.
=========================================
HPSBUX9504-026 Preparing Your HP-UX System for SATAN
PLATFORM: All HP-UX systems
MANUAL ACTIONS: Yes - NonUpdate
Implement procedure discussed below before
running SATAN.
=========================================
HPSBUX9511-028 Security Vulnerability in FTP
PLATFORM: HP 9000 series 300/400s and 700/800s
MANUAL ACTIONS: Yes - Update
Update to 9.x or 10.x, then apply the
appropriate patches.
=========================================
HPSBUX9602-030 Security Vulnerability DCE Sec. Service session key gen'rtn
PLATFORM: HP 9000/700 and 9000/800 systems running HP DCE/9000 and
configured into DCE cells
MANUAL ACTIONS: Yes - NonUpdate
Apply patches and change all keys
(details below)
=========================================
HPSBUX9607-033 Security Vulnerability in expreserve
PLATFORM: HP 9000 series 300/400s and 700/800s
MANUAL ACTIONS: Yes - NonUpdate
Apply patches (9.X, 10.X) or take documented
actions for releases of HP-UX prior to 9.X.
=========================================
HPSBUX9607-034 Security Vulnerability in SAM remote admin
PLATFORM: HP 9000/300/400/700 and 800 systems running any currently
supported version of HP-UX 9.X and 10.X.
MANUAL ACTIONS: Yes - NonUpdate
Implement workaround below.
=========================================
HPSBUX9607-035 Security Vulnerability in nettune executable
PLATFORM: HP 9000/700 and 9000/800 systems running operating system
version 10.0 or 10.01 of HP-UX.
MANUAL ACTIONS: Yes - NonUpdate
Change permissions and ownership of
/usr/contrib/bin/nettune.
=========================================
HPSBUX9610-039 Security Vulnerabilities in HP Remote Watch
PLATFORM: HP 9000 series 300/400/700/800s
MANUAL ACTIONS: Yes - NonUpdate
Do not use Remote Watch.
=========================================
HPSBUX9611-041 Vulnerability with Large UID's and GID's in HP-UX 10.20
PLATFORM: HP 9000 series 700/800 systems running version 10.20
MANUAL ACTIONS: Yes - NonUpdate
Apply patches and examine suid files.
=========================================
HPSBUX9612-042 Security Vulnerability in fpkg2swpkg in HP-UX 10.XX
PLATFORM: HP 9000 Series 700 and 800s
MANUAL ACTIONS: Yes - NonUpdate
Remove suid bit from /usr/sbin/fpkg2swpkg.
=========================================
HPSBUX9701-054 Recent sendmail patches for HP-UX releases 9.X thru 10.10
PLATFORM: HP 9000 Series 700/800s running versions of HP-UX 9.X thru 10.10
MANUAL ACTIONS: Yes - NonUpdate
Clean up password file.
=========================================
HPSBUX9704-058 Security Vulnerability in libXt for HP-UX 9.X + 10.X
PLATFORM: HP 9000 series 700/800 systems running version 9.X or 10.X
MANUAL ACTIONS: Yes - NonUpdate
Apply the patches listed below and relink any
suid/sgid programs that use libXt.a.
=========================================
HPSBUX9704-060 SYN Flooding Security Vulnerability in HP-UX
PLATFORM: HP 9000 Series 700/800s running versions of HP-UX 9.X and 10.X
MANUAL ACTIONS: Yes - NonUpdate
Apply the appropriate patch and enable/tune
the defense mechanism.
=========================================
HPSBUX9707-065 Security Advisory in Netscape shipped with HP-UX
PLATFORM: All platforms running Netscape Navigator 2.0, 3.0, and
Communicator 4.0.
MANUAL ACTIONS: Yes - NonUpdate
Apply the workaround described below.
=========================================
HPSBUX9707-068 Security Vulnerability in Novell Netware 3.12 on HP-UX
PLATFORM: HP 9000 Series 700/800s running only specific releases of HP-UX
9.X and 10.X. See below.
MANUAL ACTIONS: Yes - Update
=========================================
HPSBUX9709-069 Security Advisory in vuefile, vuepad, et. al. in HP-UX
PLATFORM: HP9000 Series 700/800s running HP-UX releases 9.X and 10.X
MANUAL ACTIONS: Yes - NonUpdate
Do not run vuefile, vuepad, dtfile, or dtpad
while su'd to another account or with the
display set to another Xserver, unless the
same account is logged in at each Xserver.
=========================================
HPSBUX9710-072 Sec. Vulnerability in CDE on HP-UX 10.[10, 20, 24, 30]
PLATFORM: HP9000 series 700/800, HP-UX releases 10.10, 10.20, 10.24,
and 10.30.
MANUAL ACTIONS: Yes - NonUpdate
Install the patches and relink any programs
linked with archived CDE libraries.
=========================================
HPSBUX9801-074 Security Vulnerability in CUE under HP-UX
PLATFORM: HP9000 series 800, releases HP-UX 8.X, 9.X, 10.X, and 11.0
MANUAL ACTIONS: Yes - NonUpdate
Remove the cue program.
=========================================
HPSBUX9804-078 Security Vulnerability in Openmail on HP-UX
PLATFORM: Any HP 9000 series 700/800 systems running OpenMail.
MANUAL ACTIONS: Yes - NonUpdate
Reconfigure OpenMail per the OpenMail
Technical Guide.
=========================================
HPSBUX9807-080 Security Advisory with Netscape servers on HP-UX
PLATFORM: HP9000 Series 7/800 running HP-UX releases 10.X and 11.00
MANUAL ACTIONS: Yes - NonUpdate
Download patches for Netscape 3.X and earlier
from Netscape.
=========================================
HPSBUX9810-085 Security Vulnerability with HP OpenView Omniback II
PLATFORM: HP9000 series 7/800 running releases 9.X, 10.X, or 11.00
Other vendor platforms as noted below.
MANUAL ACTIONS: Yes - NonUpdate
Install patches and take other
actions described below.
=========================================
HPSBUX9904-097 Security Vulnerability in sendmail
PLATFORM: HP 9000 Series 700/800 Servers running HP-UX 10.20 and 11.00
MANUAL ACTIONS: Yes - Update
For HP-UX releases prior to 10.20, upgrade from
sendmail 5.65 to
sendmail release 8.8.6. See www.software.hp.com
For HP-UX release 10.20: PHNE_17135 ;
For HP-UX release 11.00: PHNE_17190.
=========================================
HPSBUX9907-100 CDE Leaves Current Directory in root PATH
PLATFORM: HP 9000 series 700/800 at HP-UX revision 10.X
MANUAL ACTIONS: Yes - NonUpdate
For 10.10, Modify /usr/dt/bin/Xsession
as shown below.
For 10.20, install PHSS_19482 or subsequent
For 10.24, install PHSS_19702 or subsequent
Note: No action is needed for 10.20 or 10.24
beyond installing the patch.
=========================================
HPSBUX9911-105 Security Vulnerability on V Class Teststation
PLATFORM: HP9000 Series 800 S/X/V Class servers.
MANUAL ACTIONS: Yes - Update
Install patch or update to Teststation
or Teststation Version 1.1.2
=========================================
HPSBUX0001-109 Security Vulnerability with Audio Security File
PLATFORM: HP9000 Series 7/800 running HP-UX releases 10.X and 11.X
MANUAL ACTIONS: Yes - NonUpdate
Apply the appropriate patch.
10.10,10.20 PHSS_24534 or subsequent.
11.00 PHSS_24608 or subsequent.
If /etc/opt/audio/audio.sec exists and
does not have 444 permissions,
chmod 444 /etc/opt/audio/audio.sec
=========================================
HPSBUX0001-110 Security Vulnerability with PMTU strategy
PLATFORM: HP-UX releases 10.30, 11.00 and 11.04 only.
MANUAL ACTIONS: Yes - NonUpdate
Set the NDD parameter ip_pmtu_strategy to 1.
=========================================
HPSBUX0002-111 Sec. Vulnerability with Ignite on Trusted systems
PLATFORM: HP-9000 Series700/800 running release HP-UX 11.X only.
MANUAL ACTIONS: Yes - NonUpdate
Verify that all entries in /etc/passwd have
"*" in the password field if the
system is trusted.
=========================================
HPSBUX0005-114 Sec. Vulnerability in BIND
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.XX and 11.XX.
MANUAL ACTIONS: Yes - Update
Install patches (below) which upgrade BIND
4.9.7 or upgrade to version 8.1.2.
=========================================
HPSBUX0010-126 Sec. Vulnerability in Praesidium Web Proxy 1.0
PLATFORM: VVOS release 10.24 and 11.04 running VirtualVault 4.0,
with HP Praesidium Proxy V1.0 only.
MANUAL ACTIONS: Yes - NonUpdate
Reconfigure web server as necessary.
=========================================
HPSBUX0011-131 Sec. Vulnerability in EMS
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20 and 11.00.
MANUAL ACTIONS: Yes - Update
Update to EMS A.03.20 release.
=========================================
HPSBUX0011-132 Sec. Vulnerability in JRE
PLATFORM: This security bulletin applies to Java on HP9000 Series
700/800 running HP-UX releases 10.20, 10.24, 11.00, 11.04,
and 11.11 only. It does not cover software shipped on
Linux nor on Windows/NT.
MANUAL ACTIONS: Yes - Update
Install the latest Java releases:
JDK and JRE 1.1.8.04 or higher for HP-UX 10.20,
10.24, 11.00, 11.04 and 11.11.
JDK and JRE 1.2.2.04 or higher for HP-UX 11.00,
11.04 and 11.11.
JDK and JRE 1.3.0.00 for HP-UX 11.XX
=========================================
HPSBUX0012-133 Sec. Vulnerability in ContinentalClusters
PLATFORM: HP9000 Series 800 running ContinentalClusters all
releases A.01.0X, and A.02.00 on HP-UX release 11.00
and 11.11.
MANUAL ACTIONS: Yes - Update plus other actions
Upgrade to ContinentalClusters version A.02.00
and apply patches.
=========================================
HPSBUX0102-141 Sec. Vulnerability in JRE
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20, 10.24, 11.00,
11.04, and 11.11 only. This security bulletin applies to Java
on HP-UX, and does not cover software shipped on Linux, nor on
Windows/NT.
MANUAL ACTIONS: Yes - Update
Install the latest Java releases:
JDK and JRE 1.1.8.05 or higher for HP-UX 10.20,
10.24 and 11.XX.
JDK and JRE 1.2.2.07 or higher for HP-UX 11.XX.
JDK and JRE 1.3.0.00 or higher for HP-UX 11.XX.
=========================================
HPSBUX0102-142 Sec. Vulnerability in OV OmniBack
PLATFORM: Windows NT 4.0, Windows 2000, and HP-UX Systems running
OmniBack Version 3.00 or later.
MANUAL ACTIONS: Yes - NonUpdate
Apply patches available at the OV website:
http://ovweb.external.hp.com/cpe/patches/
=========================================
HPSBUX0102-144 Sec. Vulnerability in BIND
PLATFORM: HP9000 servers and workstations running HP-UX releases
11.11, 11.00, 11.04, 10.20, 10.24, 10.10, and 10.01.
MANUAL ACTIONS: Yes - Update
For 11.00 (BIND 8.1.2): upgrade to BIND 8.1.3
For 11.11 (BIND 8.1.2): apply patch.
For Bind 4.9.7 apply patches.
=========================================
HPSBUX0103-145 Sec. Vulnerability in asecure
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.01,
10.10, 10.20, 10.26 and 11.00 only.
MANUAL ACTIONS: Yes - NonUpdate
Apply patches except for 10.01.
For 10.01:
/usr/bin/chmod 444 /var/opt/audio/asecure_log
/usr/bin/chmod 444 /var/opt/audio/audio_error_log
=========================================
HPSBUX0104-149 Sec. Vulnerability in pcltotiff
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.01,
10.10, 10.20, and 10.26.
MANUAL ACTIONS: Yes - NonUpdate
/sbin/chmod 555 /opt/sharedprint/bin/pcltotiff
/sbin/chmod o+r /usr/lib/X11/fonts/ifo.st/typefaces
=========================================
HPSBUX0106-155 Security Vulnerability in CIFS/9000
PLATFORM: HP 9000 servers running CIFS/9000 Server version A.01.06,
or lower.
MANUAL ACTIONS: Yes - Update plus other actions
Upgrade to CIFS/9000 Server A.01.06 and install
patch PHNE_24164 or
upgrade to CIFS/9000 Server A.01.07.
=========================================
HPSBUX0107-157 Security Vulnerability in CIFS/9000 Server #2
PLATFORM: HP 9000 servers running CIFS/9000 Server version A.01.07 or
lower; HP 3000 servers running Samba/iX
MANUAL ACTIONS: Yes - NonUpdate
Edit the smb.conf file to remove all occurances
of the macro "%m". See below for details.
=========================================
HPSBUX0108-164 Sec. Vulnerability in CIFS/9000 Server password
PLATFORM: HP 9000 servers running CIFS/9000 Server version
A.01.07, or lower.
MANUAL ACTIONS: Yes - NonUpdate
Ensure that the "passwd program" option contains the
%u substitution string as follows:
passwd program = /bin/passwd %u.
=========================================
HPSBUX0110-173 Sec. Vulnerability in Tomcat 3.2.1 (VVOS)
PLATFORM: HP9000 Servers running HP-UX 11.04 (VVOS),
Virtualvault A.04.50 only.
MANUAL ACTIONS: Yes - Update plus other actions
Apply patches and install Tomcat 3.2.3
runtime JAR files.
=========================================
HPSBUX0110-174 Sec. Vulnerability in JRE
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20 and
11.x only. This security bulletin applies to Java
on HP-UX. It does not cover software shipped on Linux
or Windows/NT.
MANUAL ACTIONS: Yes - Update
Update to:
JDK and JRE 1.2.2.10 or higher for HP-UX 11.x.
JDK and JRE 1.3.0.02 or higher for HP-UX 11.x.
JDK and JRE 1.3.1.01 or higher for HP-UX 11.x.
=========================================
HPSBUX0201-181 Sec. Vulnerability in IPFilter/9000
PLATFORM: IPFilter/9000 product running on HP-UX 11.00 or 11.11
MANUAL ACTIONS: Yes - Update
Upgrade to
IPFilter/9000 version A.03.05.02 or greater
=========================================
HPSBUX0202-182 Sec. Vulnerability in Netscape 6.01
PLATFORM: HP9000 Series 700/800 running HP-UX releases 11.00 and
11.11.
MANUAL ACTIONS: Yes - Update
Update to Netscape 6.2.1
=========================================
HPSBUX0202-184 Sec. Vulnerability in SNMP
PLATFORM: HP 9000 Series 700 and Series 800 running HP-UX
releases 10.X and 11.X
HP Procurve switches
HP TopTools Remote Control Card
JetDirect Firmware
MC/ServiceGuard, EMS HA Monitors
Solaris running OpenView or NNM
Windows/NT running OpenView or NNM
MANUAL ACTIONS: Yes - Update plus other actions
=========================================
HPSBUX0202-185 Sec. Vulnerability with HP AdvanceStack hubs
PLATFORM: HP AdvanceStack J3200A, J3201A, J3202A, J3203A, J3204A,
J3205A, J3210A with firmware version A.03.07 and
earlier.
MANUAL ACTIONS: Yes - NonUpdate
Until a fix is available work around the
problem by either disabling web access or
removing the management IP address.
=========================================
HPSBUX0203-186 Sec. Vulnerability in JAVA JRE
PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.20 and
11.x (including 11.04 - VVOS) only. This security bulletin
applies to Java on HP-UX (including 11.04 - VVOS). It does
not cover software shipped on Linux or Windows/NT.
MANUAL ACTIONS: Yes - Update plus other actions
Update Java:
JDK/JRE 1.1.8.06 or higher for HP-UX 10.20,
JDK/JRE 1.2.2.12 or higher for HP-UX 11.x,
JDK/JRE 1.3.1.00 or higher for HP-UX 11.x.
JDK/JRE for outside Apache web servers on
Virtualvault A.04.50 should be upgraded to
Java version 1.3.1 or higher.
For the inside administration Apache web
server on Virtualvault A.04.50, install PHSS_26673.
=========================================
HPSBUX0206-195 Sec. Vulnerability in OpenSSH on HP-UX
PLATFORM: HP 9000 Servers running HP-UX release 11.00, and 11.11
only with the T1471AA HP-UX Secure Shell product
installed.
MANUAL ACTIONS: Yes - Update
**REVISED 01**
- -->> Install new binary version A.03.10.002 or
subsequent, which can be
found on www.software.hp.com
under "Internet and Security solutions".
=========================================
HPSBUX0207-197 Sec. Vulnerability in Apache Server Chunk Encoding
PLATFORM: HP9000 Servers running HP-UX release 11.00, 11.04, 11.11
11.20, and 11.22 with the HP Apache product installed.
affected OpenView Products:
Network Node Manager (NNM) 6.01, 6.1, 6.2, 6.31
running on HP-UX and Solaris
NNM on Windows NT/W2K is not affected.
OV Service Information Portal (OVSIP) 1.0, 2.0, 3.0
MANUAL ACTIONS: Yes - NonUpdate
Install repaired binary.
For HP-UX 11.00, 11.11, 11.20 and 11.22
download new product bundles from
http://www.software.hp.com/ISS_products_list.html
For HP-UX 11.04, OV NNM 6.2, OV NNM 6.1,
OV SIP 3.0 apply the applicable patch.
=========================================
HPSBUX0207-200 Sec. Vulnerability in CIFS/9000
PLATFORM: HP9000 systems running CIFS/9000 Client version A.01.06
or earlier on HP-UX releases 11.00 and 11.11.
MANUAL ACTIONS: Yes - Update
Update to CIFS/9000 Client version A.01.07,
or later
=========================================
HPSBUX0207-202 Sec. Vulnerability in BIND 9
PLATFORM: HP9000 Series 700/800 running HP-UX release 11.11 (11i)
only with the BINDv920.INETSVCS-BIND fileset installed.
MANUAL ACTIONS: Yes - NonUpdate
Install BIND920v2.depot.
=========================================
HPSBUX0207-204 Sec. Vulnerability in JetDirect EWS
PLATFORM: HP peripherals or printers that have an Embedded Web
Server (EWS).
MANUAL ACTIONS: Yes - Update
Update to firmware version X.22.09 or later.
=========================================
HPSBUX0208-207 Sec. Vulnerability in HP Apache Server PHP
PLATFORM: HP9000 Servers running HP-UX release 11.00, 11.11, 11.20,
and 11.22 with the HP Apache product installed.
MANUAL ACTIONS: Yes - Update
hp apache-based web server v.1.3.26.03
on hp-ux 11.0 and 11i (pa-risc)
hp apache-based web server v.1.3.26.03
on hp-ux 11i version 1.5 and 1.6 (ipf)
hp apache-based web server v.2.0.39.03
on hp-ux 11.0 and 11i (pa-risc)
hp apache-based web server v.2.0.39.03
on hp-ux 11i (pa-risc) for ipv6
hp apache-based web server v.2.0.39.03
on hp-ux 11i version 1.5 and 1.6 (ipf)
=========================================
======================================================
III. Missing or mis-formatted "MANUAL ACTIONS - Non-HP-UX only"
======================================================
The MANUAL ACTIONS section in each of the following bulletins
was either missing or was not in the new format. These
bulletins will not be sent to the e-mail distribution.
=========================================
HPSBUX0006-116 Sec. Vulnerability in Web JetAdmin 6.0
PLATFORM: Microsoft Windows NT 4.0 / Windows 2000 only.
MANUAL ACTIONS: Non-HP-UX only
Install latest version of Web JetAdmin 6.0
(6.0.1233)
=========================================
HPSBUX0208-212 Sec. Vulnerability in OpenSSL for JetDirect
PLATFORM: HP Jetdirect Print Servers with Jetdirect Firmware
Versions X.22.00 through X.23.99 ( where X = L through U )
only.
MANUAL ACTIONS: Non-HP-UX only
Until a firmware update is available, disable the
Embedded Web Server on Jetdirect Print Servers
with Jetdirect Firmware Versions X.22.00 through
X.23.99 ( where X = L through U ).
=========================================
======================================================
IV. Missing or mis-formatted "MANUAL ACTIONS - No"
======================================================
The MANUAL ACTIONS section in each of the following bulletins
was either missing or was not in the new format. These
bulletins will not be sent to the e-mail distribution.
All the following bulletins now have:
MANUAL ACTIONS: No
HPSBUX9311-001 HPSBUX9311-002 HPSBUX9402-003 HPSBUX9402-005
HPSBUX9402-006 HPSBUX9404-008 HPSBUX9405-009 HPSBUX9406-013
HPSBUX9407-015 HPSBUX9409-017 HPSBUX9410-018 HPSBUX9411-019
HPSBUX9501-020 HPSBUX9502-022 HPSBUX9502-023 HPSBUX9502-024
HPSBUX9503-025 HPSBUX9504-027 HPSBUX9602-029 HPSBUX9604-031
HPSBUX9607-032 HPSBUX9608-036 HPSBUX9608-037 HPSBUX9609-038
HPSBUX9610-040 HPSBUX9612-043 HPSBUX9701-044 HPSBUX9701-045
HPSBUX9701-046 HPSBUX9701-047 HPSBUX9701-048 HPSBUX9701-049
HPSBUX9701-050 HPSBUX9701-051 HPSBUX9702-052 HPSBUX9702-053
HPSBUX9702-055 HPSBUX9702-056 HPSBUX9704-057 HPSBUX9704-059
HPSBUX9704-061 HPSBUX9707-064 HPSBUX9707-067 HPSBUX9710-070
HPSBUX9710-071 HPSBUX9711-073 HPSBUX9801-075 HPSBUX9801-076
HPSBUX9803-077 HPSBUX9807-079 HPSBUX9807-081 HPSBUX9808-082
HPSBUX9808-083 HPSBUX9808-084 HPSBUX9810-086 HPSBUX9811-087
HPSBUX9811-088 HPSBUX9812-089 HPSBUX9812-090 HPSBUX9902-091
HPSBUX9903-092 HPSBUX9903-093 HPSBUX9903-094 HPSBUX9903-095
HPSBUX9903-096 HPSBUX9906-098 HPSBUX9906-099 HPSBUX9907-101
HPSBUX9908-102 HPSBUX9910-104 HPSBUX9912-106 HPSBUX9912-107
HPSBUX0001-108 HPSBUX0004-112 HPSBUX0005-113 HPSBUX0006-115
HPSBUX0007-117 HPSBUX0008-118 HPSBUX0008-119 HPSBUX0009-120
HPSBUX0009-121 HPSBUX0009-122 HPSBUX0010-123 HPSBUX0010-124
HPSBUX0010-125 HPSBUX0010-127 HPSBUX0011-129 HPSBUX0011-130
HPSBUX0012-134 HPSBUX0012-135 HPSBUX0101-136 HPSBUX0101-137
HPSBUX0101-138 HPSBUX0102-139 HPSBUX0102-140 HPSBUX0102-142
HPSBUX0102-143 HPSBUX0103-146 HPSBUX0103-147 HPSBUX0104-148
HPSBUX0105-151 HPSBUX0106-152 HPSBUX0106-153 HPSBUX0106-154
HPSBUX0107-156 HPSBUX0107-158 HPSBUX0107-159 HPSBUX0107-160
HPSBUX0107-161 HPSBUX0107-162 HPSBUX0108-163 HPSBUX0108-165
HPSBUX0109-166 HPSBUX0109-167 HPSBUX0110-168 HPSBUX0110-169
HPSBUX0110-170 HPSBUX0110-171 HPSBUX0110-172 HPSBUX0111-175
HPSBUX0111-176 HPSBUX0112-177 HPSBUX0201-179 HPSBUX0202-183
HPSBUX0203-189 HPSBUX0204-190 HPSBUX0204-191 HPSBUX0205-192
HPSBUX0205-193 HPSBUX0205-194 HPSBUX0207-196 HPSBUX0207-198
HPSBUX0207-201 HPSBUX0208-206 HPSBUX0208-208 HPSBUX0208-210
HPSBUX0208-211 HPSBUX0208-213
======================================================
B. Recommended solution
If bulletins are maintained locally, optionally download
new copies. Only bulletins with incorrect MANUAL ACTIONS
fields will be mailed out. Bulletins which were revised
to add a missing MANUAL ACTIONS field or to correct the
format of the MANUAL ACTIONS field will not be mailed
out for this revision.
C. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP IT Resource Center via electronic
mail, do the following:
Use your browser to get to the HP IT Resource Center page
at:
http://itrc.hp.com
Use the 'Login' tab at the left side of the screen to login
using your ID and password. Use your existing login or the
"Register" button at the left to create a login, in order to
gain access to many areas of the ITRC. Remember to save the
User ID assigned to you, and your password.
In the left most frame select "Maintenance and Support".
Under the "Notifications" section (near the bottom of
the page), select "Support Information Digests".
To -subscribe- to future HP Security Bulletins or other
Technical Digests, click the check box (in the left column)
for the appropriate digest and then click the "Update
Subscriptions" button at the bottom of the page.
or
To -review- bulletins already released, select the link
(in the middle column) for the appropriate digest.
To -gain access- to the Security Patch Matrix, select
the link for "The Security Bulletins Archive". (near the
bottom of the page) Once in the archive the third link is
to the current Security Patch Matrix. Updated daily, this
matrix categorizes security patches by platform/OS release,
and by bulletin topic. Security Patch Check completely
automates the process of reviewing the patch matrix for
11.XX systems.
For information on the Security Patch Check tool, see:
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
displayProductInfo.pl?productNumber=B6834AA
The security patch matrix is also available via anonymous
ftp:
ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix/
On the "Support Information Digest Main" page:
click on the "HP Security Bulletin Archive".
D. To report new security vulnerabilities, send email to
security-alert@hp.com
Please encrypt any exploit information using the
security-alert PGP key, available from your local key
server, or by sending a message with a -subject- (not body)
of 'get key' (no quotes) to security-alert@hp.com.
------------------------------------------------------------------
(c)Copyright 2002 Hewlett-Packard Company
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
in this document is subject to change without notice.
Hewlett-Packard Company and the names of HP products referenced
herein are trademarks and/or service marks of Hewlett-Packard
Company. Other product and company names mentioned herein may be
trademarks and/or service marks of their respective owners.
________________________________________________________________
- -----End of Document ID: HPSBUX0301-236--------------------------------------
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business
hours which are GMT+10:00 (AEST). On call after hours
for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBPifw/Ch9+71yA2DNAQGSPAP/WOyOfpYId9xh/q9TSpgZnQTLnGEisnQJ
E2eHVCFQvmwDm7D84+gVKfgK15r/LNAulzzn3BUVOOs4Dlpg9lNOq0Ye13+v4JWX
7uLa7mLjBeT2V5X1P0bORVhe0ludNNWf4jueGj3dvJzXEscTbfE+BTg7DIdWR8tt
cuw96T1Cxrg=
=2w3S
-----END PGP SIGNATURE-----
|