Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2001.191 -- SSRT0716-01 Security Advisory Compaq Presario & Active-X 10 May 2001 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Presario & Active-X Vendor: Compaq Operating System: Microsoft Windows 98 Microsoft Windows Me Platform: Presario Impact: Create Arbitrary Files Denial of Service Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- NEW SoftPaq 17398 supercedes SoftPaq 16629 =========================================== TITLE: SSRT0716-01 - Compaq Presario Potential Active X Denial of Service Security Vulnerability x-ref: SSRT0716 10-APR-2001 SOURCE: Compaq Computer Corporation, Software Security Response Team =========================================== Update: 02-MAY-2001 ** No Restriction for Distribution ** provided the advisory remains intact. OS Systems: Windows 98, Windows Me UPDATE: SoftPaq 17398 has replaced SoftPaq 16629 and the patch available from the Compaq Service Connection identified in the advisory released 10-APR-2001. SoftPaq 16629 was not completely effective on some Presario systems and Presario Customers should install SoftPaq 17398 via the web or enable the Service Connection to install the new FP17398. We apologize for this inconvenience. Apply the new SoftPaq 17398 patch to Presario Systems. http://web14.compaq.com/falco/sp_syn.asp?page=splist&detail=yes&recid= 17398 (**note: double check the above URL, it's length may cause it to wrap ) If you experience a problem with this Softpaq, please contact Compaq's Presario technical support engineering at: http://askq.compaq.com/askpresario/form.asp Other than the updated SoftPaq 17398 notice, the remainder or this advisory remains unchanged. Date: 10-APR-2001 SEVERITY: HIGH PROBLEM STATEMENT SUMMARY: Compaq continues to take a serious approach to the quality and security of all its software products and makes every effort to address issues and provide solutions in a timely manner. In line with this commitment, Compaq is responding to recent concerns of a potential security vulnerability with Active X. Compaq Presario personal computers provide customer support features through its Knowledge Center and Back web components. Some features are implemented with Microsoft's Active X. By utilizing the active X control function, "LogDataListToFile", an attacking web page could write a specified file to the system's hard drive. This allows a potential denial of service vulnerability. The content of the file written is not modifiable. The named file contains text with hardware and software configuration information. IMPACT: ** Note: Compaq Proliant Systems are not affected by this problem. Languages Affected: Multi-lingual OS Systems: Windows 98, Windows Me ( See below for a list of most of the affected model numbers. ) SOLUTION: Compaq has changed the way the Microsoft Active X features are used in Presario systems. A software patch is available via the Internet as ** SoftPaq 17398 that solves this problem. [** Note: 25-APR-2001 SoftPaq 17398 has superceded Softpaq 16629] The patch was sent via Compaq's Back Web server to the affected systems on March 27, 2001. If this feature is enabled on a system, the update takes place automatically. It will also be available on Microsoft's Windows Update Site After April 25, 2001. WHAT CUSTOMERS SHOULD DO: XX Apply the SoftPaq 16629 patch to Presario Systems. XX XXhttp://web14.compaq.com/falco/sp_syn.asp?page=splist&detail= XX yes&recid=16629 SoftPaq 16629 has been superseded by the release of SoftPaq 17398 http://web14.compaq.com/falco/sp_syn.asp?page=splist&detail=yes&recid= 17398 (**note: double check the above URL, it's length may cause it to wrap ) Compaq appreciates your cooperation and patience. We regret any inconvenience this may have caused. As always, Compaq urges you to periodically review your system management and security procedures. Compaq will continue to review and enhance the security features of its products and work with customers to maintain and improve the security and integrity of their systems. (c) Copyright 2001 Compaq Computer Corporation. All rights reserved To subscribe to automatically receive future NEW Security Advisories from the Compaq's Software Security Response Team via electronic mail, Use your browser select the URL http://www.support.compaq.com/patches/mailing-list.shtml Select "Security and Individual Notices" for immediate dispatch notifications directly to your mailbox. To report new Security Vulnerabilities, send mail to: security-ssrt@compaq.com MODELS AFFECTED: Laptop Models: · 1200T, 1200-XL102, 1200-XL104, 1200-XL105, 1200-XL106, 1200-XL107, 1200-XL110, 1200-XL111, 1200-XL118, 1200-XL119, 1200-XL450 · 1244, 1245, 1247, 1255, 1256, 1260, 1266, 1267, 1270, 1272, 1273, 1274, 1275, 1277, 1278, · 12XL125, 12XL126, 12XL127, 12XL128, 12XL300, 12XL300B, 12XL310, 12XL325, 12XL326, 12XL327, 12XL330, 12XL400, 12XL401, 12XL410, 12XL426, 12XL427, 12XL430, 12XL500, 12XL501, 12XL505, 12XL510, 12XL526, 12XL527, 12XL530 · 1400T EB2 (14XL3EB), 1400T-XL4, 14XL240, 14XL244, 14XL245, 14XL340, 14XL345, 14XL420, 14XL440, 14XL445 · 1660, 1670, 1672, 1675, 1685, 1687, 1688, 1690, 1692, 1693, 1694 · 1800, 1825, 1827, 1830 · 1700T-XL5, 17XL260, 17XL262, 17XL265, 17XL275, 17XL360, 17XL365, 17XL375, 17XL460, 17XL465, 17XL475, 17XL570, 17XL575 · 1800T, 1800T-XL4, 1800-XL180, 1800-XL181, 18XL2 CTO, 18XL280, 18XL380, 18XL390, 18XL580 · 1900-XL1, 1900-XL161 · 1920, 1925, 1930 Desktops Models · 305 · 2281, 2286 · 3550 · 5000A Carepanion, 5000T, 5000US, 5000Z (5UVM21), 5000Z / 5007H, 5000Z / 5008H, 5001CL, 5001R, 5001SR, 5002US, 5003R, 5003US, 5004CL, 5004US, 5005CL, 5005R, 5005SR, 5006H, 5006US, 5007R, 5007SR, 5008US, 5009CL, 5009R, 5009SR, 5010US, 5011CL, 5011R, 5012US, 5014US · 5070 · 5184, 5185 · 5202, 5204, 5220, 5222, 5225, 5240, 5242, 5245, 5280, 5282, 5284, 5285 · 5301, 5304, 5330, 5340, 5345, 5352, 5360, 5365 · 5410, 5440, 5451, 5457, 5460, 5461, 5465, 5473 · 5600, 5670, 5686, 5690, 5695, 5697 · 5710, 5711, 5712, 5714, 5715, 5716, 5717, 5721, 5722, 5724, 5725, 5726, 5735, 5736, 5738, 5745 · 5822, 5832, 5837, 5838, 5855, 5861, 5868, 5875, 5888 · 5600I, 5600Kiosk, 5600S · 5700n · 5900z . 5BW112, 5BW120, 5BW122, 5BW130, 5BW131, 5BW135, 5BW160, 5BW172, 5BW175, 5BW220, 5BW250, 5BW251, 5BW284, 5WV232, 5WV252, 5WV254, 5WV260, 5WV261, 5WV270, 5WV271, 5WV275, 5WV280, 5WV282, 5WV285, 5WV294, 5WV295 · 7360, 7462, 7465, 7470, 7471, 7475, 7478, 7485, 7585, 7588, 7590, 7594, 7595, 7596, 7598, 7599, 7885, 7895, 7922, 7947, 7970, 7985, 7990, 7994 · 7000T (7RPM), 7000US, 7000z-7PL2, 7001CL, 7002US, 7003US, 7006US · 7AP134, 7AP135, 7AP140, 7AP170, 7AP195, 7PL270, 7PL290, 7PL295, 7QSM · 800T-80XL4, 80XL550 · EZ2200, EZ2207, EZ2605, EZ2700, COMPAQ AND/OR ITS RESPECTIVE SUPPLIERS MAKE NO REPRESENTATIONS ABOUT THE SUITABILITY OF THE INFORMATION CONTAINED IN THE DOCUMENTS AND RELATED GRAPHICS AND/OR SOFTWARE PUBLISHED ON THIS SERVER FOR ANY PURPOSE. ALL SUCH DOCUMENTS AND RELATED GRAPHICS ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND AND ARE SUBJECT TO CHANGE WITHOUT NOTICE. THE ENTIRE RISK ARISING OUT OF THEIR USE REMAINS WITH THE RECIPIENT. IN NO EVENT SHALL COMPAQ AND/OR ITS RESPECTIVE SUPPLIERS BE LIABLE FOR ANY DIRECT, CONSEQUENTIAL, INCIDENTAL, SPECIAL, PUNITIVE OR OTHER DAMAGES WHATSOEVER (INCLUDING WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION), EVEN IF COMPAQ HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBOvp5PSh9+71yA2DNAQHWHwP9FRNZPH7y7aJpytvFu5+6iaozNXsKvU2Y xTXKZ5pv4UzJ/VQyHAVAtylQoall1cpJAHRvCFn2QBeVF850nIN36/UqJIlbOyuD mlcKeM0QElEtud8YKiQG9LdsvqZPJBgRvBpVbq041NYFstIFQQ0Dh82G2uXFg9XY oPpSWvAmRm0= =j58W -----END PGP SIGNATURE-----