Published:
03 June 2002
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2002.256 -- Compaq Security Bulletin (SSRT2179) Potential Vulnerability in Compaq ProLiant BL e-Class Integrated Administrator Version 1.0 and Version 1.10 4 June 2002 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ProLiant BL e-Class enclosure (Integrated Administrator) Vendor: Compaq Impact: Administrator Compromise Access Required: Existing Account Local - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SECURITY BULLETIN (SSRT2179) Potential Vulnerability in Compaq ProLiant BL e-Class Integrated Administrator Version 1.0 and Version 1.10 Doc ID: SRB0010W REVISION: 1 NOTICE: There are no restrictions for distribution of this Bulletin provided that it remains complete and intact. Posted at http://ftp.support.compaq.com/patches/.new/security.shtml RELEASE DATE: May 2002 LAST UPDATED: 21 May 2002 SEVERITY: 1 SOURCE: Compaq Computer Corporation Compaq Services Software Security Response Team REFERENCE: (SSRT2179) - Rev 0 - 17 May, 2002 PROBLEM SUMMARY: A potential vulnerability exists where an authenticated user may gain unrestricted access to the embedded operating system of the Compaq ProLiant BL e-Class enclosure (Integrated Administrator) when this user has Telnet, Secure Shell, or console access to the system, and is limited to the enclosure itself. The potential vulnerability does not extend to users who only have web access and does not extend to the server blades. VERSIONS IMPACTED: Integrated Administrator firmware v1.0 and v1.10 RESOLUTION: Upgrade to version 1.11 or higher of the Integrated Administrator firmware (available May 2002), located at: http://www.compaq.com/support/files/server/us/locate/5708.html After installing this update, Compaq strongly recommends performing the following cleanup procedure if there is any suspicion the enclosure may have been compromised by a malicious authenticated user: Change all Integrated Administrator user passwords (including the Administrator account) Execute the command "CLEAR SSHKEY" If you were using the SSHKEY feature, then re-install your SSH authorized key file using the "DOWNLOAD SSHKEY <url>" command. SUPPORT: For further information, contact Compaq Global Services. SUBSCRIBE: To subscribe to automatically receive future Security Advisories from the Compaq's Software Security Response Team via electronic mail: http://www.support.compaq.com/patches/mailing-list.shtml REPORT: To report a potential security vulnerability with any Compaq supported product, send email mailto:security-ssrt@compaq.com or mailto:sec-alert@compaq.com Compaq appreciates your cooperation and patience. As always, Compaq urges you to periodically review your system management and security procedures. Compaq will continue to review and enhance the security features of its products and work with our customers to maintain and improve the security and integrity of their systems. "Compaq is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected Compaq products the important security information contained in this Bulletin. Compaq recommends that all users determine the applicability of this information to their individual situations and take appropriate action. Compaq does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, Compaq will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin." Copyright 2002 Compaq Information Technologies Group, L.P. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is subject to change without notice. Compaq and the names of Compaq products referenced herein are, either, trademarks and/or service marks or registered trademarks and/or service marks of Compaq Information Technologies Group, L.P. Other product and company names mentioned herein may be trademarks and/or service marks of their respective owners. - -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.1 iQA/AwUBPOvXSDnTu2ckvbFuEQK1lwCg3BgaOpCxrHr/3O6TkKZDLaXoCN4An3JR ZRmaNbJ8kk16bhzOALm1KWi3 =uL6L - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBPPzTXih9+71yA2DNAQFHfgP/aIYgZOgNb2PZbqwVn2gz7R0t21O4HPVc RYKpQi267+Ukbu0uXAx7vF3vn3VWfUyNWm1DlLXVz0To47o/gMyYpVCavTf2J/cy 6YWPG/24jQieCbyyheo9kzyeXS4P2wxSggEgU4nLUgUS2ekS4F6a5iol9Hn79nQs EEG3r2rJMkk= =bQmD -----END PGP SIGNATURE-----