Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.0339 SSRT101124 rev.1 - HP ServiceCenter, Remote Denial of Service (DoS) 7 March 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: HP ServiceCenter Publisher: Hewlett-Packard Operating System: Windows HP-UX Linux variants Solaris AIX Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2012-5214 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03680085 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03680085 Version: 1 HPSBMU02849 SSRT101124 rev.1 - HP ServiceCenter, Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2013-03-06 Last Updated: 2013-03-06 Potential Security Impact: Remote denial of service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP ServiceCenter. The vulnerability could be remotely exploited to allow a remote Denial of Service (DoS). References: CVE-2012-5214 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP ServiceCenter 6.2.8 for Windows, HP-UX, Linux, Solaris and AIX BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2012-5214 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided an update to HP ServiceCenter 6.2.8 to resolve this issue. These updates are available on the HP Software Support Online portal. Note: please apply this patch or a patch that supersedes it. HP ServiceCenter 6.2.8.10 Server Patch location Aix Server 6.2.8.10 http://support.openview.hp.com/selfsolve/document/LID/HPSC_00227 Windows Server 6.2.8.10 http://support.openview.hp.com/selfsolve/document/LID/HPSC_00232 HP Itanium Server 6.2.8.10 http://support.openview.hp.com/selfsolve/document/LID/HPSC_00228 HP PA-RISC Server 6.2.8.10 http://support.openview.hp.com/selfsolve/document/LID/HPSC_00229 Linux Server 6.2.8.10 http://support.openview.hp.com/selfsolve/document/LID/HPSC_00230 Solaris Server 6.2.8.10 http://support.openview.hp.com/selfsolve/document/LID/HPSC_00231 HISTORY Version: 1 (rev.1) - 6 March 2013 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430 Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2013 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iEYEARECAAYFAlE3pNAACgkQ4B86/C0qfVkougCgsBJy12Nx8GXcEZ2+gi7pYMtK v0oAoO3ow5C9cRjaLv0dPESBqkunjqXc =L0/D - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUTgACO4yVqjM2NGpAQJDjA/+LGhY4kdh0kDnPTbqGoTisBZN8rdUA2mN 4Y6Zp7HZPWOiikm0Kggq35NNsTiN5FfiVyOZg0U5W3I8Q8pJ1x9jcElt4LL7osjY +i/U3izO1x8EE4n1uLF0Lq9ToQGOM0HtpV3mb57ZNRAQvKamNXKAmdw6ejWnhnb4 Ew6g8foAZnZwcDJgyMuIIXJ1TfRlIDr3tDNF4Jphmel+r/07wuk1H2OUUK0zeJeH WVqu2EmmHEhybq9SNobLZtUEwdtBrlrrDkwF4CMQg4MlSNgaFYmTIkHHyCG6+Jt7 WhoiPoUzx44+VSoa2bTePWnuXbbKvvzN9dLfIFRSuBMBatQ9y+SbpatTO4gF2xRs hBuB+pfdYxcoQ3ZNq8MhXhs97DhXhWb/C1dVq2atCFwiKL9/U+Rf5GYmEda4w8m9 B/8J8zbmmsryfQtqlgUz+Yjw+UAL//TGNbrbGqyc8j0POePqjLtDot9O75PMx2wL cYjb0S070CeDUwLmG0hl4lrVnfK0dKe2oPyQ2Tzu1vOnqfxaCe9CAuOA1faltRP8 LzcCQ/g/SqqTiNd2GEuiLQC/uxr9FEkGE8eZ94IEgIfZg3ekDGwPOsoF7PfoiTYG xkPBeyVwyP8XjpZhPZtrb2Qv/3W+EwAVDWa6V8BCZ1wle+VtiGB/fuUO7T8evV3H 19v7cgdKES0= =+fFS -----END PGP SIGNATURE-----