home *** CD-ROM | disk | FTP | other *** search
- *************************************************************************
- Security Bulletin 9431 DISA Defense Communications System
- December 7, 1994 Published by: DDN Security Coordination Center
- (SCC@NIC.DDN.MIL) 1-(800) 365-3642
-
- DEFENSE DATA NETWORK
- SECURITY BULLETIN
-
- The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security
- Coordination Center) under DISA contract as a means of communicating
- information on network and host security exposures, fixes, and concerns
- to security and management personnel at DDN facilities. Back issues may
- be obtained via FTP (or Kermit) from NIC.DDN.MIL [192.112.36.5]
- using login="anonymous" and password="guest". The bulletin pathname is
- scc/ddn-security-yynn (where "yy" is the year the bulletin is issued
- and "nn" is a bulletin number, e.g. scc/ddn-security-9428).
- **************************************************************************
-
- + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
- ! !
- ! The following important advisory was issued by the Automated !
- ! Systems Security Incident Support Team (ASSIST) and is being !
- ! relayed unedited via the Defense Information Systems Agency's !
- ! Security Coordination Center distribution system as a means !
- ! of providing DDN subscribers with useful security information. !
- ! !
- + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
-
- <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
-
-
- Automated Systems Security Incident Support Team
- _____
- ___ ___ _____ ___ _____ | /
- /\ / \ / \ | / \ | | / Integritas
- / \ \___ \___ | \___ | | < et
- /____\ \ \ | \ | | \ Celeritas
- / \ \___/ \___/ __|__ \___/ | |_____\
- <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
-
-
- Bulletin 94-37
-
- Release date: 6 December 1994, 10:00 AM EST (GMT -4)
-
- SUBJECT: Summary of HP Security Bulletins.
-
- SUMMARY: This bulletin contains a summary of all security related
- patches currently available from Hewlett Packard. The patches are
- presented first in a table format, then a summary of the
- vulnerability information is presented for each patch in the order
- in which the HP Bulletins were issued.
-
- BACKGROUND: HP has set up an automatic server to allow patches and
- other security information to be retrieved over the Internet. To
- utilize this server, send a message to:
- support@support.mayfield.hp.com.
-
- The subject line of the message will be ignored. The body (text) of
- the message should contain the words:
-
- send XXXX
-
- Where XXXX is the identifier for the information you want retrieved.
- For example, to retrieve the patch PHSS_4834, the message would be
- "send PHSS_4834".
-
- Other information that can be retrieved include the HP SupportLine
- mail service user's guide (send guide.txt), the readme file for a
- patch (send doc PHSS_4834), and the original HP bulletin (send doc
- HPSBUX9410-018).
-
- HP also has a World Wide Web server to browse and retrieve
- bulletins and patches. To utilize this server, use a WWW client
- and connect to http://support.mayfield.hp.com.
-
- IMPORTANT NOTE: Hewlett Packard updates patches periodically.
- These updates are not reflected in the text of each HP bulletin.
- The overview presented here contains current information on the
- patches available at the time of the release of this CIAC bulletin.
- If you request an updated patch, when you try to retrieve the patch
- you will receive a message stating that the patch is obsolete and the
- name of the patch which supersedes it.
-
- Hewlett Packard has made sum and MD5 checksums available for their
- patches and for their security bulletins. See the detailed
- explanation for HPSBUX9408-016 for information on how to access and
- utilize these checksums.
-
- IMPACT: Vulnerabilities could allow unauthorized access to HP
- systems.
-
- RECOMMENDED SOLUTION: Review the attached appendix and install HP
- appropriate patches to HP systems.
-
- ASSIST would like to thank the Department of Energy Compute
- Incident Advisory Capability for the information contained in this
- bulletin.
-
- <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
-
- ASSIST is an element of the Defense Information Systems Agency
- (DISA), Center for Information Systems Security (CISS), that
- provides service to the entire DoD community. Constituents
- of the DoD with questions about ASSIST or computer security
- security issues, can contact ASSIST using one of the methods
- listed below. Non-DoD organizations/institutions, contact
- the Forum of Incident Response and Security Teams (FIRST)
- (FIRST) representative. To obtain a list of FIRST member
- organizations and their constituencies send an email to
- docserver@first.org with an empty "subject" line and a message body
- containing the line "send first-contacts".
-
- ASSIST Information Resources: To be included in the distribution
- list for the ASSIST bulletins, send your Milnet (Internet) e-mail
- address to assist-request@assist.mil. Back issues of ASSIST
- bulletins, and other security related information, are available
- from the ASSIST BBS at 703-756-7993/1154 DSN 289-7993/1154,
- and through anonymous FTP from assist.mil (IP address
- 199.211.123.11). Note: assist.mil will only accept anonymous FTP
- connections from Milnet addresses that are registered with the
- NIC or DNS.
-
- ASSIST Contact Information:
- PHONE: 800-357-4231 (or 703-756-7974 DSN 289), duty hours are 06:00
- to 22:30 EDT (GMT -4) Monday through Friday. During off duty hours,
- weekends and holidays, ASSIST can be reached via pager at
- 800-791-4857. The page will be answered within 30 minutes, however
- if a quicker response is required, prefix the phone number with
- "999". ELECTRONIC MAIL: Send to assist@assist.mil.
- ASSIST BBS: Leave a message for the "sysop".
-
- Privacy Enhanced Mail (PEM): ASSIST uses PEM, a public key
- encryption tool, to digitally sign all bulletins that are
- distributed through e-mail. The section of seemingly random
- characters between the "BEGIN PRIVACY-ENHANCED MESSAGE" and
- "BEGIN ASSIST BULLETIN" contains machine-readable digital
- signature information generated by PEM, not corrupted data. PEM
- software for UNIX systems is available from Trusted Information
- Systems (TIS) at no cost, and can be obtained via anonymous FTP
- from ftp.tis.com (IP 192.94.214.96). Note: The TIS software is
- just one of several implementations of PEM currently available and
- additional versions are likely to be offered from other
- sources in the near future.
-
- Reference herein to any specific commercial product, process, or
- service by trade name, trademark manufacturer, or otherwise, does
- not constitute or imply its endorsement, recommendation, or
- favoring by ASSIST. The views and opinions of authors expressed
- herein shall not be used for advertising or product endorsement
- purposes.
-
- <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
-
- Appendix: Table of HP Security Bulletins
-
-
-
- HP Progs Patches to Overview of
- Bulletin Affected Platform Install Vulnerability
- - -------- -------- ---------------- -------------- -------------
- 9311-001 sendmail HP 9000 300,400, 1 of 4 patches A mail message
- 700,800 dependent on can cause
- HP-UX 8.x, 9.x configuration system commands
- to be executed
-
- 9312-002 Xterm HP 9000 300,400, 1 of 5 patches The logging
- 700,800 dependent on function of
- HP-UX 8.x, 9.x configuration xterm allows
- local users to
- create or
- modify files
-
- 9402-003 /etc/ HP 9000 300,400, 1 of 2 patches /etc/
- subnetconfig 700,800 dependent on subnetconfig
- HP-UX 9.0/9.1 configuration can allow users
- to increase
- their
- privileges
-
- 9402-004 /dev/nit HP 9000 300,400, Evaluate Be aware of
- 700,800 necessity of vulnerabilities
- HP-UX Apollo having the inherent in the
- Token Ring machine on a nature of a
- or network machine
- STREAMS-DLPI
-
- 9402-005 hpterm HP 9000 300,400, 1 or 2 patches Users can gain
- 700,800 dependent on access to files
- hpterm Revision configuration; regardless of
- 2.89 or earlier or use hpterm file ownership
- Rev 2.90/higher and permissions
-
- 9402-006 HP DCE HP 9000 700,800 1 patch Unauthorized
- Camera at revision 9.x root access
-
- 9404-007 Advisory none none Announcement
- only that HP is not
- vulnerable
- to the SITE
- EXEC problem
-
- 9404-008 HP Vue HP 9000 300,400, 1 of 2 patches Unauthorized
- 3.0 700,800 dependent on root access
- HP-UX 9.x configuration
-
- 9405-009 OSF/AES HP 9000 700 Install 2 Root grants
- standard HP-UX 9.01 patches improper
- or 9.03 ownership of
- files and
- directories
-
- 9405-010 ftpd All HP-UX root should Anonymous users
- home directory systems own ftp home can change
- directory permissions on
- files
-
- 9405-011 HP HP 9000 300/400, 1 patch or Non-root users
- GlancePlus 700/800 update product can use glance
- rev B.09.00 for HP-UX 9.x or gpm to gain
- and earlier or use root privs
- workaround in
- HP-UX 8.x
-
- 9405-012 HP 9000 700 at change file files were SUID
- Multimedia HP-UX rev 9.x permissions on
- Sharedprint three files
-
- 9406-013 HP 9000 300,400 1 of 2 patches Unauthorized
- /usr/etc/vhe 700,800 dependent on root access
- /vhe_u_mnt HP-UX 8.x, 9.x configuration
-
- 9406-014 All HP-UX systems Script for Patch files may
- Permissions patches have become
- of patches obtained corrupted
- installed before
- before June 21, 1994
- 6/21/94
-
- 9407-015 HP 9000 700 Install 1 Unauthorized
- Xauthority patch access to the
- display
-
- 9408-016 Advisory All HP-UX none HP patch
- 9408-000 only systems checksums and
- HP security
- bulletin
- checksums
-
- 9409-017 System HP 9000 700,800 Install Users can
- Message HP-UX 8.x, 9.x appropriate increase their
- catalog patch(es) privileges
- (fileset dependent upon
- CORE-DIAG) configuration
-
- 9410-018 xwcreate HP 9000 300,400, Install 1 Files not owned
- and gwind 700,800 patch by a user can
- HP-UX 8.x, 9.x be removed by
- non-root users
-
-
- * All HP-UX bulletins have the prefix HPSBUX, for example bulletin
- 9311-001 would be requested from HP as HPSBUX9311-001.
-
-
- Appendix II: Details of each HP Bulletin
-
-
- After every patch is installed, be sure to examine /tmp/update.log
- for any relevant WARNINGs or ERRORs. This can be done by typing
- "tail -60 /tmp/update.log | more", then paging through the next three
- screens via the space bar, looking for WARNING or ERROR messages.
-
- ==================================================
- HPSBUX9311-001: Sendmail, dated November 12, 1993
-
- The patch to install depends on which operating system version and
- series you are currently using. Use the following chart to determine
- which patch to retrieve and install in /tmp:
-
- Operating Series Apply patch
- System
-
- HP-UX 8.x 300/400 PHNE_3995
- HP-UX 9.x 300/400 PHNE_3996
- HP-UX 8.x 700/800 PHNE_3371
- HP-UX 9.x 700/800 PHNE_4533
-
- No patches will be available for releases of HP-UX prior to 8.0. If
- you are running a version prior to 8.0, modify the sendmail
- configuration file /usr/lib/sendmail.cf to disable the "prog" mailer
- function. Directions are found in HP Bulletin HPSBUX9311-001.
-
- To apply the sendmail patch:
-
- a. Follow the installation instructions included with the patch.
- The update process kills the running sendmail, replaces the
- /usr/lib/sendmail binary, and starts the new sendmail. If you do not
- have a frozen configuration file (/usr/lib/sendmail.fc), skip steps
- b, c, and d. If you do use a frozen configuration file, continue
- with step b.
-
- b. Kill the running sendmail by typing: "/usr/lib/sendmail -bk"
-
- c. Freeze the configuration file by typing: "/etc/freeze"
-
- d. Restart the sendmail daemon by typing: "/usr/lib/sendmail -bd
- - -q30m"
-
- ==================================================
- HPSBUX9312-002: Xterm, dated November 30, 1993 (revised December 1,
- 1993)
-
- The patch to install depends on which operating system version and
- series you are currently using. Use the following chart to determine
- which patch to retrieve and install in /tmp:
-
- Operating Series Apply patch
- System
-
- HP-UX 9.x 700/800 PHSS_4866
- HP-UX 8.x 700 PHSS_3538
- HP-UX 8.x 800 PHSS_4218
- HP-UX 9.x 300/400 PHSS_4219
- HP-UX 8.x 300/400 PHSS_4216
-
- No patches will be available for releases of HP-UX prior to 8.0. If
- you are running a version prior to 8.0, a workaround can be
- accomplished by removing the setuid permissions from xterm. This
- workaround introduces other problems, however, and the main
- recommendation is that the system be upgraded to a supported version
- of the operating system.
-
- To install the patch, retrieve the patch and apply it per the
- installation instructions included with the patch.
-
- ==================================================
- HPSBUX9402-003: /etc/subnetconfig, dated February 7, 1994
-
- The patch to install depends on which operating system version and
- series you are currently using. The vulnerability only exists in
- HP-UX version 9.0 and 9.01 and has been fixed in 9.03. Use the
- following chart to determine which patch to retrieve and install in
- /tmp:
-
- Operating Series Apply patch
- System
-
- HP-UX 9.0, 9.01 700/800 PHNE_3564
- HP-UX 9.0 300/400 PHNE_3563
-
- To install the patch, retrieve the patch and apply it per the
- installation instructions included with the patch.
-
- ==================================================
- HPSBUX9402-004: /dev/nit, dated February 10, 1994
-
- This bulletin did not announce a patch, but noted a vulnerability
- inherent in networked machines. The following was taken directly
- from HPSBUX9402-004:
-
-
- Essentially, the security vulnerability lies in ANY HP SYSTEM THAT
- MAKES NETWORK CONNECTIONS across networks where hosts exist that
- have an intruder who has gained root access and is using a network
- monitoring tool on a promiscuous mode of a lan interface. The
- intruder can then gain information about the HP systems which are
- using the network for a connection.
-
- HP supports the promiscuous mode on two products: Apollo Token Ring
- and STREAMS- DLPI. These programs allow a root user to access the
- promiscuous mode and can therefore be used by an INTRUDER WHO HAS
- ALREADY GAINED ROOT ACCESS on the HP system, to learn about OTHER
- systems which are using the network.
-
- Systems with the Apollo Token Ring and STREAMS-DLPI are NO MORE
- VULNERABLE than any other systems; they just allow intruders that
- have already cracked the system, by some other means, to EXTEND the
- intrusion to other systems using the attached network.
-
- ==================================================
- HPSBUX9402-005: hpterm, dated February 22, 1994
-
- The patch to install depends on which operating system and series you
- are currently using. Use the following chart to determine which
- patch to retrieve and install in /tmp:
-
- Operating Series Apply patch(es)
- System
-
- HP-UX 9.X 700/800 PHSS_4685
- PHSS_4865
- HP-UX 9.X 300/400 PHSS_4527
- PHSS_4517
- HP-UX 8.X 700 PHSS_4525
- HP-UX 8.X 800 PHSS_4526
- HP-UX 8.X 300/400 PHSS_4524
-
-
- ==================================================
- HPSBUX9402-006: HP DCE/9000 Camera, dated February 24, 1994
-
- The vulnerability exists only in the Camera component of HP DCE/9000,
- in versions 1.1 and 1.2 of HP DCE/9000 and the associated HP DCE
- Developers' Environment used with HP-UX version 9.X.
-
- Obtain patch PHSS_3820, install it per the installation instructions
- included with the patch.
-
- ==================================================
- HPSBUX9404-007: Advisory on ftpd SITE EXEC, dated April 22, 1994
-
- HP distributed this Advisory to inform their users that their product
- line was and is NOT vulnerable to a certain security vulnerability
- within the UNIX operating system.
-
- ==================================================
- HPSBUX9404-008: HP Vue 3.0 dated April 19, 1994
-
- The patch to install depends on which operating system version and
- series you are currently using. The vulnerability only exists in
- HP-UX version 9.X. CIAC issued CIAC Bulletin E-23 on this
- vulnerability. Use the following chart to determine which patch to
- retrieve and install in /tmp:
-
- Series Apply patch
-
- 700/800 PHSS_4865
- 300/400 PHSS_4517
-
- To install the patch, retrieve the patch and apply it per the
- installation instructions included with the patch.
-
- Note that this patch is the same patch as in HP Bulletin
- HPSBUX9402-005 above. Only one installation of this patch is
- necessary.
-
- ==================================================
- HPSBUX9405-009: OSF/AES standard, dated May 5, 1994
-
- The vulnerability only exists on HP 9000 series 700 computers running
- HP-UX 9.01 or 9.03. Initially, the program cpio had been patched to
- work around the problem. Since this bulletin announces patches that
- remedy the problem, the workaround to cpio will be superseded via the
- installation of this cpio patch.
-
- Patch name Operating Series Apply patch(es)
- System
-
- OSF/AES patch HP-UX 9.01 700 PHKL_4942
- OSF/AES patch HP-UX 9.03, 9.05 700 PHKL_4943
- cpio patch HP-UX 9.X 700 PHCO_3533
-
- Obtain necessary patches, install per the installation instructions
- included with the patches.
-
- ==================================================
- HPSBUX9405-010: ftpd race condition and ftpd home directory, dated
- May 4, 1994
-
- This Advisory was distributed by HP to address a security issue with
- ftpd which was pertinent to many versions of UNIX. HP distributed
- this Advisory to inform their users that their product line was and
- is NOT vulnerable to a certain security vulnerability within ftpd
- involving a race condition.
-
- Secondly, HPSBUX9405-010 addressed an ftpd configuration problem.
- This issue is that the man page regarding ftpd recommends an insecure
- configuration for the permissions on the ftp home directory. The
- correct recommendation is that the ftp home directory should be owned
- by root.
-
- ==================================================
- HPSBUX9405-011: HP GlancePlus, dated May 4, 1994
-
- This vulnerability exists in product executables on all versions of
- HP-UX for HP GlancePlus product revision B.09.00 and earlier for
- series 700/800 systems and in the /usr/perf/bin/glance program up to
- and including revision A.09.06 for series 300/400 systems. The
- GlancePlus version can be determined on 9.X systems by using the
- "what" command.
-
- The fix is to update to the next version of GlancePlus, which is
- version B.09.01 on series 700/800 computers and A.09.07 on series
- 300/400 machines.
-
- No patch will be available for HP-UX 8.X. If you have an 8.X system,
- the workaround is to change the permissions to 744 for the files
- /usr/bin/ruxux/glance.
-
- ==================================================
- HPSBUX9405-012: Multimedia Sharedprint, dated May 4, 1994
-
- The vulnerability only exists on HP 9000 series 700 computers running
- HP-UX 9.X. To fix the problem perform the following three commands
- as root:
-
- chmod 544 /usr/imaging/pcl/util/update_pcl_fonts
- chmod 544 /usr/imaging/pcl/util/ssmak
- chmod 544 /usr/imaging/pcl/util/ixmak
-
- ==================================================
- HPSBUX9406-013: /usr/etc/vhe/vhe_u_mnt, dated June 21, 1994 (Revised
- July 5, 1994)
-
- The patch to install depends on which operating system version and
- series you are currently using. Use the following chart to determine
- which patch to retrieve and install in /tmp:
-
- Operating Series Apply patch
- System
-
- HP-UX 8.x, 9.x 700/800 PHNE_4434
- HP-UX 8.x, 9.x 300/400 PHNE_4363
-
- Obtain necessary patches, install per the installation instructions
- included with the patches.
-
- ==================================================
- HPSBUX9406-014: Patch permissions, dated July 5, 1994
-
- This bulletin describes file permission problems with patches
- retrieved and installed prior to the date of this bulletin. The
- permissions to these patches were set to vulnerable values. All
- patches from June 21, 1994 on will have the correct file permission
- values.
-
- If you have retrieved and installed patches prior to the date of HP
- Bulletin HPSBUX9406-014, then HP recommends that all patch
- directories in /system should be examined. This process can be
- simplified by retrieving HP Bulletin HPSBUX9406-014 and executing the
- three scripts supplied with that bulletin.
-
- If you are retrieving patches after June 21, 1994, the patches have
- all had their permissions set correctly, and no action need to be
- taken in response to this bulletin.
-
- ==================================================
- HPSBUX9407-015: Xauthority problem, dated July 13, 1994
-
- The vulnerability only exists in HP 9000 series 700 computers, using
- HP-UX version 9.X. Under certain conditions Xauthority will not be
- enabled, which can allow users logged into the X server's system to
- access the display without providing the Xauthority code.
-
- Obtain patch PHSS_4820 and install it per the installation
- instructions included with the patch.
-
- ==================================================
- HPSBUX9408-016: Patch Checksums dated August 29, 1994, and
- HPSBUX9408-000: dated August 31, 1994 (Revised October 12, 1994)
-
- HPSBUX9408-016 was the first HP advisory to announce the availability
- of checksum s for all previous HP patches, whether or not the patches
- relate to security vulnerabilities. HPSBUX9408-016 also contains
- source to the MD5 checksum utility, as well as a script entitled
- check_patch which performs the checking of patches. As more patches
- were released, HP decided to include the checksums for the HP
- security bulletins; these bulletin checksums are contained in
- HPSBUX9408-000.
-
- To obtain the MD5 program, following these steps:
-
- 1. Obtain HP Advisory HPSBUX9408-016 from HP by using the
- information contained on the first page of this CIAC Bulletin.
-
- 2. Extract the MD5 shar file from HPSBUX9408-016 and place it into
- the file md5.shar.
-
- 3. Unpack the source by typing sh md5.shar
-
- 4, Make and test the md5 program by typing make test. You will see
- the following output:
-
- cc -c -O -DMD=5 md5c.c
- cc -c -O -DMD=5 mddriver.c
- cc -o md5 md5c.o mddriver.o
- ./md5 -x | diff - test.rfc > diffs 2>&1
- *** MD5 Test Passed
- rm -f diffs
-
- 5. Extract the check_patch script from HPSBUX9408-016. This script
- unpacks a patch, computes the sums, and finds any matches in the
- hp-ux_patch_sums file. The script assumes that the patch and the
- hp-ux_patch_sums file are both in the working directory. It also
- assumes that md5 is installed and can be reached via $PATH.
-
- There are three ways to retrieve the current list of checksums for
- the patches themselves. They can be retrieved via WWW by connecting
- to HP's WWW server at http://support.mayfield.hp.com. To receive the
- list by email, send the words "send hp-ux_patch_sums" in the text
- portion of the message to support@support.mayfield.hp.com. This is
- the same method used as in the first page of this CIAC bulletin.
-
- The third, quickest method of retrieving the current list of
- checksums is to retrieve them via FTP from support.mayfield.hp.com
- (IP address 192.6.148.1) from the file
- ~/export/patches/hp-ux_patch_sums. Note that this is NOT available
- via ANONYMOUS FTP. Detailed directions for FTP access and self-
- registration of an account on support.mayfield.hp.com are included
- in HPSBUX9408-016.
-
- ==================================================
- HPSBUX9409-017: CORE-DIAG vulnerability, dated September 21, 1994
- (Revised October 18, 1994)
-
- This vulnerability can allow a user to increase their access
- privileges. The vulnerability exists for all HP-UX systems using the
- CORE-DIAG fileset. No patches will be available for versions of
- HP_UX prior to version 8.0.
-
- The patch to install depends on which operating system version and
- series you are currently using. To determine the operating system
- version of your system, display the file /system/UX-CORE/index with
- the "more" or "pr" command. The line will look similar to:
-
- fv: A.BX.YY.ZZ
-
- Where X is the major revision, YY is the minor revision, and ZZ is
- the PCO index. For example, if your system needed to install the last
- item on the chart below, (HP-UX 9.04.1k) the major revision would be
- "9", the minor revision would be "04" and the PCO index would be
- "1K". Note that these patches are quite large. Use the following
- chart to determine which patch to retrieve and install in /tmp:
-
- Operating System Series Apply patch
-
- HP-UX 8.05, 8.07 700 PHSS_4574
- HP-UX 9.01 700 PHSS_4475
- HP-UX 9.03, 9.05 700 PHSS_4863
- HP-UX 8.0, 8.06 800 PHSS_4578
- HP-UX 8.02 800 PHSS_4577
- HP-UX 9.00.2O or 9.00.3A 800 PHSS_4532
- HP-UX 9.00.4A 800 PHSS_4660
- HP-UX 9.04.1K or 9.04.2A 800 PHSS_4749
-
- Obtain necessary patches, install per the installation instructions
- included with the patches.
-
- ==================================================
- HPSBUX9410-018: xwcreate and gwind, dated October 12, 1994
-
- The program /usr/bin/X11/xwcreate is used to create X windows and
- devices files for raw-mode Starbase applications to display into. The
- xwcreate program invokes /usr/bin/X11/gwind which creates the device
- file. It is possible that existing files not owned by the user may
- be removed by using this software.
-
- The patch to install depends on which operating system version and
- series you are currently using. Use the following chart to determine
- which patch to retrieve and install in /tmp:
-
- Operating Series Apply patch
- System
-
- HP-UX 9.x 700/800 PHSS_4832
- HP-UX 8.x 700 PHSS_4834
- HP-UX 8.x 800 PHSS_4835
- HP-UX 9.x 300/400 PHSS_4833
- HP-UX 8.x 300/400 PHSS_4836
-
- Obtain necessary patches, install per the installation instructions
- included with the patches.
-
-
-
-
- ****************************************************************************
- * *
- * The point of contact for MILNET security-related incidents is the *
- * Security Coordination Center (SCC). *
- * *
- * E-mail address: SCC@NIC.DDN.MIL *
- * *
- * Telephone: 1-(800)-365-3642 *
- * *
- * NIC Help Desk personnel are available from 7:00 a.m.-7:00 p.m. EST, *
- * Monday through Friday except on federal holidays. *
- * *
- ****************************************************************************
-
- PLEASE NOTE: Some users outside of the DOD computing communities may receive
- DDN Security bulletins. If you are not part of the DOD community, please
- contact your agency's incident response team to report incidents. Your
- agency's team will coordinate with DOD. The Forum of Incident Response and
- Security Teams (FIRST) is a world-wide organization. A list of FIRST member
- organizations and their constituencies can be obtained by sending email to
- docserver@first.org with an empty subject line and a message body containing
- the line: send first-contacts.
-
- This document was prepared as an service to the DOD community. Neither the
- United States Government nor any of their employees, makes any warranty,
- expressed or implied, or assumes any legal liability or responsibility for
- the accuracy, completeness, or usefulness of any information, product, or
- process disclosed, or represents that its use would not infringe privately
- owned rights. Reference herein to any specific commercial products, process,
- or service by trade name, trademark manufacturer, or otherwise, does not
- necessarily constitute or imply its endorsement, recommendation, or favoring
- by the United States Government. The opinions of the authors expressed herein
- do not necessarily state or reflect those of the United States Government,
- and shall not be used for advertising or product endorsement purposes.
-
-