home *** CD-ROM | disk | FTP | other *** search
- Date: Wed, 31 Mar 1999 11:30:48 -0800 (PST)
- From: CIAC Mail User <ciac@rumpole.llnl.gov>
- To: ciac-bulletin@rumpole.llnl.gov
- Subject: CIAC Bulletin J-038: HP-UX Vulnerabilities (hpterm, ftp)
-
- [ For Public Release ]
- -----BEGIN PGP SIGNED MESSAGE-----
-
- __________________________________________________________
-
- The U.S. Department of Energy
- Computer Incident Advisory Capability
- ___ __ __ _ ___
- / | /_\ /
- \___ __|__ / \ \___
- __________________________________________________________
-
- INFORMATION BULLETIN
-
- HP-UX Vulnerabilities (hpterm, ftp)
- H-P Security Bulletins #00093 and #00094
-
- March 31, 1999 15:00 GMT Number J-038
- ______________________________________________________________________________
- PROBLEM: Two vulnerabilities have been identified by Hewlett-Packard
- Company.
- 1) PHSS_13560 introduced a library access problem into hpterm.
- 2) There is a Security Vulnerability during ftp operations.
- PLATFORM: 1) HP9000 Series 700 and Series 800, HP-UX release 10.20 only.
- 2) HP9000 Series 7/800 running HP-UX release 11.00 only.
- DAMAGE: Users can gain increased privileges.
- SOLUTION: Apply patches.
- ______________________________________________________________________________
- VULNERABILITY Risk is high. Both of these vulnerabilities affect systems
- ASSESSMENT: security. Patches should be applied as soon as possible.
- ______________________________________________________________________________
-
- [Start Hewlett-Packard Company Advisory]
-
- 1) PHSS_13560
-
- Document ID: HPSBUX9903-093
- Date Loaded: 19990317
- Title: Security Vulnerability with hpterm on HP-UX 10.20
-
- - -----------------------------------------------------------------------
- HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00093, 18 March 1999
- - -----------------------------------------------------------------------
-
- The information in the following Security Bulletin should be acted upon
- as soon as possible. Hewlett-Packard Company will not be liable for any
- consequences to any customer resulting from customer's failure to fully
- implement instructions in this Security Bulletin as soon as possible.
-
- - -----------------------------------------------------------------------
- PROBLEM: PHSS_13560 introduced a library access problem into hpterm.
-
- PLATFORM: HP9000 Series 700 and Series 800, HP-UX release 10.20 only.
-
- DAMAGE: Users can gain increased privileges.
-
- SOLUTION: Install PHSS_17830.
-
- AVAILABILITY: The patch is available now.
-
- - -----------------------------------------------------------------------
- I.
- A. Background
-
- PHSS_13560 introduced a library access problem into hpterm, the
- terminal emulator for the X Window system. (See hpterm(1)).
-
- B. Fixing the problem
-
- Installing patch PHSS_17830 completely fixes this problem.
-
- NOTE: Three older hpterm patches have been released including
- PHSS_13560, PHSS_15431, and PHSS_17332. All of these older
- patches are being superseded with the release of the
- PHSS_17830.
-
- Do not use PHSS_13560, PHSS_15431, or PHSS_17332.
-
-
- C. To subscribe to automatically receive future NEW HP Security
- Bulletins from the HP Electronic Support Center via electronic
- mail, do the following:
-
- Use your browser to get to the HP Electronic Support Center page
- at:
-
- http://us-support.external.hp.com
- (for US, Canada, Asia-Pacific, & Latin-America)
- http://europe-support.external.hp.com (for Europe)
-
- Login with your user ID and password (or register for one).
- Remember to save the User ID assigned to you, and your password.
- Once you are in the Main Menu:
- To -subscribe- to future HP Security Bulletins,
- click on "Support Information Digests".
- To -review- bulletins already released from the main Menu,
- click on the "Technical Knowledge Database (Security Bulletins
- only)".
- Near the bottom of the next page, click on "Browse the HP Security
- Bulletin Archive".
-
- Once in the archive there is another link to our current Security
- Patch Matrix. Updated daily, this matrix categorizes security
- patches by platform/OS release, and by bulletin topic.
-
- The security patch matrix is also available via anonymous ftp:
-
- us-ffs.external.hp.com
- ~ftp/export/patches/hp-ux_patch_matrix
-
- D. To report new security vulnerabilities, send email to
-
- security-alert@hp.com
-
- Please encrypt any exploit information using the security-alert
- PGP key, available from your local key server, or by sending a
- message with a -subject- (not body) of 'get key' (no quotes) to
- security-alert@hp.com.
-
- Permission is granted for copying and circulating this Bulletin to
- Hewlett-Packard (HP) customers (or the Internet community) for the
- purpose of alerting them to problems, if and only if, the Bulletin
- is not edited or changed in any way, is attributed to HP, and
- provided such reproduction and/or distribution is performed for
- non-commercial purposes.
-
- Any other use of this information is prohibited. HP is not liable
- for any misuse of this information by any third party.
- _____________________________________________________________________
- - ---End of Document ID: HPSBUX9903-093---------------------------------
-
- 2) ftp
-
- Document ID: HPSBUX9903-094
- Date Loaded: 19990323
- Title: Security Vulnerability with ftp on HP-UX 11.00
-
- - -----------------------------------------------------------------------
- HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00094, 24 March 1999
- - -----------------------------------------------------------------------
-
- The information in the following Security Bulletin should be acted upon
- as soon as possible. Hewlett-Packard Company will not be liable for any
- consequences to any customer resulting from customer's failure to fully
- implement instructions in this Security Bulletin as soon as possible.
-
- - -----------------------------------------------------------------------
- PROBLEM: Security Vulnerability during ftp operations.
-
- PLATFORM: HP9000 Series 7/800 running HP-UX release 11.00 only.
-
- DAMAGE: Users can increase privileges
-
- SOLUTION: Apply the patch specified below
-
- AVAILABILITY: The patch is available now.
- - -----------------------------------------------------------------------
- I.
- A. Background
- Hewlett-Packard Company has found that during normal operations,
- the ftp program might grant users increased privileges.
-
- B. Fixing the problem
- Obtaining and installing the following patch will completely close
- this vulnerability. Rebooting the system will NOT be required.
-
- For all HP9000 S7/800 platforms running HP-UX 11.00: PHCO_17601
-
- C. To subscribe to automatically receive future NEW HP Security
- Bulletins or access the HP Electronic Support Center, use your
- browser to get to our ESC web page at:
-
- http://us-support.external.hp.com (for non-European locations),
- or http://europe-support.external.hp.com (for Europe)
-
- Login with your user ID and password (or register for one).
- Remember to save the User ID/password assigned to you.
-
- Once you are in the Main Menu:
- To -subscribe- to future HP Security Bulletins,
- click on "Support Information Digests".
- To -review Security bulletins already released-,
- click on the "Search Technical Knowledge Database."
- To -retrieve patches-, click on "Individual Patches" and select
- appropriate release and locate with the patch identifier (ID).
- To -browse the HP Security Bulletin Archive-, select the link at
- the bottom of the page once in the "Support Information Digests".
- To -view the Security Patch Matrix-, (updated daily) which
- categorizes security patches by platform/OS release, and by
- bulletin topic, go to the archive (above) and follow the links.
-
- The security patch matrix is also available via anonymous ftp:
- us-ffs.external.hp.com or ~ftp/export/patches/hp-ux_patch_matrix
-
- D. To report new security vulnerabilities, send email to
-
- security-alert@hp.com
-
- Please encrypt any exploit information using the security-alert
- PGP key, available from your local key server, or by sending a
- message with a -subject- (not body) of 'get key' (no quotes) to
- security-alert@hp.com.
-
- Permission is granted for copying and circulating this Bulletin to
- Hewlett-Packard (HP) customers (or the Internet community) for the
- purpose of alerting them to problems, if and only if, the Bulletin
- is not edited or changed in any way, is attributed to HP, and
- provided such reproduction and/or distribution is performed for
- non-commercial purposes.
-
- Any other use of this information is prohibited. HP is not liable
- for any misuse of this information by any third party.
- ______________________________________________________________________
- - ---End of Document ID: HPSBUX9903-094---------------------------------
-
- [End Hewlett-Packard Company Advisory]
- ___________________________________________________________________________
-
-
- CIAC wishes to acknowledge the contributions of Hewlett-Packard Company for
- the information contained in this bulletin.
- ___________________________________________________________________________
-
-
-
- CIAC, the Computer Incident Advisory Capability, is the computer
- security incident response team for the U.S. Department of Energy
- (DOE) and the emergency backup response team for the National
- Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
- National Laboratory in Livermore, California. CIAC is also a founding
- member of FIRST, the Forum of Incident Response and Security Teams, a
- global organization established to foster cooperation and coordination
- among computer security teams worldwide.
-
- CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
- can be contacted at:
- Voice: +1 925-422-8193
- FAX: +1 925-423-8002
- STU-III: +1 925-423-2604
- E-mail: ciac@llnl.gov
-
- For emergencies and off-hour assistance, DOE, DOE contractor sites,
- and the NIH may contact CIAC 24-hours a day. During off hours (5PM -
- 8AM PST), call the CIAC voice number 925-422-8193 and leave a message,
- or call 800-759-7243 (800-SKY-PAGE) to send a Sky Page. CIAC has two
- Sky Page PIN numbers, the primary PIN number, 8550070, is for the CIAC
- duty person, and the secondary PIN number, 8550074 is for the CIAC
- Project Leader.
-
- Previous CIAC notices, anti-virus software, and other information are
- available from the CIAC Computer Security Archive.
-
- World Wide Web: http://www.ciac.org/
- (or http://ciac.llnl.gov -- they're the same machine)
- Anonymous FTP: ftp.ciac.org
- (or ciac.llnl.gov -- they're the same machine)
- Modem access: +1 (925) 423-4753 (28.8K baud)
- +1 (925) 423-3331 (28.8K baud)
-
- CIAC has several self-subscribing mailing lists for electronic
- publications:
- 1. CIAC-BULLETIN for Advisories, highest priority - time critical
- information and Bulletins, important computer security information;
- 2. SPI-ANNOUNCE for official news about Security Profile Inspector
- (SPI) software updates, new features, distribution and
- availability;
- 3. SPI-NOTES, for discussion of problems and solutions regarding the
- use of SPI products.
-
- Our mailing lists are managed by a public domain software package
- called Majordomo, which ignores E-mail header subject lines. To
- subscribe (add yourself) to one of our mailing lists, send the
- following request as the E-mail message body, substituting
- ciac-bulletin, spi-announce OR spi-notes for list-name:
-
- E-mail to ciac-listproc@llnl.gov or majordomo@tholia.llnl.gov:
- subscribe list-name
- e.g., subscribe ciac-bulletin
-
- You will receive an acknowledgment email immediately with a confirmation
- that you will need to mail back to the addresses above, as per the
- instructions in the email. This is a partial protection to make sure
- you are really the one who asked to be signed up for the list in question.
-
- If you include the word 'help' in the body of an email to the above address,
- it will also send back an information file on how to subscribe/unsubscribe,
- get past issues of CIAC bulletins via email, etc.
-
- PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
- communities receive CIAC bulletins. If you are not part of these
- communities, please contact your agency's response team to report
- incidents. Your agency's team will coordinate with CIAC. The Forum of
- Incident Response and Security Teams (FIRST) is a world-wide
- organization. A list of FIRST member organizations and their
- constituencies can be obtained via WWW at http://www.first.org/.
-
- This document was prepared as an account of work sponsored by an
- agency of the United States Government. Neither the United States
- Government nor the University of California nor any of their
- employees, makes any warranty, express or implied, or assumes any
- legal liability or responsibility for the accuracy, completeness, or
- usefulness of any information, apparatus, product, or process
- disclosed, or represents that its use would not infringe privately
- owned rights. Reference herein to any specific commercial products,
- process, or service by trade name, trademark, manufacturer, or
- otherwise, does not necessarily constitute or imply its endorsement,
- recommendation or favoring by the United States Government or the
- University of California. The views and opinions of authors expressed
- herein do not necessarily state or reflect those of the United States
- Government or the University of California, and shall not be used for
- advertising or product endorsement purposes.
-
- LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
-
- J-027: Digital Unix Vulnerabilities ( at , inc )
- J-028: Sun Solaris Vulnerabilities (sdtcm_convert, man/catman, CDE)
- J-029: Buffer Overflows in Various FTP Servers
- J-030: Microsoft BackOffice Vulnerability
- J-031: Debian Linux "Super" package Buffer Overflow
- J-032: Windows Backdoors Update II:
- J-034: Cisco 7xx TCP and HTTP Vulnerabilities
- J-035: Linux Blind TCP Spoofing
- J-036: LDAP Buffer overflow against Microsoft Directory Services
- J-037: W97M.Melissa Word Macro Virus
-
- -----BEGIN PGP SIGNATURE-----
- Version: 4.0 Business Edition
-
- iQCVAwUBNwJkHLnzJzdsy3QZAQHrWAP9E27Nc3P8XLWJ1IM/JOzMdHy5mvymnUdh
- dzkEuldX35r+KGPlZYGxAq6NbKeYQFgi24C1OHg7V/MhcgnXKHPB6DN7Zdd6g6ii
- sUAnZ7LD3MqQb7OIMq2D3GdWzLzn/u5qpanKt1VjNYtQCGi4RbH9YgJFnLFgma8I
- dX/jer4bE6M=
- =Q2lE
- -----END PGP SIGNATURE-----
-
-
-