exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

S-95-02.asc

S-95-02.asc
Posted Jan 10, 2000

Subject New and Revised HP Bulletins Date 20-Jan-95

SHA-256 | 6646224966ca97c89c1135d0fa0c39566581c1b19978d30839da4b113944ea66

S-95-02.asc

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===============================================================================
>> CERT-NL, 01-Mar-2000 <<
>> All CERT-NL information has been moved to http://cert.surfnet.nl. Links <<
>> to CERT-NL information contained in this advisory are therefore outdated. <<
>> <<
>> CERT-NL also has stopped the CERT-CC-Mirror service. Due to this the <<
>> links to the CERT-CC mirror are obsolete. Visit the CERT-CC site for the <<
>> complete CERT-CC advisory texts: http://www.cert.org <<
===============================================================================
===============================================================================
Security Advisory CERT-NL
===============================================================================
Author/Source : Don Stikvoort Index : S-95-02
Distribution : World Page : 1
Classification: External Version: Final
Subject : New and Revised HP Bulletins Date : 20-Jan-95
===============================================================================

By courtesy of CIAC and Hewlett Packard we received the following
information about new and revised HP Bulletins. It is a revised version
of CIAC Information Bulletin F-07.

We advise you to pay thorough attention if this applies to you.

How to get other CERT-NL advisories and how to contact us, you will find
at the very bottom of this document.

===============================================================================

_____________________________________________________________________________
PROBLEM: Security vulnerabilities in HP-UX Support Watch and
CORE-DIAG fileset.
PLATFORM: HP 9000 series 700 and 800, for versions see below.
DAMAGE: Users can increase access privileges.
SOLUTION: Apply appropriate security patches.
_____________________________________________________________________________
VULNERABILITY These vulnerabilities are widely known and used to compromise
ASSESSMENT: systems. CIAC urges affected sites to install the
appropriate patches immediately.
______________________________________________________________________________

Critical Information about the New and Revised HP Bulletins

CIAC has obtained information from Hewlett Packard regarding a new security
vulnerability and a revision to an existing security patch.

The patches are presented first in a table format (Appendix 1), then a
summary of the vulnerability information is presented for each patch
(Appendix 2).

CIAC has also created a document which contains the entire list of all
HP Bulletins and patches, INCLUDING the ones mentioned here. This
document is separately distributed as CERT-NL document S-95-03 :
Summary of security related HP patches.

HP has set up an automatic server to allow patches and other security
information to be retrieved over the Internet. To utilize this server,
send a message to support@support.mayfield.hp.com. The subject line of the
message will be ignored. The body (text) of the message should contain the
words

send XXXX

where XXXX is the identifier for the information you want retrieved. For
example, to retrieve the patch PHSS_4834, the message would be "send
PHSS_4834".

Other information that can be retrieved include the HP SupportLine mail
service user's guide (send guide.txt), the readme file for a patch (send
doc PHSS_4834), and the original HP bulletin (send doc HPSBUX9410-018).

HP also has a World Wide Web server to browse and retrieve bulletins and
patches. To utilize this server, use a WWW client and connect to
http://support.mayfield.hp.com.

IMPORTANT NOTE: Hewlett Packard updates patches periodically. These
updates are not reflected in the text of each HP bulletin. The overview
presented here contains current information on the patches available at
the time of the release of this CIAC bulletin. If you request an updated
patch, when you try to retrieve the patch you will receive a message
stating that the patch is obsolete and the name of the patch which
supersedes it.

Hewlett Packard has made sum and MD5 checksums available for their patches
and for their security bulletins. See the detailed explanation for
HPSBUX9408-016 in CIAC bulletin F-02 for information on how to access and
utilize these checksums.

CIAC wishes to thank Hewlett Packard for the information contained in this
bulletin.

______________________________________________________________________________


Appendix 1: Table of HP Security Bulletins


* HP Progs Patches to Overview of
Bulletin Affected Platform Install Vulnerability

9411-019 Support HP 9000 700,800 PHSS_4874 Users can
Watch HP-UX 8.0, 8.02, potentially
8.06, and 9.0 only increase access
privileges.

9409-017 System HP 9000 700,800 Install Users can
Message HP-UX 8.x, 9.x appropriate increase their
catalog patch(es) privileges
(fileset dependent upon
CORE-DIAG) configuration


* All HP-UX bulletins have the prefix HPSBUX, for example bulletin 9311-019
would be requested from HP as HPSBUX9311-019.

______________________________________________________________________________


Appendix 2: Details of each HP Bulletin


After every patch is installed, be sure to examine /tmp/update.log for any
relevant WARNINGs or ERRORs. This can be done by typing "tail -60
/tmp/update.log | more", then paging through the next three screens via the
space bar, looking for WARNING or ERROR messages.

==================================================
HPSBUX9411-019: Support Watch, dated November 30, 1994

This vulnerability, which can allow users to increase their access
privileges, exists ONLY in HP 9000 series 800 running HP-UX revisions 8.0,
8.02, 8.06 and 9.0. Later HP-UX releases including 9.04 are NOT affected by
this vulnerability.

Obtain patch PHSS_4874, install it per the installation instructions included
with the patch.

==================================================
HPSBUX9409-017: CORE-DIAG vulnerability, dated September 21, 1994 (Revised
October 18, 1994, then revised December 1, 1994)

This vulnerability can allow a user to increase their access privileges. The
vulnerability exists for all HP-UX systems using the CORE-DIAG fileset. No
patches will be available for versions of HP_UX prior to version 8.0.

The patch to install depends on which operating system version and series you
are currently using. To determine the operating system version of your
system, display the file /system/UX-CORE/index with the "more" or "pg"
command. The line will look similar to:

fv: A.BX.YY.ZZ

Where X is the major revision, YY is the minor revision, and ZZ is the PCO
index. For example, if your system needed to install an item on the chart
below, (HP-UX 9.00.4A) the major revision would be "9", the minor revision
would be "00" and the PCO index would be "4A". Note that these patches are
quite large. Use the following chart to determine which patch to retrieve and
install in /tmp:

Operating System Series Apply patch

HP-UX 8.0, 8.06 800 PHSS_4578
HP-UX 8.02 800 PHSS_4577
HP-UX 8.05, 8.07 700 PHSS_4574
HP-UX 9.00.2O or 9.00.3A 800 PHSS_4532
HP-UX 9.00.4A 800 PHSS_4660
HP-UX 9.01 700 PHSS_4475
HP-UX 9.03, 9.05 700 PHSS_5037
HP-UX 9.04 800 PHSS_4913

Obtain necessary patches, install per the installation instructions included
with the patches.
==============================================================================
CERT-NL is the Computer Emergency Response Team for SURFnet customers. SURFnet
is the Dutch network for educational, research and related institutes. CERT-NL
is a member of the Forum of Incident Response and Security Teams (FIRST).

All CERT-NL material is available under:
http://cert.surfnet.nl/

In case of computer or network security problems please contact your local
CERT/security-team or CERT-NL (if your institute is NOT a SURFnet customer
please address the appropriate (local) CERT/security-team).

CERT-NL is one/two hour(s) ahead of UTC (GMT) in winter/summer,
i.e. UTC+0100 in winter and UTC+0200 in summer (DST).

Email: cert-nl@surfnet.nl ATTENDED REGULARLY ALL DAYS
Phone: +31 302 305 305 BUSINESS HOURS ONLY
Fax: +31 302 305 329 BUSINESS HOURS ONLY
Snailmail: SURFnet bv
Attn. CERT-NL
P.O. Box 19035
NL - 3501 DA UTRECHT
The Netherlands

NOODGEVALLEN: 06 22 92 35 64 ALTIJD BEREIKBAAR
EMERGENCIES : +31 6 22 92 35 64 ATTENDED AT ALL TIMES
CERT-NL'S EMERGENCY PHONENUMBER IS ONLY TO BE USED IN CASE OF EMERGENCIES:
THE SURFNET HELPDESK OPERATING THE EMERGENCY NUMBER HAS A *FIXED*
PROCEDURE FOR DEALING WITH YOUR ALERT AND WILL IN REGULAR CASES RELAY IT
TO CERT-NL IN AN APPROPRIATE MANNER. CERT-NL WILL THEN CONTACT YOU.
===============================================================================

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.1i

iQA/AwUBOL6IDDSYjBqwfc9jEQIhMACfdROVlv/cJVyHxw3N3uNp8JhUomUAoMjv
nK67ouGni9c+Tol/99JbNAjP
=a1/3
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close