exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

assist.414

assist.414
Posted Sep 23, 1999

assist.414

SHA-256 | 5bbf7273721a062b23979f73b0c7f9ede932e3a78378283390886c92ac48fbe6

assist.414

Change Mirror Download

-----BEGIN PRIVACY-ENHANCED MESSAGE-----
Proc-Type: 4,MIC-CLEAR
Content-Domain: RFC822
Originator-Certificate: MIICozCCAgwCAREwDQYJKoZIhvcNAQECBQAwgYYxC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Issuer-Certificate: MIICNTCCAZ4CASIwDQYJKoZIhvcNAQECBQAwRDELMAkGA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Issuer-Certificate: MIIB8jCCAVsCAQEwDQYJKoZIhvcNAQECBQAwRDELMAkGA
1UEBhMCVVMxCzAJBgNVBAgTAk1EMSgwJgYDVQQKEx9UcnVzdGVkIEluZm9ybWF0a
W9uIFN5c3RlbXMgUENBMB4XDTkzMDUyODE3MTEyN1oXDTk1MDUyODE3MTEyN1owR
DELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAk1EMSgwJgYDVQQKEx9UcnVzdGVkIEluZ
m9ybWF0aW9uIFN5c3RlbXMgUENBMIGaMAoGBFUIAQECAgQAA4GLADCBhwKBgQDbL
xaRlS3u54yyRgVDI5dcE9nlasL8fJqOGlyo7xH2FZnr3kUfsFj7OGiYsr6UbvqwK
nyfMIRUrXDUa64leGmft3SK27psDUHOynRSCc40d/HrDf810U5tnTamBKUIMqivK
4GoL0tMRA1eX6hALAvLLgK1HbnwZAo6GqQGW8CIJQIBAzANBgkqhkiG9w0BAQIFA
AOBgQDBp5aC6oV6IuFi8JCctq57bew604HHNllgjjp7zdXafq6jctRg2g91k/yFW
h19bJC/tNrb0WVwuZOs5L/FToPMNIIHzaW/YSROBmyhTDYaKHZGj0P1+iNjMbHt9
dm1QEHGIfKgBwFidItnOa74DfkXdijlPRnr/+E2Ib6PM+hEfQ==
MIC-Info: RSA-MD5,RSA,dfX2LYNKRiZeiz5BT48+RyrcnYoyqin/vF53RZD9S1U
SMIaC0DisQ96pPgqZM+Ulc0+RJ4KTRF4/Byk4msnZUqxEV6WT/d4018u2CQBKHjI
cR5zu0RHdBY3FH6dqA4WTMsOHXI83M7FBiRqZtwFZLkPcU/VNqhZaqIWVtSjq9SM
=


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Automated Systems Security Incident Support Team
_____
___ ___ _____ ___ _____ | /
/\ / \ / \ | / \ | | / Integritas
/ \ \___ \___ | \___ | | < et
/____\ \ \ | \ | | \ Celeritas
/ \ \___/ \___/ __|__ \___/ | |_____\
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Bulletin 94-14

Release date: 6 May 1994, 0830 PM EDT

SUBJECT: Security vulnerability in Hewlett Packard (HP) UX
systems.

SUMMARY: A vulnerability exists in HP-UX systems running HP Vue
3.0. HP has issued the PHSS_4055 (for models 300/400) and
PHSS_4038 (for models 700/800) patches to fix the problem. The
patch can be obtained from the HP SupportLine Mail Service
using the following procedure:
To obtain the patch, send the following in the TEXT PORTION
OF THE MESSAGE to support@support.mayfield.hp.com
(no Subject is required):

send PHSS_4038

or

send PHSS_4055

It will automatically be emailed back to you. Note that
users may also download the patch from HP SupportLine via
ftp, kermit, or uucp.

The patch can be obtained via FTP with an established
SupportLine handle & password using the following procedure:
Telnet to 192.6.148.19 and login as hpsl. You will be prompted
for your system handle and password. You should then select
"3 Patch support information", followed by "3 Retrieve patch
file transfer login". This will give you an ftp login account.
Exit hpsl and ftp to 192.6.148.19. Use the account name you
received and your usual password.

The patch can be obtained via FTP without established SupportLine
handle & password using the following procedure:
If you do not already have an HP SupportLine handle and pass-
word, you must first telnet to support.mayfield.hp.com and log
into the HP SupportLine Self-Registration as "hpslreg", then
follow the on-screen prompts. At the end of the prompts, a
system handle and password will be assigned to you; you will
need these in the future to access the HP SupportLine located
in the United States. You can then follow the instructions in
paragraph 1a above.
NOTE: This procedure only registers for the HP SupportLine
system in the United States; users outside the U.S. need to
contact their local Hewlett Packard support representative.

If you need additional assistance and have a support contract, you
can contact your local Response Center for additional help.

BACKGROUND: A vulnerability has been discovered which allows non
privileged users of HP 9000 series machines with models
300/400/700/800 at HP-UX revision 9.X and running HP Vue 3.0 to
obtain root privileges. Other versions of HP-UX and HP Vue do not
have this vulnerability.

IMPACT: Unauthorized users can gain root access.

RECOMMENDED SOLUTION: Obtain and install the appropriate patch on
all affected HP systems. After you have the patch, list the file
with the command "more PHSS_40XX" (XX is 38 or 55) to verify it
is the most current version. If it has been replaced the
following will be displayed:
OBSOLETE
REPLACED
BY
PHSS_NNNN

The complete instructions for applying the patch are in
PHSS_40xx.text. Examine /tmp/update.log for any relevant WARNINGs
or ERRORs. This can be done as follows:
At the shell prompt, type "tail -60 /tmp/update.log | more".
Page through the next three screens via the space bar, looking
for WARNING or ERROR messages.

ASSIST is an element of the Defense Information Systems Agency
(DISA), Center for Information Systems Security (CISS), that
provides service to the entire DoD community. If you are a
constituent of the DoD and have any questions about ASSIST or
computer security issues, contact ASSIST using one of the methods
listed below. If your organization/institution is non-DoD,
contact your Forum of Incident Response and Security Teams
(FIRST) representative. You can obtain a list of FIRST member
organizations and their constituencies by sending email to
docserver@first.org with an empty "subject" line and a message body
containing the line "send first-contacts".

ASSIST INFORMATION RESOURCES: If you would like to be included in
the distribution list for these bulletins, send your Milnet
(Internet) e-mail address to assist-request@assist.ims.disa.mil.
Back issues of ASSIST bulletins, and other security related
information, are available from the ASSIST BBS at 703-756-7993/
1154 DSN 289, and through anonymous FTP from assist.ims.disa.mil
(IP address 137.130.234.30). Note: assist.ims.disa.mil will only
accept anonymous FTP connections from Milnet addresses that are
registered with the NIC or DNS.

ASSIST contact information:
PHONE: 703-756-7974, DSN 289, duty hours are 06:00 to 22:30 EST
Monday through Friday. During off duty hours, weekends, and
holidays, ASSIST can be reached via pager at 800-SKY-PAGE
(800-759-7243) PIN 2133937. Your page will be answered within 30
minutes, however if a quicker response is required, prefix
your phone number with "999".
ELECTRONIC MAIL: Send to assist@assist.ims.disa.mil.
ASSIST BBS: Leave a message for the "sysop".

Privacy Enhanced Mail (PEM): ASSIST uses PEM, a public key
encryption tool, to digitally sign all bulletins that are
distributed through e-mail. The section of seemingly random
characters between the "BEGIN PRIVACY-ENHANCED MESSAGE" and
"BEGIN ASSIST BULLETIN" contains machine-readable digital
signature information generated by PEM, not corrupted data. PEM
software for UNIX systems is available from Trusted Information
Systems (TIS) at no cost, and can be obtained via anonymous FTP
from ftp.tis.com (IP 192.94.214.100). Note: The TIS software is
just one of several implementations of PEM currently available and
additional versions are likely to be offered from other
sources in the near future.

Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does
not constitute or imply its endorsement, recommendation, or
favoring by ASSIST. The views and opinions of authors expressed
herein shall not be used for adverstising or product endorsement
purposes.

-----END PRIVACY-ENHANCED MESSAGE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close