what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

f-07a.ciac-new-revised-HP-bul

f-07a.ciac-new-revised-HP-bul
Posted Sep 23, 1999

f-07a.ciac-new-revised-HP-bul

SHA-256 | 0608b2575014a1f9f7907f5c9dba9e4b11cc0ec2cc2c29cd0fa0261b98c00739

f-07a.ciac-new-revised-HP-bul

Change Mirror Download
            _____________________________________________________
The U.S. Department of Energy
Computer Incident Advisory Capability
___ __ __ _ ___
/ | /_\ /
\___ __|__ / \ \___
_____________________________________________________

INFORMATION BULLETIN

New and Revised HP Bulletins

January 20, 1995 1300 PST Number F-07a
_____________________________________________________________________________

PROBLEM: Security vulnerabilities in HP-UX Support Watch and
CORE-DIAG fileset.
PLATFORM: HP 9000 series 700 and 800, for versions see below.
DAMAGE: Users can increase access privileges.
SOLUTION: Apply appropriate security patches.
_____________________________________________________________________________

VULNERABILITY These vulnerabilities are widely known and used to compromise
ASSESSMENT: systems. CIAC urges affected sites to install the
appropriate patches immediately.
______________________________________________________________________________

Critical Information about the New and Revised HP Bulletins

CIAC has obtained information from Hewlett Packard regarding a new security
vulnerability and a revision to an existing security patch. This bulletin
contains information which updates CIAC Bulletin F-02 (Summary of HP
Bulletins).

The patches are presented first in a table format, then a summary of the
vulnerability information is presented for each patch.

CIAC has also created a document, available on our FTP server ciac.llnl.gov as
/pub/ciac/bulletin/f-fy95/hppatchs.txt. This document contains the entire
list of all HP Bulletins and patches, and is an update to CIAC Bulletin F-02.

HP has set up an automatic server to allow patches and other security
information to be retrieved over the Internet. To utilize this server, send a
message to support@support.mayfield.hp.com. The subject line of the message
will be ignored. The body (text) of the message should contain the words

send XXXX

where XXXX is the identifier for the information you want retrieved. For
example, to retrieve the patch PHSS_4834, the message would be "send
PHSS_4834".

Other information that can be retrieved include the HP SupportLine mail
service user's guide (send guide.txt), the readme file for a patch (send doc
PHSS_4834), and the original HP bulletin (send doc HPSBUX9410-018).

HP also has a World Wide Web server to browse and retrieve bulletins and
patches. To utilize this server, use a WWW client and connect to
http://support.mayfield.hp.com.

IMPORTANT NOTE: Hewlett Packard updates patches periodically. These updates
are not reflected in the text of each HP bulletin. The overview presented
here contains current information on the patches available at the time of the
release of this CIAC bulletin. If you request an updated patch, when you try
to retrieve the patch you will receive a message stating that the patch is
obsolete and the name of the patch which supersedes it.

Hewlett Packard has made sum and MD5 checksums available for their patches
and for their security bulletins. See the detailed explanation for
HPSBUX9408-016 in CIAC bulletin F-02 for information on how to access and
utilize these checksums.
_____________________________________________________________________________

CIAC wishes to thank Hewlett Packard for the information contained in this
bulletin.
_____________________________________________________________________________

CIAC is the computer security incident response team for the U.S. Department
of Energy. Services are available free of charge to DOE and DOE contractors.

------------------- A - T - T - E - N - T - I - O - N ---------------------
For emergencies and off-hour assistance, DOE and DOE contractor sites can
contact CIAC 24-hours a day via an integrated voicemail and SKYPAGE number.
To use this service, dial 1-510-422-8193 or 1-800-759-7243 (SKYPAGE). The
primary SKYPAGE PIN number, 8550070 is for the CIAC duty person. A second
PIN, 8550074 is for the CIAC Project Leader. CIAC's FAX number is
510-423-8002, and the STU-III number is 510-423-2604. Send E-mail to
ciac@llnl.gov.
---------------------------------------------------------------------------

Previous CIAC Bulletins and other information are available via anonymous FTP
from ciac.llnl.gov (IP address 128.115.19.53).

CIAC has several self-subscribing mailing lists for electronic publications:
1. CIAC-BULLETIN for Advisories, highest priority - time critical
information, and Bulletins, important computer security information;
2. CIAC-NOTES for Notes, a collection of computer security articles;
3. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI)
software updates, new features, distribution and availability;
4. SPI-NOTES, for discussion of problems and solutions regarding the use of
SPI products.

CIAC's mailing lists are managed by a public domain software package called
ListProcessor, which ignores E-mail header subject lines. To subscribe (add
yourself) to one of our mailing lists, send the following request as the
E-mail message body, substituting CIAC-BULLETIN, CIAC-NOTES, SPI-ANNOUNCE or
SPI-NOTES for "list-name" and valid information for "LastName" "FirstName"
and "PhoneNumber" when sending

E-mail to ciac-listproc@llnl.gov:
subscribe list-name LastName, FirstName PhoneNumber
e.g., subscribe ciac-notes O'Hara, Scarlett 404-555-1212 x36

You will receive an acknowledgment containing address, initial PIN, and
information on how to change either of them, cancel your subscription, or get
help.
_____________________________________________________________________________

PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins. If you are not part of these communities, please
contact your agency's response team to report incidents. Your agency's team
will coordinate with CIAC. The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization. A list of FIRST member organizations
and their constituencies can be obtained by sending E-mail to
first-request@first.org with an empty subject line and a message body
containing the line: send first-contacts.

This document was prepared as an account of work sponsored by an agency of
the United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for
the accuracy, completeness, or usefulness of any information, product, or
process disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products, process,
or service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring
by the United States Government or the University of California. The views
and opinions of authors expressed herein do not necessarily state or reflect
those of the United States Government nor the University of California, and
shall not be used for advertising or product endorsement purposes.


Appendix 1: Table of HP Security Bulletins


* HP Progs Patches to Overview of
Bulletin Affected Platform Install Vulnerability

9411-019 Support HP 9000 700,800 PHSS_4874 Users can
Watch HP-UX 8.0, 8.02, potentially
8.06, and 9.0 only increase access
privileges.

9409-017 System HP 9000 700,800 Install Users can
Message HP-UX 8.x, 9.x appropriate increase their
catalog patch(es) privileges
(fileset dependent upon
CORE-DIAG) configuration


* All HP-UX bulletins have the prefix HPSBUX, for example bulletin 9311-019
would be requested from HP as HPSBUX9311-019.


Appendix II: Details of each HP Bulletin


After every patch is installed, be sure to examine /tmp/update.log for any
relevant WARNINGs or ERRORs. This can be done by typing "tail -60
/tmp/update.log | more", then paging through the next three screens via the
space bar, looking for WARNING or ERROR messages.

==================================================
HPSBUX9411-019: Support Watch, dated November 30, 1994

This vulnerability, which can allow users to increase their access
privileges, exists ONLY in HP 9000 series 800 running HP-UX revisions 8.0,
8.02, 8.06 and 9.0. Later HP-UX releases including 9.04 are NOT affected by
this vulnerability.

Obtain patch PHSS_4874, install it per the installation instructions included
with the patch.

==================================================
HPSBUX9409-017: CORE-DIAG vulnerability, dated September 21, 1994 (Revised
October 18, 1994, then revised December 1, 1994)

This vulnerability can allow a user to increase their access privileges. The
vulnerability exists for all HP-UX systems using the CORE-DIAG fileset. No
patches will be available for versions of HP_UX prior to version 8.0.

The patch to install depends on which operating system version and series you
are currently using. To determine the operating system version of your
system, display the file /system/UX-CORE/index with the "more" or "pg"
command. The line will look similar to:

fv: A.BX.YY.ZZ

Where X is the major revision, YY is the minor revision, and ZZ is the PCO
index. For example, if your system needed to install an item on the chart
below, (HP-UX 9.00.4A) the major revision would be "9", the minor revision
would be "00" and the PCO index would be "4A". Note that these patches are
quite large. Use the following chart to determine which patch to retrieve and
install in /tmp:

Operating System Series Apply patch

HP-UX 8.0, 8.06 800 PHSS_4578
HP-UX 8.02 800 PHSS_4577
HP-UX 8.05, 8.07 700 PHSS_4574
HP-UX 9.00.2O or 9.00.3A 800 PHSS_4532
HP-UX 9.00.4A 800 PHSS_4660
HP-UX 9.01 700 PHSS_4475
HP-UX 9.03, 9.05 700 PHSS_4863
HP-UX 9.04 800 PHSS_4913

Obtain necessary patches, install per the installation instructions included
with the patches.

____________________________________________________________________________

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close