exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

compaq.99-06-07.cmas

compaq.99-06-07.cmas
Posted Sep 23, 1999

compaq.99-06-07.cmas

SHA-256 | d4fc5597b93a3b75535200f01bfde7e8be9d75b49c0a07928c8973db3e601ea6

compaq.99-06-07.cmas

Change Mirror Download

From kunza@tdbank.ca Mon Jun 14 04:20:12 1999
From: Andrew Kunz <kunza@tdbank.ca>
To: BUGTRAQ@netspace.org
Date: Mon, 7 Jun 1999 10:28:22 -0400
Subject: Update on compaq webadmin

[The following text is in the "iso-8859-1" character set]
[Your display is set for the "US-ASCII" character set]
[Some characters may be displayed incorrectly]

Look what compaq figured out <grin>


For Immediate Release 1 June 7, 1999
Compaq Computer Corporation
Compaq Security Advisory
Posted: June 7, 1999
Compaq Management Agent Security Vulnerability
Summary
As part of an ongoing concern about security and Internet technology, Compaq
has identified a potential
security hole in the web-enabled portion of Compaq Management Agents and the
Compaq Survey Utility
when installed as an agent. This security hole can allow read access to
files whose location and filename
are known or be used to terminate the process controlling the web agents.
This affects the web component
of Compaq Management Agents version 4.0 and greater and the Compaq Survey
Utility version 2.0 and
greater when installed as an agent. SNMP and DMI components without the web
capability enabled
are not affected.
While there are no reports of customers being adversely affected by this
vulnerability, Compaq is
proactively releasing this bulletin to allow customers to take appropriate
action to protect themselves
against it.
Issue
The web component of Compaq Management Agents version 4.0 and greater and
Compaq Survey Utility
2.0 and greater provide HTTP services to allow management information to be
accessible through a web
browser. Compaq has always advocated that these agents and utilities be
deployed only in private networks
and were not for use on the Internet or systems outside the bounds of a
firewall. Because of this, Compaq
believes that the primary threat is an internal one.
These agents have been discovered to be vulnerable to a file read security
hole which allows files whose
location and name are known to be read on the file system on which the
agents are installed and an
overflow security hole that potentially terminates the web agent process. In
some cases with Novell
NetWare it has caused the server to stop responding.
Affected Software Versions
This affects the web component of all Compaq Management Agents 4.0 and
greater running with Windows
NT, Windows 9x, Windows 2000, NetWare and Tru64 Unix. Additionally affected
is the Compaq Survey
Utility 2.0 and greater when installed as an agent on Windows NT or NetWare.
Agent software affected
includes those installed on ProLiant and Prosignia servers (since May,
1998), AlphaServers with Windows
NT (since October, 1998), AlphaServers with Tru64 Unix (since May, 1999),
DIGITAL Intel Servers
(since October, 1998), Professional Workstations (since May, 1998), Deskpro
and Prosignia desktops
(since September, 1998), and Armada and Prosignia portables (since
September, 1998). A complete matrix
can be found at the end of this document. Compaq Management Agents for SCO
Unix, UnixWare and
OpenServer, IBM OS/2 and Compaq OpenVMS are not affected in any way.
What Compaq is doing
Compaq is actively pursuing the testing and release of a software fix to the
problem. This will be initially
released as a new version 4.23b of the Server Management Agents and a new
version 2.18 of the Survey
Utility. The Client Management Agent which is pre-installed at the factory
will become version 4.3. A
SoftPAQ with the Client Management Agent 4.2C will be issued with the fix.




--
Andrew Kunz
Telecom Analyst
Central Computing Facility
TDIT Server Technology
mailto:kunza@tdbank.ca
phone (416) 983-9027
pager (416) 375-8427
4163758427@shawpaging.com
-------------------------------------------
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close