exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

009

009
Posted Sep 23, 1999

009

SHA-256 | 8e5d439bcdf655f9058714a6b39f51f02ac6fa56ecfa9dce7f43789f28c351af

009

Change Mirror Download
From support@us.external.hp.com Wed Mar 13 00:59:26 1996
Date: Wed, 13 Mar 1996 01:02:21 -0800
From: HPSL Mail Service <support@us.external.hp.com>
Reply to: support-feedback@us.external.hp.com
To: Damien Sorder <jericho@netcom.com>
Subject: RE: send doc HPSBUX9405-009

--------
## Regarding your request:
Send Doc HPSBUX9405-009

The following are the results of your request from the HP SupportLine mail
service.

===============================================================================
Document Id: [HPSBUX9405-009]
Date Loaded: [05-05-94]

Description: PROBLEM: Incomplete implementation of OSF/AES standard
===============================================================================

###########################################################################
---------------------------------------------------------------------------
HEWLETT-PACKARD SECURITY BULLETIN: #00009, 05 May 1994
---------------------------------------------------------------------------

_______________________________________________________________________
PROBLEM: Incomplete implementation of OSF/AES standard
PLATFORM: HP 9000 Series 700 running HP-UX 9.01 or 9.03
DAMAGE: Root may inadvertently grant improper ownership of files
or directories.
SOLUTION: Disable OSF/AES implementation, reverting to original 8.07
implementation by installing PHKL_4157 or PHKL_4161.
Additional patch PHCO_3533 for cpio should be used as well.
_______________________________________________________________________


I. HP OSF/AES defect Update

A. Fixing the problem

The problem can be eliminated by applying a patch that corrects the
HP OSF/AES defect. The patch reverts the behavior back to the 8.07
implementation.

Cpio had been patched to work around the problem. This avoided
the vulnerability at the cost of a minor and cosmetic loss of
normal functionality. Since PHKL_4157 or PHKL_4161 resolves the
vulnerability, the cpio work around is no longer necessary. The
cpio patch PHCO_3533 removes the work around.


B. How to Install the Patch

1. Get a copy of the patch from one of the following locations:

a. HP SupportLine Mail Service

To obtain the patch, send the following in the TEXT PORTION
OF THE MESSAGE to support@support.mayfield.hp.com
(no Subject is required):

send PHKL_4157
-or-
send PHKL_4161
-and, in another message-
send PHCO_3533

It will automatically be emailed back to you. Note that
users may also download the patch from HP SupportLine via
ftp, kermit, or uucp.

b. Response Center Support

If you need additional assistance and have a support
contract, you can contact your local Response Center for
further help.

2. The patch information is current as of May 5, 1994. You
should list the patch:

more PHKL_4157
-or-
more PHKL_4161
-and-
more PHCO_3533

If it has been replaced there will be banner text saying:

OBSOLETE
REPLACED
BY
PHKL_NNNN


3. Apply the patch to your HP-UX system. The complete instructions
for applying the patch are in PHKL_NNNN.text.

4. Examine /tmp/update.log for any relevant WARNINGs or ERRORs. This
can be done as follows:

a. At the shell prompt, type "tail -60 /tmp/update.log | more"
b. Page through the next three screens via the space bar, looking
for WARNING or ERROR messages.

---------------------------------------------------------------------------
To subscribe to automatically receive NEW future HP Security Bulletins
from the HP SupportLine mail service via electronic mail, send the
following in the TEXT PORTION OF THE MESSAGE to
support@support.mayfield.hp.com (no Subject is required):

subscribe security_info

To retrieve the index of all HP Security Bulletins, send the following:

send security_info_list

To obtain a copy of the HP SupportLine mail service user's guide,
send the following:

send guide.txt


For security concerns, write to:

security-alert@hp.com

###########################################################################
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close