exploit the possibilities


Posted Sep 23, 1999


MD5 | c64df95284227574967533db4b6054fa


Change Mirror Download
From support@us.external.hp.com Wed Mar 13 00:59:15 1996
Date: Wed, 13 Mar 1996 01:02:13 -0800
From: HPSL Mail Service <support@us.external.hp.com>
Reply to: support-feedback@us.external.hp.com
To: Damien Sorder <jericho@netcom.com>
Subject: RE: send doc HPSBUX9405-011

## Regarding your request:
Send Doc HPSBUX9405-011

The following are the results of your request from the HP SupportLine mail

Document Id: [HPSBUX9405-011]
Date Loaded: [05-05-94]

Description: Security Vulnerability in HP GlancePlus


PROBLEM: Security vulnerability in product executables for HP GlancePlus
product revision B.09.00 and all earlier revisions, on all
releases of HP-UX.
PLATFORM: HP 9000 series 300/400s and 700/800s.
DAMAGE: A vulnerability exists in the GlancePlus product which allows
non-root users who can execute glance or gpm to gain root
SOLUTION: Obtain and apply fix as outlined below. For HP-UX 9.X a new
version of Glance is available in the April 1994 Application
release which addresses the problem. All customers on support
should already have access to the fixed release.
AVAILABILITY: The fix is currently available.

I. Glance Update

A. Problem

A vulnerability exists in the /usr/perf/bin programs Glance and gpm
revisions prior to and including B.09.00 (for series 700/800 systems),
and in the /usr/perf/bin/glance program revision prior to and including
A.09.06 (for series 300/400 systems). The vulnerability allows non-
root users to gain access to files regardless of ownership and
permissions. This could be exploited to gain root-level access.

B. Fixing the problem

The problem can be eliminated by installing the latest release of the
product, which contains a version of glance and gpm revision B.09.01
or greater (for series 700/800 systems) or glance revision A.09.07 or
greater (for series 300/400 systems). The GlancePlus version can be
determined on 9.X systems using the command "what /usr/perf/bin/glance".

-------- -------- ----------- ---------------
300/400 HPUX 8.X all No patch currently available
HPUX 9.X A.09.06 or earlier Update to GlancePlus A.09.07
HPUX 9.X A.09.07 None
700/800 HPUX 8.X all No patch currently available
HPUX 9.X A.X or B.09.00 Update to GlancePlus B.09.01
HPUX 9.X B.09.01 None

There is currently no fix available for glance on HP-UX 8.X. Users on
8.X releases are advised to use the workaround below.

The GlancePlus product for HP-UX 9.X has been released on the HP-UX
Application Software Release CD for April 1994. All customers with
software support for HP GlancePlus should have access to the latest
GlancePlus release media containing the fix. If for some reason you
do not have access to the latest media, contact your HP Response

Hewlett-Packard recommends that all GlancePlus customers concerned
with the security of their HP-UX systems update from the April release
media as soon as possible.

As a workaround until the update can be applied, you may execute the
following commands as the root user in order to restrict access to
the product to only the root user:

chmod 744 /usr/perf/bin/glance
chmod 744 /usr/perf/bin/gpm

NOTE: The gpm program file will only exist on your system if you
have installed revision B.09.00, or later of the GlancePlus

NOTE: On 8.X systems, the glance executable is /usr/bin/rxux/glance.

To subscribe to automatically receive NEW future HP Security Bulletins
from the HP SupportLine mail service via electronic mail, send the
following in the TEXT PORTION OF THE MESSAGE to
support@support.mayfield.hp.com (no Subject is required):

subscribe security_info

To retrieve the index of all HP Security Bulletins, send the following:

send security_info_list

To obtain a copy of the HP SupportLine mail service user's guide,
send the following:

send guide.txt

For security concerns, write to:




RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

January 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    15 Files
  • 2
    Jan 2nd
    15 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    1 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    24 Files
  • 8
    Jan 8th
    15 Files
  • 9
    Jan 9th
    16 Files
  • 10
    Jan 10th
    23 Files
  • 11
    Jan 11th
    17 Files
  • 12
    Jan 12th
    3 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    33 Files
  • 16
    Jan 16th
    23 Files
  • 17
    Jan 17th
    29 Files
  • 18
    Jan 18th
    15 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By