017
e050dae7718888aa02aeeb15cb0dd781f756b2476a3d9ee05f765b4c523d216d
From support@us.external.hp.com Wed Mar 13 00:58:10 1996
Date: Wed, 13 Mar 1996 01:01:29 -0800
From: HPSL Mail Service <support@us.external.hp.com>
Reply to: support-feedback@us.external.hp.com
To: Damien Sorder <jericho@netcom.com>
Subject: RE: send doc HPSBUX9409-017
--------
## Regarding your request:
Send Doc HPSBUX9409-017
The following are the results of your request from the HP SupportLine mail
service.
===============================================================================
Document Id: [HPSBUX9409-017]
Date Loaded: [12-02-94]
Description: Security Vulnerability in CORE-DIAG fileset
===============================================================================
-------------------------------------------------------------------------
HEWLETT-PACKARD SECURITY BULLETIN: #00017, 21 September 94
REVISED: 18 October 1994
NOTE: Patch effectivity for PHSS_4749 on HP-UX 9.04 revised
REVISED: 01 December 1994
NOTE: All systems should be updated with patches retrieved from HP after
01 December 1994. This does not apply to platform releases 9.01,
9.03, 9.04 or 9.05.
-------------------------------------------------------------------------
Hewlett-Packard recommends that the information in the following
Security Bulletin should be acted upon as soon as possible. Hewlett-
Packard will not be liable for any consequences to any customer resulting
from customer's failure to fully implement instructions in this Security
Bulletin as soon as possible.
_______________________________________________________________________
PROBLEM: Security vulnerability in HP-UX system message catalog (fileset
CORE-DIAG).
PLATFORM: HP 9000 series 700 and 800s running HP-UX revisions 9.X and 8.X.
DAMAGE: An existing user can increase access privileges.
SOLUTION: Apply patch PHSS_4578 (series 800, HP-UX 8.0), or
PHSS_4578 (series 800, HP-UX 8.06), or
PHSS_4577 (series 800, HP-UX 8.02), or
PHSS_4574 (series 700, HP-UX 8.05), or
PHSS_4574 (series 700, HP-UX 8.07), or
PHSS_4532 (series 800, HP-UX 9.00.2O or 9.00.3A),
if either of the following lines is in
/system/UX-CORE/index:
fv: A.B9.00.2O
fv: A.B9.00.3A, or
PHSS_4503 (series 800, HP-UX 9.00.4A),
if the following line is in /system/UX-CORE/index:
fv: A.B9.00.4A, or
PHSS_4475 (series 700, HP-UX 9.01), or
PHSS_4367 (series 700, HP-UX 9.03), or
PHSS_4749 (series 800, HP-UX 9.04), or
PHSS_4367 (series 700, HP-UX 9.05).
AVAILABILITY: All patches are available now.
_______________________________________________________________________
I. HP message catalog defect in fileset CORE-DIAG update.
A. The vulnerability allows a user to gain increased access privileges.
It has been found that all HP-UX systems using the CORE-DIAG fileset
have this vulnerability.
B. Fixing the problem
The vulnerability can be eliminated from releases 8.X and 9.X of
HP-UX by applying one of the patches listed above.
C. How to Install the Patch (for HP-UX 8.X and 9.X)
1. Determine which patch is appropriate for your hardware platform
and operating system, by displaying /system/UX-CORE/index with the
"more" or "pg" command. Look for the following line:
fv: A.BX.YY.ZZ
where X is the major revision,
YY is the minor revision,
and ZZ is the PCO index.
and match it with the appropriate patch below.
PHSS_4578 (series 800, HP-UX 8.0), or
PHSS_4578 (series 800, HP-UX 8.06), or
PHSS_4577 (series 800, HP-UX 8.02), or
PHSS_4574 (series 700, HP-UX 8.05), or
PHSS_4574 (series 700, HP-UX 8.07), or
PHSS_4532 (series 800, HP-UX 9.00.2O and 9.00.3A), or
PHSS_4503 (series 800, HP-UX 9.00.4A), or
PHSS_4475 (series 700, HP-UX 9.01), or
PHSS_4475 (series 700, HP-UX 9.01), or
PHSS_4367 (series 700, HP-UX 9.03), or
PHSS_4749 (series 800, HP-UX 9.04), or
PHSS_4367 (series 700, HP-UX 9.05).
2. Get a copy of the patch from one of the following locations:
a. HP SupportLine Mail Service
To obtain the patch, send the following in the TEXT PORTION
OF THE MESSAGE to support@support.mayfield.hp.com
(no Subject is required):
send patch_name
for example:
send PHSS_4749
It will automatically be emailed back to you. Note that
users may also download the patch from HP SupportLine (HPSL) via
ftp, kermit, or uucp.
b. Response Center Support
If you need additional assistance and have a support contract,
you can contact your local Response Center for further help.
3. Apply the patch to your HP-UX system. The complete instructions for
applying the patch are in PHSS_NNNN.text.
4. Examine /tmp/update.log for any relevant WARNINGs or ERRORs. This
can be done as follows:
a. At the shell prompt, type "tail -60 /tmp/update.log | more"
b. Page through the next three screens via the space bar, looking
for WARNING or ERROR messages.
D. Impact of the patch and workaround
The patch for HP-UX releases 8.X and 9.X fixes the vulnerability.
No patches will be available for versions of HP-UX prior to 8.0.
_______________________________________________________________________
Hewlett Packard's HP-UX patches are available via email or WWW (MOSAIC)
email
-----
To subscribe to automatically receive future NEW HP Security Bulletins
from the HP SupportLine mail service via electronic mail, send an email
message to:
support@support.mayfield.hp.com (no Subject is required)
Multiple instructions are allowed in the TEXT PORTION OF THE MESSAGE, here
are some basic instructions you may want to use:
To add your name to the subscription list for new security bulletins, send
the following in the TEXT PORTION OF THE MESSAGE:
subscribe security_info
To retrieve the index of all HP Security Bulletins issued to date, send the
following in the TEXT PORTION OF THE MESSAGE:
send security_info_list
To obtain a copy of the HP SupportLine email service user's guide,
send the following in the TEXT PORTION OF THE MESSAGE:
send guide.txt
The users guide explains the process for downloading HP-UX patches via
email and other services available.
WWW (MOSAIC)
------------
Our service (Browsing and downloading of patches) is also available via WWW
(MOSAIC) our URL is:
(http://support.mayfield.hp.com)
Choose "Support news", then under Support news, choose "Security Bulletins"
_______________________________________________________________________