exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

045

045
Posted Sep 23, 1999

045

SHA-256 | 3b058344dcb29e73cb719afa5b81f306bff7cd4139c2fda116aaccddfb22bd9f

045

Change Mirror Download
From dimensional.com!visi.com!mr.net!newsfeeds.sol.net!newspump.sol.net!howland.erols.net!vixen.cso.uiuc.edu!sdd.hp.com!hp-pcd!hpbs2500.boi.hp.com!hpax!secure Sun Jan 19 20:32:27 1997
Path: dimensional.com!visi.com!mr.net!newsfeeds.sol.net!newspump.sol.net!howland.erols.net!vixen.cso.uiuc.edu!sdd.hp.com!hp-pcd!hpbs2500.boi.hp.com!hpax!secure
From: secure@cup.hp.com (Security Alert)
Newsgroups: comp.security.misc
Subject: SB45 Security Vulnerabilities in the password command
Date: 10 Jan 1997 03:02:17 GMT
Organization: Hewlett Packard Cupertino Site
Lines: 146
Message-ID: <5b4bfp$ksj@hpax.cup.hp.com>
NNTP-Posting-Host: hpcugsya.cup.hp.com
X-Newsreader: TIN [version 1.2 PL0.9]
Xref: dimensional.com comp.security.misc:15410


-------------------------------------------------------------------------
**REVISED 01**HEWLETT-PACKARD SECURITY BULLETIN: #00045, 08 January 1997
-------------------------------------------------------------------------

The information in the following Security Bulletin should be acted upon
as soon as possible. Hewlett Packard will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Bulletin as soon as possible.

-------------------------------------------------------------------------
PROBLEM: Security Vulnerabilities in the password command

PLATFORM: HP 9000 Series 700/800s running versions of HP-UX 9.X & 10.X

DAMAGE: Vulnerabilities exists allowing local users to gain root
privileges.

SOLUTION: **REVISED 01**Apply patch:
PHCO_9742 Series 800 for HP-UX releases 9.0 and 9.04
PHCO_9743 Series 700 for HP-UX releases 9.01, 9.03, 9.05 & 9.07
PHCO_9640 Series 700/800 for HP-UX releases 10.00,10.01,10.10
PHCO_9641 Series 700/800 for HP-UX releases 10.20

AVAILABILITY: Patches for HP-UX 9.X will be available only after 08 Jan
1997, while the 10.X patches are available now.

-------------------------------------------------------------------------
I.
A. Background
A vulnerability with the password command (/etc/passwd) has been
discovered.

B. Fixing the problem
The vulnerability can be eliminated from HP-UX releases 9.X and
10.X by applying the appropriate patch.

NOTE: There are patch dependencies for certain HP-UX 10.X versions
of the new password command. Install the new libsec patches
listed below in addition to actual command patch.

- on HP9000 Series 700/800 running HP-UX 10.10
install PHCO_9640 and PHCO_7634,

- on HP9000 Series 700/800 running HP-UX 10.00 and 10.01
install PHCO_9640 and PHCO_7635,

- on HP9000 Series 700/800 running HP-UX 10.20
there is no such dependency.


C. Recommended solution
1. Determine which patch(es) are appropriate for your hardware
platform and operating system.

2. Hewlett-Packard's HP-UX patches are available via email
and the World Wide Web

To obtain a copy of the Hewlett-Packard SupportLine email
service user's guide, send the following in the TEXT PORTION
OF THE MESSAGE to support@us.external.hp.com (no Subject
is required):

send guide

The users guide explains the HP-UX patch downloading process
via email and other services available.

World Wide Web service for downloading of patches
is available via our URL:
(http://us.external.hp.com)

3. Apply the patch(es) to your HP-UX system.

4. Examine /tmp/update.log (9.X), or /var/adm/sw/swinstall.log
(10.X), for any relevant WARNING's or ERROR's.

D. Impact of the patch
The patches for HP-UX releases 9.X and 10.X provide enhancements
to the password command and related library functions to avoid
this vulnerability.

E. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP SupportLine Digest service via electronic
mail, do the following:

1) From your Web browser, access the URL:

http://us-support.external.hp.com (US,Canada,
Asia-Pacific, and Latin-America)

http://europe-support.external.hp.com (Europe)

2) On the HP Electronic Support Center main screen, select
the hyperlink "Support Information Digests".

3) On the "Welcome to HP's Support Information Digests" screen,
under the heading "Register Now", select the appropriate hyperlink
"Americas and Asia-Pacific", or "Europe".

4) On the "New User Registration" screen, fill in the fields for
the User Information and Password and then select the button labeled
"Submit New User".

5) On the "User ID Assigned" screen, select the hyperlink
"Support Information Digests".

** Note what your assigned user ID and password are for future
reference.

6) You should now be on the "HP Support Information Digests Main"
screen. You might want to verify that your email address is correct
as displayed on the screen. From this screen, you may also
view/subscribe to the digests, including the security bulletins
digest.

To get a patch matrix of current HP-UX and BLS security
patches referenced by either Security Bulletin or Platform/OS,
click on following screens in order:
Technical Knowledge Database
Browse Security Bulletins
Security Bulletins Archive
HP-UX Security Patch Matrix


F. To report new security vulnerabilities, send email to

security-alert@hp.com

Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.


Permission is granted for copying and circulating this Bulletin to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Bulletin is
not edited or changed in any way, is attributed to HP, and provided
such reproduction and/or distribution is performed for non-commercial
purposes.

Any other use of this information is prohibited. HP is not liable
for any misuse of this information by any third party.
_______________________________________________________________________


Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close