exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

PSBUX0009-121.txt

PSBUX0009-121.txt
Posted Sep 27, 2000

A problem lies in that there is a Java SNMP MIB Browser Object ID parsing problem which can cause a Denial of Service. Platforms affected are: HP9000 Series 700/800 running HP-UX releases 10.XX and 11.XX, Sun Microsystems SOLARIS releases 2.X, plus under Microsoft Windows NT4.X/ Windows 2000 running NNM 6.1, NNM 5.01, and NNM 4.11.

tags | java, denial of service
systems | windows, solaris, hpux
SHA-256 | f03861bd000202508283bfa2dda6e995d3c9b8dc31e44a7a007686ff9f282852

PSBUX0009-121.txt

Change Mirror Download
o  IT Resource Center World Wide Web Service
---------------------------------------------------

If you subscribed through the IT Resource Center and would
like to be REMOVED from this mailing list, access the
IT Resource Center on the World Wide Web at:

http://us.itrc.hp.com/

Login using your IT Resource Center User ID and Password.
Then select Support Information Digests (located under
Maintenance and Support). You may then unsubscribe from the
appropriate digest.
===============================================================================


Digest Name: Daily Security Bulletins Digest
Created: Mon Sep 25 3:00:04 PDT 2000

Table of Contents:

Document ID Title
--------------- -----------
HPSBUX0009-121 Sec. Vulnerability OpenView NNM Object IDs

The documents are listed below.
-------------------------------------------------------------------------------


Document ID: HPSBUX0009-121
Date Loaded: 20000924
Title: Sec. Vulnerability OpenView NNM Object IDs

-------------------------------------------------------------------------
HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00121, 25 Sept. '00
-------------------------------------------------------------------------

The information in the following Security Bulletin should be acted upon
as soon as possible. Hewlett-Packard Company will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Bulletin as soon as possible.

-------------------------------------------------------------------------

PROBLEM: Java SNMP MIB Browser Object ID parsing problem.

PLATFORM: HP9000 Series 700/800 running HP-UX releases 10.XX and 11.XX,
Sun Microsystems SOLARIS releases 2.X, plus under
Microsoft Windows NT4.X/ Windows 2000 running NNM 6.1,
NNM 5.01, and NNM 4.11.

DAMAGE: Users can cause a Denial of Service (DoS).

SOLUTION: Apply appropriate patches listed below.
HP-UX 11.00 HP-UX 10.X SOLARIS 2.X WinNT4.X/2000
PHSS_22407 PHSS_22406 PSOV_02830 NNM_00621

AVAILABILITY: The patches are available now ONLY at the OV website
noted below.
-------------------------------------------------------------------------
I.

A. Background
Hewlett-Packard Company has been notified of a vulnerability
in its OpenView Network Node Manager.

B. Fixing the problem:
Apply one of the patches listed below. Please make note
of patch dependencies.

HP-UX 11.00 HP-UX 10.X SOLARIS 2.X WinNT4.X/2000
PHSS_22407 PHSS_22406 PSOV_02830 NNM_00621

NOTE: These four patches are Special Release patches and will
NOT be available from the ITRC. They can only be obtained
from: http://ovweb.external.hp.com/cpe/patches/

C. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP IT Resource Center via electronic mail,
do the following:

Use your browser to get to the HP IT Resource Center page
at:

http://itrc.hp.com

Under the Maintenance and Support Menu (Electronic Support Center):
click on the "more..." link. Then -

Use the 'Login' tab at the left side of the screen to login
using your ID and password. Check with your system
administrator to see if you have an existing login or use
the "Register" button at the left to create a login. You will
need to login in order to gain access to many areas of the ITRC.
Remember to save the User ID assigned to you, and your password.

Under the Maintenance and Support Menu, click on the "more..."
link. Under the "Notifications" section (near the bottom of
the page), select "Support Information Digests".

To -subscribe- to future HP Security Bulletins or other
Technical Digests, click the check box (in the left column)
for the appropriate digest and then click the "Update
Subscriptions" button at the bottom of the page.

or

To -review- bulletins already released, select the link
(in the middle column) for the appropriate digest.

To -gain access- to the Security Patch Matrix, select
the link for "The Security Bulletins Archive". Once in
the archive the third link is to our current Security
Patch Matrix. Updated daily, this matrix categorizes security
patches by platform/OS release, and by bulletin topic.

The security patch matrix is also available via anonymous ftp:

us-ffs.external.hp.com
~ftp/export/patches/hp-ux_patch_matrix"

On the "Support Information Digest Main" page:
click on the "HP Security Bulletin Archive".

D. To report new security vulnerabilities, send email to

security-alert@hp.com

Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.

Permission is granted for copying and circulating this Bulletin to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Bulletin
is not edited or changed in any way, is attributed to HP, and
provided such reproduction and/or distribution is performed for
non-commercial purposes.

Any other use of this information is prohibited. HP is not liable
for any misuse of this information by any third party.
________________________________________________________________________
-----End of Document ID: HPSBUX0009-121--------------------------------------
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close