-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =============================================================================== >> CERT-NL, 01-Mar-2000 << >> All CERT-NL information has been moved to http://cert.surfnet.nl. Links << >> to CERT-NL information contained in this advisory are therefore outdated. << >> << >> CERT-NL also has stopped the CERT-CC-Mirror service. Due to this the << >> links to the CERT-CC mirror are obsolete. Visit the CERT-CC site for the << >> complete CERT-CC advisory texts: http://www.cert.org << =============================================================================== =============================================================================== Security Advisory CERT-NL =============================================================================== Author/Source : Don Stikvoort Index : S-95-02 Distribution : World Page : 1 Classification: External Version: Final Subject : New and Revised HP Bulletins Date : 20-Jan-95 =============================================================================== By courtesy of CIAC and Hewlett Packard we received the following information about new and revised HP Bulletins. It is a revised version of CIAC Information Bulletin F-07. We advise you to pay thorough attention if this applies to you. How to get other CERT-NL advisories and how to contact us, you will find at the very bottom of this document. =============================================================================== _____________________________________________________________________________ PROBLEM: Security vulnerabilities in HP-UX Support Watch and CORE-DIAG fileset. PLATFORM: HP 9000 series 700 and 800, for versions see below. DAMAGE: Users can increase access privileges. SOLUTION: Apply appropriate security patches. _____________________________________________________________________________ VULNERABILITY These vulnerabilities are widely known and used to compromise ASSESSMENT: systems. CIAC urges affected sites to install the appropriate patches immediately. ______________________________________________________________________________ Critical Information about the New and Revised HP Bulletins CIAC has obtained information from Hewlett Packard regarding a new security vulnerability and a revision to an existing security patch. The patches are presented first in a table format (Appendix 1), then a summary of the vulnerability information is presented for each patch (Appendix 2). CIAC has also created a document which contains the entire list of all HP Bulletins and patches, INCLUDING the ones mentioned here. This document is separately distributed as CERT-NL document S-95-03 : Summary of security related HP patches. HP has set up an automatic server to allow patches and other security information to be retrieved over the Internet. To utilize this server, send a message to support@support.mayfield.hp.com. The subject line of the message will be ignored. The body (text) of the message should contain the words send XXXX where XXXX is the identifier for the information you want retrieved. For example, to retrieve the patch PHSS_4834, the message would be "send PHSS_4834". Other information that can be retrieved include the HP SupportLine mail service user's guide (send guide.txt), the readme file for a patch (send doc PHSS_4834), and the original HP bulletin (send doc HPSBUX9410-018). HP also has a World Wide Web server to browse and retrieve bulletins and patches. To utilize this server, use a WWW client and connect to http://support.mayfield.hp.com. IMPORTANT NOTE: Hewlett Packard updates patches periodically. These updates are not reflected in the text of each HP bulletin. The overview presented here contains current information on the patches available at the time of the release of this CIAC bulletin. If you request an updated patch, when you try to retrieve the patch you will receive a message stating that the patch is obsolete and the name of the patch which supersedes it. Hewlett Packard has made sum and MD5 checksums available for their patches and for their security bulletins. See the detailed explanation for HPSBUX9408-016 in CIAC bulletin F-02 for information on how to access and utilize these checksums. CIAC wishes to thank Hewlett Packard for the information contained in this bulletin. ______________________________________________________________________________ Appendix 1: Table of HP Security Bulletins * HP Progs Patches to Overview of Bulletin Affected Platform Install Vulnerability 9411-019 Support HP 9000 700,800 PHSS_4874 Users can Watch HP-UX 8.0, 8.02, potentially 8.06, and 9.0 only increase access privileges. 9409-017 System HP 9000 700,800 Install Users can Message HP-UX 8.x, 9.x appropriate increase their catalog patch(es) privileges (fileset dependent upon CORE-DIAG) configuration * All HP-UX bulletins have the prefix HPSBUX, for example bulletin 9311-019 would be requested from HP as HPSBUX9311-019. ______________________________________________________________________________ Appendix 2: Details of each HP Bulletin After every patch is installed, be sure to examine /tmp/update.log for any relevant WARNINGs or ERRORs. This can be done by typing "tail -60 /tmp/update.log | more", then paging through the next three screens via the space bar, looking for WARNING or ERROR messages. ================================================== HPSBUX9411-019: Support Watch, dated November 30, 1994 This vulnerability, which can allow users to increase their access privileges, exists ONLY in HP 9000 series 800 running HP-UX revisions 8.0, 8.02, 8.06 and 9.0. Later HP-UX releases including 9.04 are NOT affected by this vulnerability. Obtain patch PHSS_4874, install it per the installation instructions included with the patch. ================================================== HPSBUX9409-017: CORE-DIAG vulnerability, dated September 21, 1994 (Revised October 18, 1994, then revised December 1, 1994) This vulnerability can allow a user to increase their access privileges. The vulnerability exists for all HP-UX systems using the CORE-DIAG fileset. No patches will be available for versions of HP_UX prior to version 8.0. The patch to install depends on which operating system version and series you are currently using. To determine the operating system version of your system, display the file /system/UX-CORE/index with the "more" or "pg" command. The line will look similar to: fv: A.BX.YY.ZZ Where X is the major revision, YY is the minor revision, and ZZ is the PCO index. For example, if your system needed to install an item on the chart below, (HP-UX 9.00.4A) the major revision would be "9", the minor revision would be "00" and the PCO index would be "4A". Note that these patches are quite large. Use the following chart to determine which patch to retrieve and install in /tmp: Operating System Series Apply patch HP-UX 8.0, 8.06 800 PHSS_4578 HP-UX 8.02 800 PHSS_4577 HP-UX 8.05, 8.07 700 PHSS_4574 HP-UX 9.00.2O or 9.00.3A 800 PHSS_4532 HP-UX 9.00.4A 800 PHSS_4660 HP-UX 9.01 700 PHSS_4475 HP-UX 9.03, 9.05 700 PHSS_5037 HP-UX 9.04 800 PHSS_4913 Obtain necessary patches, install per the installation instructions included with the patches. ============================================================================== CERT-NL is the Computer Emergency Response Team for SURFnet customers. SURFnet is the Dutch network for educational, research and related institutes. CERT-NL is a member of the Forum of Incident Response and Security Teams (FIRST). All CERT-NL material is available under: http://cert.surfnet.nl/ In case of computer or network security problems please contact your local CERT/security-team or CERT-NL (if your institute is NOT a SURFnet customer please address the appropriate (local) CERT/security-team). CERT-NL is one/two hour(s) ahead of UTC (GMT) in winter/summer, i.e. UTC+0100 in winter and UTC+0200 in summer (DST). Email: cert-nl@surfnet.nl ATTENDED REGULARLY ALL DAYS Phone: +31 302 305 305 BUSINESS HOURS ONLY Fax: +31 302 305 329 BUSINESS HOURS ONLY Snailmail: SURFnet bv Attn. CERT-NL P.O. Box 19035 NL - 3501 DA UTRECHT The Netherlands NOODGEVALLEN: 06 22 92 35 64 ALTIJD BEREIKBAAR EMERGENCIES : +31 6 22 92 35 64 ATTENDED AT ALL TIMES CERT-NL'S EMERGENCY PHONENUMBER IS ONLY TO BE USED IN CASE OF EMERGENCIES: THE SURFNET HELPDESK OPERATING THE EMERGENCY NUMBER HAS A *FIXED* PROCEDURE FOR DEALING WITH YOUR ALERT AND WILL IN REGULAR CASES RELAY IT TO CERT-NL IN AN APPROPRIATE MANNER. CERT-NL WILL THEN CONTACT YOU. =============================================================================== -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.1i iQA/AwUBOL6IDDSYjBqwfc9jEQIhMACfdROVlv/cJVyHxw3N3uNp8JhUomUAoMjv nK67ouGni9c+Tol/99JbNAjP =a1/3 -----END PGP SIGNATURE-----