[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 408/03 - Hewlett-Packard - Potential Sec. Vulnerabilities in: Apache HTTP Server, Java VM (J2SE) and the Java Plugin + Java(TM) Runtime Env



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 408/03 dated 17.07.03  Time: 09:20
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Three Hewlett-Packard Security Bulletins:

1: Security Vulnerabilities in Apache HTTP Server

2: Potential Sec. Vulnerability in Java VM (J2SE) and the Java Plugin

3: Potential Sec. Vulnerability in Java(TM) Runtime Env

Detail
====== 

1: Security Vulnerabilities in Apache HTTP Server

- - -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 -----------------------------------------------------------------
Source: HEWLETT-PACKARD COMPANY
SECURITY BULLETIN: HPSBUX0307-269
Originally issued: 16 July 2003
SSRT3587 Security Vulnerabilities in Apache HTTP Server
 -----------------------------------------------------------------

NOTICE: There are no restrictions for distribution of this
        Bulletin provided that it remains complete and intact.
        The information in the following Security Bulletin should
        be acted upon as soon as possible.  Hewlett-Packard
        Company will not be liable for any consequences to any
        customer resulting from customer's failure to fully
        implement instructions in this Security Bulletin as soon
        as possible.

 -----------------------------------------------------------------
PROBLEM: 1. Apache 2.0.40 through 2.0.45 do not properly handle
            threads correctly, potentially allowing a remote
            denial of service.

       More details are available at:
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0189

         2. A defect in Apache 2.0.37 through 2.0.45 potentially
            allows a remote denial of service.

       More details are available at:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245

IMPACT: Potential remote Denial of Service

PLATFORM: HP-UX releases B.11.00, B.11.11 and B.11.22 with
          versions of the following products are affected:

         - HPApache/B9416AA and HPApache/B9416BA (all versions)

         - hp-ux apache-based web server, (product hpuxwsAPACHE or
           hpuxwsApache) v.1.0.05.01 or earlier
           This product includes Apache 2.0.45.

        - hp apache-based web server, 2.0.43.04 or earlier
          (HPApache/B9416AA, HPApache/B9416BA)
          This product includes Apache 2.0.43.

        - hp-ux apache-based web server, v.1.0.05.01 or earlier
          (hpuxwsAPACHE/hpuxwsApache)
          This product includes Apache 2.0.45.

AFFECTED FILESETS:
  The affected filesets are: (product.fileset)
  HPApache.APACHE2       2.0.39.01.02   HP Apache 2.0.39
  hpuxwsAPACHE.APACHE2   A.1.0.05.01    2.0.45 base (IPF Binaries)

SOLUTION: For HP-UX releases B.11.00, B.11.11 and B.11.22:
          1. Remove HPApache/B9416AA and HPApache/B9416BA if they
             are installed.

          2. Download and install:
             hp-ux apache-based web server, v.1.0.06.01 or later
             (product hpuxwsAPACHE or bundle hpuxwsApache)

     NOTE: The product install location and structure has changed
           between HPApache/B9416*A and hpuxwsAPACHE/hpuxwsApache.

             This product includes Apache 2.0.46 and is available
             from:
         http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/
             cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE

  NOTE: No IPv6 solution is available at this time.  This Security
        Bulletin will be updated when such becomes available.

MANUAL ACTIONS: Yes - Update
                Install the product containing the fix.
                For customers with HPApache/B9416AA or
                HPApache/B9416BA installed, the fix requires
                migration to hpuxwsAPACHE/hpuxwsApache and
                removing the affected products from the system.

AVAILABILITY: Complete product bundles are available now on
               <http://www.software.hp.com/>

 -----------------------------------------------------------------
A. Background
   The Common Vulnerabilities and Exposures project
  <http://cve.mitre.org/> has identified potential vulnerabilities
   in the Apache HTTP Server (CAN-2003-0189, CAN-2003-0245). These
   affect the following HP products on HP-UX releases B.11.00,
   B.11.11 and B.11.22:

    - HPApache/B9416AA and HPApache/B9416BA (all versions)

    - hp-ux apache-based web server products hpuxwsAPACHE and
      hpuxwsApache, v.1.0.05.01 or earlier.

    Note: The following are not vulnerable:
          HP OpenVMS
          HP NonStop Servers
          HP Tru64 UNIX
          HP Tru64 OpenVMS

B. Recommended solution
   The Apache Software Foundation has released Apache 2.0.46 as
   the best known version fixing the potential vulnerabilities
   mentioned above.

   HP has incorporated Apache 2.0.46 in the following product:

    - hp-ux apache-based web server v.1.0.06.01 or later,
      available from:
      http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
             displayProductInfo.pl?productNumber=HPUXWSSUITE

   NOTE: No IPv6 solution is available at this time. This Security
         Bulletin will be updated when such becomes available.

   Check for Apache Installation
   -----------------------------
   To determine if the Apache web server from HP is installed on
   your system, use Software Distributor's swlist command.  More
   than one version may be present on a single system.

   For example, the results of the command
     swlist -l product | grep -i apache

     HPApache      2.0.39.01.02  HP Apache-based Web Server
     hpuxwsAPACHE  A.1.0.05.01   HP-UX Apache-based Web Server

   Stop Apache
   -----------------------------
   Before updating, make sure to stop any previous Apache binary.
   Otherwise, the previous binary will continue running,
   preventing the new one from starting, although the
   installation would be successful.

   After determining which Apache is installed, stop Apache with
   the following commands:

     for HPApache:        /opt/hpapache2/bin/apachectl stop
     for hpuxwsAPACHE:    /opt/hpws/apache/bin/apachectl stop

   Download and Install Apache
   -----------------------------
   - Download Apache from Software Depot using the previously
     mentioned links.
   - Verify successful download by comparing the cksum with the
     value specified on the installation web page.
   - Use SD to swinstall the depot.
   - For customers with HPApache/B9416AA or HPApache/B9416BA
     installed, migrate to hpuxwsAPACHE/hpuxwsApache and
     remove the affected products from the system.

   Installation of this new version of HP Apache over an existing
   HP Apache installation is supported, whereas installation over
   a non-HP Apache is NOT supported.

   Removing Apache Installation
   ----------------------------
   If you prefer to remove Apache from your system rather than
   install a newer version to resolve the security problem, use
   both Software Distributor's "swremove" command and also
   "rm -rf" the home location as specified in the rc.config.d
   file "HOME" variables.

   To find the files containing HOME variables in the
   /etc/rc.config.d directory:

     %ls /etc/rc.config.d | grep apache
        hpapache2conf
        hpws_apacheconf

C. To subscribe to automatically receive future NEW HP Security
   Bulletins from the HP IT Resource Center via electronic
   mail, do the following:

   Use your browser to get to the HP IT Resource Center page
   at:

      http://itrc.hp.com

   Use the 'Login' tab at the left side of the screen to login
   using your ID and password.  Use your existing login or the
   "Register" button at the left to create a login, in order to
   gain access to many areas of the ITRC.  Remember to save the
   User ID assigned to you, and your password.

   In the left most frame select "Maintenance and Support".

   Under the "Notifications" section (near the bottom of
   the page), select "Support Information Digests".

   To -subscribe- to future HP Security Bulletins or other
   Technical Digests, click the check box (in the left column)
   for the appropriate digest and then click the "Update
   Subscriptions" button at the bottom of the page.

   or

   To -review- bulletins already released, select the link
   (in the middle column) for the appropriate digest.

   NOTE: Using your itrc account security bulletins can be
         found here:
   http://itrc.hp.com/cki/bin/doc.pl/screen=ckiSecurityBulletin


   To -gain access- to the Security Patch Matrix, select
   the link for "The Security Bulletins Archive".  (near the
   bottom of the page)  Once in the archive the third link is
   to the current Security Patch Matrix. Updated daily, this
   matrix categorizes security patches by platform/OS release,
   and by bulletin topic.  Security Patch Check completely
   automates the process of reviewing the patch matrix for
   11.XX systems.  Please note that installing the patches
   listed in the Security Patch Matrix will completely
   implement a security bulletin _only_ if the MANUAL ACTIONS
   field specifies "No."

   The Security Patch Check tool can verify that a security
   bulletin has been implemented on HP-UX 11.XX systems providing
   that the fix is completely implemented in a patch with no
   manual actions required.  The Security Patch Check tool cannot
   verify fixes implemented via a product upgrade.

   For information on the Security Patch Check tool, see:
   http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
   displayProductInfo.pl?productNumber=B6834AA

   The security patch matrix is also available via anonymous
   ftp:

   ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix/

   On the "Support Information Digest Main" page:
   click on the "HP Security Bulletin Archive".

   The PGP key used to sign this bulletin is available from
   several PGP Public Key servers.  The key identification
   information is:

      2D2A7D59
      HP Security Response Team (Security Bulletin signing only)
      <security-alert@xxxxxx>
      Fingerprint =
        6002 6019 BFC1 BC62 F079 862E E01F 3AFC 2D2A 7D59

   If you have problems locating the key please write to
   security-alert@xxxxxxx  Please note that this key is
   for signing bulletins only and is not the key returned
   by sending 'get key' to security-alert@xxxxxxx


D. To report new security vulnerabilities, send email to

   security-alert@xxxxxx

   Please encrypt any exploit information using the
   security-alert PGP key, available from your local key
   server, or by sending a message with a -subject- (not body)
   of 'get key' (no quotes) to security-alert@xxxxxxx

 -----------------------------------------------------------------

(c)Copyright 2003 Hewlett-Packard Company
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
in this document is subject to change without notice.
Hewlett-Packard Company and the names of HP products referenced
herein are trademarks and/or service marks of Hewlett-Packard
Company.  Other product and company names mentioned herein may be
trademarks and/or service marks of their respective owners.

 ________________________________________________________________
- - - --


- - -----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA/AwUBPxSYgOAfOvwtKn1ZEQIMNACfda64dfw+/fWsEoKOTpzlAn73odsAn1gP
RftFMj9VbrEu5l2QmlGSuIHo
=UpeL
- - -----END PGP SIGNATURE-----

2: Potential Sec. Vulnerability in Java VM (J2SE) and the Java Plugin

- - -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



 -----------------------------------------------------------------
 Source: HEWLETT-PACKARD COMPANY
 SECURITY BULLETIN: HPSBUX0307-268
 Originally issued: 16 July 2003
 SSRT3582 Potential Sec. Vulnerability in Java VM (J2SE) and
          the Java Plugin
 -----------------------------------------------------------------
NOTICE: There are no restrictions for distribution of this
        Bulletin provided that it remains complete and intact.
        The information in the following Security Bulletin should
        be acted upon as soon as possible.  Hewlett-Packard
        Company will not be liable for any consequences to any
        customer resulting from customer's failure to fully
        implement instructions in this Security Bulletin as soon
        as possible.
- - - ------------------------------------------------------------------
PROBLEM: A vulnerability in the Java(TM) Runtime Environment may
         allow an untrusted applet to access restricted resources.
         In addition, a vulnerability in the Java Plugin may allow
         user authentication information to be accessed

IMPACT:  This bug may introduce potential vulnerabilities into any
         program. These defects includes the affected libraries.
         The resulting vulnerabilities may result in information
         leakage and improper code execution.

PLATFORM: HP-UX B.11.00, B.11.11, B.11.22, B.11.23 running
          the supported versions of Java 1.2.X, 1.3.X, and 1.4.X
          (except 1.4.1).

SOLUTION: Manual update to version of Java with the security
          fixes.  The list below describes each fixed Java
          version:
           Java 1.2.2.15
           Java 1.3.1.09
           Java 1.4.0.05

           Note: HP-UX versions of Java 1.4.1 are unaffected.

MANUAL ACTIONS:Yes - update Java to at least:
                 1.2.2.15  or
                 1.3.1.09  or
                 1.4.0.05

AVAILABILITY: Updated releases are now available at:
             www.hp.com/go/java.

- - - ------------------------------------------------------------------
A. Background
   Javasoft has issued their Security Bulletins 113.

B. Recommended solution
   Resolution of this issue requires a manual update to the
   appropriate versions of the Java SDK, JPI, and JRE, which
   contain the security fix.

   Update to at least the following appropriate Java version
   from the website www.hp.com/go/java.

      1.2.X    - 1.2.2.15
      1.3.X    - 1.3.1.09
      1.4.0.X  - 1.4.0.05

      Note: HP-UX versions of Java 1.4.1 are unaffected.

C. To subscribe to automatically receive future NEW HP Security
   Bulletins from the HP IT Resource Center via electronic
   mail, do the following:

   Use your browser to et to the HP IT Resource Center page
   at:

       http://itrc.hp.com

   Use the 'Loin' tab at the left side of the screen to loin
   using your ID and password.  Use your existing login or the
   "Register" button at the left to create a login, in order to
   gain access to many areas of the ITRC.  Remember to save the
   User ID assigned to you, and your password.

   In the left most frame select "Maintenance and Support".

   Under the "Notifications" section (near the bottom of
   the page), select "Support Information Diests".

   To -subscribe- to future HP Security Bulletins or other
   Technical Digests, click the check box (in the left column)
   for the appropriate digest and then click the "Update
   Subscriptions" button at the bottom of the page.

   or

   To -review- bulletins already released, select the link
   (in the middle column) for the appropriate digest.

   NOTE: Using your itrc account, security bulletins can be
         found here:
   http://itrc.hp.com/cki/bin/doc.pl/screen=ckiSecurityBulletin


   To -gain access- to the Security Patch Matrix, select
   the link for "The Security Bulletins Archive".  (near the
   bottom of the page)  Once in the archive the third link is
   to the current Security Patch Matrix. Updated daily, this
   matrix categorizes security patches by platform/OS release,
   and by bulletin topic.  Security Patch Check completely
   automates the process of reviewing the patch matrix for
   11.XX systems.

   For information on the Security Patch Check tool, see:
   http://www.software.hp.com/ci-bin/swdepot_parser.ci/ci/
   displayProductInfo.pl?productNumber=B6834AA

   The security patch matrix is also available via anonymous
   ftp:

   ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix/

   On the "Support Information Digest Main" page:
   click on the "HP Security Bulletin Archive".

D. To report new security vulnerabilities, send email to

   security-alert@xxxxxx

   Please encrypt any exploit information using the
   security-alert PGP key, available from your local key
   server, or by sending a message with a -subject- (not body)
   of 'get key' (no quotes) to security-alert@xxxxxxx

 -----------------------------------------------------------------

(c)Copyright 2003 Hewlett-Packard Company
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
in this document is subject to change without notice.
Hewlett-Packard Company and the names of HP products referenced
herein are trademarks and/or service marks of Hewlett-Packard
Company.  Other product and company names mentioned herein may be
trademarks and/or service marks of their respective owners.

 ________________________________________________________________
- - - --

- - -----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA/AwUBPxR64OAfOvwtKn1ZEQJCpACfS6nVIjTejoxiu/ZHUuC39IzlhUcAoI5W
FhwBjkcegt0mlakKAZjDsxwZ
=di7y
- - -----END PGP SIGNATURE-----

3: Potential Sec. Vulnerability in Java(TM) Runtime Env

- - -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1




 -----------------------------------------------------------------
 Source: HEWLETT-PACKARD COMPANY
 SECURITY BULLETIN: HPSBUX0307-267
 Originally issued: 16 July 2003
 SSRT3581 Potential Sec. Vulnerability in Java(TM) Runtime Env.
 -----------------------------------------------------------------
NOTICE: There are no restrictions for distribution of this
        Bulletin provided that it remains complete and intact.
        The information in the following Security Bulletin should
        be acted upon as soon as possible.  Hewlett-Packard
        Company will not be liable for any consequences to any
        customer resulting from customer's failure to fully
        implement instructions in this Security Bulletin as soon
        as possible.
 -----------------------------------------------------------------
PROBLEM: A vulnerability in the Java(TM) Runtime Environment may
         allow an untrusted applet to access information from a
         trusted applet.  This is not allowed in the Java Security
         Model.  The trusted applet must contain code that
         exploits this vulnerability.

IMPACT:  This bug may introduce potential vulnerabilities into any
         program. These defects includes the affected libraries.
         The resulting vulnerabilities may result in information
         leakage.  There are no known reported attacks based on
         these vulnerabilities.

PLATFORM: Any HP-UX system running the supported HP-UX versions
          of Java 1.2.X, 1.3.X, and 1.4.X is affected by this.

SOLUTION: Manual update to the version of Java with the security
          fixes.  The list below describes the minimal Java
          release necessary:

          Java 1.2.2.15
          Java 1.3.1.08
          Java 1.4.0.04
          Java 1.4.1.00

MANUAL ACTIONS: Yes - Update
                Update to Java to:
                  1.2.2.15  or
                  1.3.1.08  or
                  1.4.0.04  or
                  1.4.1.00.

AVAILABILITY: Updated releases are now available at:
              www.hp.com/go/java.

 ----------------------------------------------------------------
 A. Background
    Javasoft has issued their Security Bulletin 112.

 B. Recommended solution
    Resolution of this issue requires a manual update to the
    appropriate version of the Java SDK, JPI, and JRE, which
    contains the security fix from website www.hp.com/go/java.

    Update to at least the following appropriate Java version
    from the website www.hp.com/go/java.

       1.2.X    - 1.2.2.15
       1.3.X    - 1.3.1.08
       1.4.0.X  - 1.4.0.04
       1.4.1.X  - 1.4.1.00

C. To subscribe to automatically receive future NEW HP Security
   Bulletins from the HP IT Resource Center via electronic
   mail, do the following:

   Use your browser to et to the HP IT Resource Center page
   at:

      http://itrc.hp.com

   Use the 'Loin' tab at the left side of the screen to loin
   using your ID and password.  Use your existing login or the
   "Register" button at the left to create a login, in order to
   gain access to many areas of the ITRC.  Remember to save the
   User ID assigned to you, and your password.

   In the left most frame select "Maintenance and Support".

   Under the "Notifications" section (near the bottom of
   the page), select "Support Information Diests".

   To -subscribe- to future HP Security Bulletins or other
   Technical Digests, click the check box (in the left column)
   for the appropriate digest and then click the "Update
   Subscriptions" button at the bottom of the page.

   or

   To -review- bulletins already released, select the link
   (in the middle column) for the appropriate digest.

   NOTE: Using your itrc account, security bulletins can be
         found here:
   http://itrc.hp.com/cki/bin/doc.pl/screen=ckiSecurityBulletin


   To -gain access- to the Security Patch Matrix, select
   the link for "The Security Bulletins Archive".  (near the
   bottom of the page)  Once in the archive the third link is
   to the current Security Patch Matrix. Updated daily, this
   matrix categorizes security patches by platform/OS release,
   and by bulletin topic.  Security Patch Check completely
   automates the process of reviewing the patch matrix for
   11.XX systems.

   For information on the Security Patch Check tool, see:
   http://www.software.hp.com/ci-bin/swdepot_parser.ci/ci/
   displayProductInfo.pl?productNumber=B6834AA

   The security patch matrix is also available via anonymous
   ftp:

   ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix/

   On the "Support Information Digest Main" page:
   click on the "HP Security Bulletin Archive".

D. To report new security vulnerabilities, send email to

    security-alert@xxxxxx

   Please encrypt any exploit information using the
   security-alert PGP key, available from your local key
   server, or by sending a message with a -subject- (not body)
   of 'get key' (no quotes) to security-alert@xxxxxxx

- - - ------------------------------------------------------------------

(c)Copyright 2003 Hewlett-Packard Company
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
in this document is subject to change without notice.
Hewlett-Packard Company and the names of HP products referenced
herein are trademarks and/or service marks of Hewlett-Packard
Company.  Other product and company names mentioned herein may be
trademarks and/or service marks of their respective owners.

 ________________________________________________________________
- - - --

- - -----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA/AwUBPxR6w+AfOvwtKn1ZEQJrzwCdGAFvwgnUfSArmd2Xvob3Egt6eJ4AoMS2
AUkY6r/IOGsvYyicOKX9TKTe
=hFVp
- - -----END PGP SIGNATURE-----

- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Hewlett-Packard for the information
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBPxZcRYpao72zK539AQFzRwP+JgXXhGO1kkS9iGVov70z6Y/bqkB6o7MR
hAb+JDVQHMYHBa2VylC8kKwhWZa7CM1EFfTUEwVqDfnKolSv6kvfs5Evx/Zd3Umt
fr9+ux0gttyvxPnzSAneJTE+QGaH2PZo+2wyxNADkomjt3nw2Ewg9Oz+kz3u6ww7
N5WueXf1S9g=
=gPto
-----END PGP SIGNATURE-----