[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 586/03 - Hewlett-Packard Security Briefing



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 586/03 dated 27.10.03  Time: 13:10
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Hewlett-Packard Security Briefing:dtprintinfo HP Tru64 UNIX Potential 
Security Vulnerabilities

Detail
====== 

A potential security vulnerability has been reported
in the HP Tru64 UNIX CDE code that could result in
local or remote unauthorized privileged access.



        ESB-2003.0742 -- HEWLETT-PACKARD COMPANY SECURITY BULLETIN
 SSRT2405a - dtprintinfo HP Tru64 UNIX Potential Security Vulnerabilities
                              27 October 2003


Product:                CDE
Publisher:              Hewlett-Packard
Operating System:       HP Tru64 UNIX 4.0G
                        HP Tru64 UNIX 4.0F
Impact:                 Root Compromise
Access Required:        Remote

- - --------------------------BEGIN INCLUDED TEXT--------------------

- - -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SECURITY BULLETIN

REVISION: 0

SSRT2405a - dtprintinfo HP Tru64 UNIX Potential Security
Vulnerabilities

NOTICE: There are no restrictions for distribution of this
            Bulletin provided that it remains complete and
            intact.

RELEASE DATE:  October 2003


SOURCE:  HEWLETT-PACKARD COMPANY
         Software Security Response Team

REFERENCE:  SSRT2405 (VU#860296)

PROBLEM SUMMARY


A potential security vulnerability has been reported
in the HP Tru64 UNIX CDE code that could result in
local or remote unauthorized privileged access.

VERSIONS IMPACTED

HP Tru64 UNIX 4.0G PK4 (BL22)
HP Tru64 UNIX 4.0F PK8 (BL22)



RESOLUTION

Early Release Patches (ERPs) are now available for HP Tru64
UNIX V4.0G and V4.0F. The ERP kits use dupatch to install and
will not install over any Customer Specific Patches (CSPs) which
have file intersections with the ERPs.  Contact your normal
support channel and request HP Tru64 services elevate a case to
Support Engineering if a CSP must be merged with one of the ERPs.

Please review the README file for each patch prior to
installation.

Early Release Patches


  HP Tru64 UNIX 4.0G
  PREREQUISITE:   Tru64 UNIX with PK4 (BL22) installed
  ERP Kit Name:     T64KIT0020256-V40GB22-ES-20031010
  Kit Location:

http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT0
020256-V40GB22-ES-20031010


  HP Tru64 UNIX 4.0F
  PREREQUISITE:   Tru64 UNIX with PK8 (BL22) installed
  ERP Kit Name:     DUXKIT0020257-V40FB22-ES-20031010
  Kit Location:

http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=DUXKIT0
020257-V40FB22-ES-20031010


MD5  checksums are available from the ITRC patch database
main page http://www.itrc.hp.com/service/patch/mainPage.do.
 o From the patch database main page, click tru64 UNIX, then click
   verifying MD5 checksums under useful links. 

Patch Kits for the Sierra Cluster (SC) can be obtained by
contacting SC support through regular channels.


After completing the update, HP and Compaq strongly recommend that
you perform an immediate backup of the system disk so that any
subsequent restore operations begin with updated software.
Otherwise, the updates must be re-applied after a future restore
operation.  Also, if at some future time the system is upgraded to
a later patch release or version release, reinstall the
appropriate
ERP.


SUPPORT: For further information, contact HP Services.

SUBSCRIBE: To subscribe to automatically receive future
Security Advisories from the Software Security Response
Team via electronic mail:
http://www.support.compaq.com/patches/mail-list.shtml
 
REPORT: To report a potential security vulnerability with
any HP supported product, send email to: security-alert@xxxxxx

As always, HP urges you to periodically review your system
management and security procedures. HP will continue to
review and enhance the security features of its products
and work with our customers to maintain and improve the
security and integrity of their systems.

"HP is broadly distributing this Security Bulletin in order to
bring to the attention of users of the affected HP products
the important security information contained in this Bulletin.
HP recommends that all users determine the applicability of
this information to their individual situations and take
appropriate action. HP does not warrant that this information
is necessarily accurate or complete for all user situations and,
consequently, HP will not be responsible for any damages
resulting from user's use or disregard of the information
provided in this Bulletin."


(c)Copyright 2001, 2003 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or
Editorial errors or omissions contained herein. The information
in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard
products referenced herein are trademarks of Hewlett-Packard
Company in the United States and other countries. Other
product and company names mentioned herein may be
trademarks of their respective owners.

- - -----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.2

iQA/AwUBP5lj9+AfOvwtKn1ZEQIKwQCgncKggBUqMotcupURgtmWwCy7DIEAoLK6
8F758O+NEBsFXFppD8hyg9pJ
=Id0T
- - -----END PGP SIGNATURE-----


- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Hewlett-Packard for the information
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBP50X9Ipao72zK539AQF+igP+JSUx8v36IheULl8ejn2DESb/H8LqbdXl
xIfAqqIW/BPnPfWasanDCtDqd++KFnkQ/NJDqmOWpHDgWH5JjcqwsXfMYF0rrytd
B0/OqYhc0K0l8DlRjJ0qfUbvV+ZUkBWguYBF1CHFtxDd0ymZcBkQ1xR/16G91jE9
CbiQxLnkGpg=
=gFrP
-----END PGP SIGNATURE-----