[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 591/04 - HP Security Bulletin HPSBUX01088 - SSRT4807 HP-UX stmkfont local unauthorized



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 591/04 dated 25.10.04  Time: 12:40  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

HP Security Bulletin HPSBUX01088 - SSRT4807 HP-UX stmkfont local unauthorized 
privileged access

Detail
====== 

A potential security vulnerability has been reported with the HP-UX stmkfont 
program.  This vulnerability can be exploited to allow remote unauthorized access 
to resources owned by group 'bin.'



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             
             ESB-2004.0672 -- HP Security Bulletin HPSBUX01088
       SSRT4807 HP-UX stmkfont local unauthorized privileged access
                              25 October 2004

===========================================================================

        

Product:                stmkfont
Publisher:              Hewlett-Packard
Operating System:       HP-UX 11.23
                        HP-UX 11.22
                        HP-UX 11.11
                        HP-UX 11.00
Impact:                 Increased Privileges
Access:                 Existing Account

- - --------------------------BEGIN INCLUDED TEXT--------------------

- - -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBUX01088     REVISION: 0

SSRT4807 rev.0 HP-UX stmkfont local unauthorized privileged access

NOTICE:
There are no restrictions for distribution of this Bulletin provided 
that it remains complete and intact.

The information in this Security bulletin should be acted upon as soon 
as possible.

INITIAL RELEASE:
20 October 2004

POTENTIAL SECURITY IMPACT:
local unauthorized privileged access

SOURCE:
HEWLETT-PACKARD COMPANY
HP Software Security Response Team

REFERENCES:
None

VULNERABILITY SUMMARY:
A potential security vulnerability has been reported with the HP-UX 
stmkfont program.  This vulnerability can be exploited to allow remote 
unauthorized access to resources owned by group 'bin.'

SUPPORTED SOFTWARE VERSIONS*:  ONLY impacted versions are listed. 
HP-UX B11.00, B11.11, B.11.22, B11.23

BACKGROUND:
HP Company wishes to thank the NSFOCUS Security Team <security@xxxxxxxxxxx> 
for reporting this vulnerability to us and assisting us to protect all of 
our valued customers.

     AFFECTED VERSIONS

     Note: To determine if a system has an affected version,
           search the output of "swlist -a revision -l fileset"
           for an affected fileset.  Then determine if the
           recommended patch or update is installed.


     HP-UX B.11.23
     =============
     X11.X11-FONTSRV
     action: install PHSS_31990 or subsequent

     HP-UX B.11.22
     =============
     X11.X11-FONTSRV
     action: install PHSS_31989 or subsequent

     HP-UX B.11.11
     =============
     X11.X11-FONTSRV
     action: install PHSS_31988 or subsequent

     HP-UX B.11.00
     =============
     X11.X11-FONTSRV
     action: install PHSS_31987 or subsequent

     END AFFECTED VERSIONS

RESOLUTION:
HP has made the following patches available on http://itrc.hp.com:

PHSS_31990 - HP-UX B.11.23
PHSS_31989 - HP-UX B.11.22
PHSS_31988 - HP-UX B.11.11
PHSS_31987 - HP-UX B.11.00
MANUAL ACTIONS:  No
BULLETIN REVISION HISTORY:
Revision 0 - 20 October 2004

  Initial release


* The software product category that this Security Bulletin
  relates to is represented by the 5th and 6th characters of the
  Bulletin number: GN=General, MA=Management Agents,
  MI=Misc. 3rd party, MP=HP-MPE/iX, NS=HP NonStop Servers,
  OV=HP OpenVMS, PI=HP Printing & Imaging, ST=HP Storage,
  TU=HP Tru64 UNIX, TL=Trusted Linux, UX=HP-UX, VV=Virtual Vault


SUPPORT: For further information, contact HP Services support
         channel.

SUBSCRIBE: To initiate a subscription to receive future HP Security 
Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode
=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page:
Driver and Support Alerts/Notifications Sign-up: Product Selection Under 
Step1: your products 1. Select product category:
   - a minimum of servers must be selected.
2. Select product family or search:
   - a minimum of one product must be selected.
3. Add a product:
   - a minimum of one product must be added.
In Step 2: your operating system(s)
   - check ALL operating systems for which alerts are required. Complete the 
form and Save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page Subscriber's choice for Business: sign-in. On the Web 
page: Subscriber's Choice: your profile summary
- - - - use Edit Profile to update appropriate sections.

Note: In addition to the individual alerts/notifications for the selected 
operating systems/products, subscribers will automatically receive one copy 
of alerts for non-operating system categories (i.e., a subscriber who signs 
up for all six operating system alerts will only receive one copy of all the 
non-operating system alerts).



HP-UX SPECIFIC SECURITY BULLETINS*:
The HP-UX Security Patch Matrix is available here:
  http://itrc.hp.com/service/cki/docDisplay.do?
  docId=hpuxSecurityMatrix
Or via anonymous ftp:
  ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix/

The HP-UX Security Patch Matrix, updated daily, categorizes security patches 
by platform/OS release, and by Bulletin topic. The Security Patch Check tool 
completely automates the process of reviewing the Security Patch Matrix for 
HP-UX 11.XX Versions.

NOTE: Installing patches listed in the Security Patch Matrix will completely 
implement the RESOLUTION in the Security Bulletin _only_ if there are no 
MANUAL ACTIONS included.

The Security Patch Check tool can also verify that a Security Bulletin 
RESOLUTION has been implemented on HP-UX 11.XX Versions provided that no 
MANUAL ACTIONS were included. The Security Patch Check tool cannot verify 
patches implemented via product upgrade.

For information on the Security Patch Check tool, see:
  http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
  displayProductInfo.pl?productNumber=B6834AA

REPORT: To report a potential security vulnerability with any HP supported 
product, send Email to: security-alert@xxxxxxx It is strongly recommended 
that security related information being communicated to HP be encrypted using 
PGP, especially exploit information. To obtain the security-alert PGP key 
please send an e-mail message to security-alert@xxxxxx with the Subject of 
'get key' (no quotes).

System management and security procedures must be reviewed frequently to 
maintain system integrity. HP is continually reviewing and enhancing the 
security features of software products to provide customers with current 
secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the 
attention of users of the affected HP products the important security I
nformation contained in this Bulletin. HP recommends that all users determine 
the applicability of this information to their individual situations and take 
appropriate action. HP does not warrant that this information is necessarily 
accurate or complete for all user situations and, consequently, HP will not be 
responsible for any damages resulting from user's use or disregard of the 
information provided in this Bulletin. To the extent permitted by law, HP 
disclaims all warranties, either express or implied, including the warranties 
of merchantability and fitness for a particular purpose, title and non-infringement."

(c)Copyright 2004 Hewlett-Packard Development Company, L.P. Hewlett-Packard 
Company shall not be liable for technical or editorial errors or omissions 
contained herein. The information provided is provided "as is" without 
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, 
subcontractors or suppliers will be liable for incidental, special or consequential 
damages including downtime cost; lost profits; damages relating to the procurement 
of substitute products or services; or damages for loss of data, or software 
restoration. The information in this document is subject to change without notice. 
Hewlett-Packard Company and the names of Hewlett-Packard products referenced 
herein are trademarks of Hewlett-Packard Company in the United States and 
other countries. Other product and company names mentioned herein may be 
trademarks of their respective owners.

- - -----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBQXa/geAfOvwtKn1ZEQKFggCggQuXX2ucVkqZ9m7j1gTWVq13d4EAnA3i
uEcBD7LYxrbnSq+BNcpuXqSx
=vdWt
- - -----END PGP SIGNATURE-----

- - --------------------------END INCLUDED TEXT--------------------

 

iQCVAwUBQXxHYSh9+71yA2DNAQIFhAP/VI2RIfn2TSePDCKnBfgRJ0kg4WBvQdFC
fxhPbBm7xOP+znmRvDZFlNLUKessSK6IF6uHEH5gk8obloniUpT2WrJRrcXCCBE1
7vPdYqbZDB+k8Z3MABASnioWZywp0T2qMoLynszAkcxcXgWRwHIco3sNk34xKrgJ
IRZS3z0OAQY=
=fTHw
- -----END PGP SIGNATURE-----

- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Hewlett Packard for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBQXzmPYpao72zK539AQFrxgP/QLp8ZftYRqJ8RQzdIhSUSETRSsx5kIE9
9gu/njUPnSYDbGezPcX0B6FuZ4IAo03Z9uGOrZ4FC2Ul0iSgp+ZteEZg95zSpzvO
j7/si+smx+jmn2y7ikQRW5T6kUHPFN3Ww7mR2qFHA7H6CH5txxwq/Kcny+IgCAqH
GUjzigLGIYA=
=arFX
-----END PGP SIGNATURE-----