[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 709/06 - Two Hewlett Packard Security Bulletins:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

 UNIRAS (UK Government CERT) Briefing - 709/06 dated 03.11.06 time 14:45
 UNIRAS is part of NISCC (the UK National Infrastructure Security
 Co-ordination Centre)
______________________________________________________________________________

 UNIRAS material is available from the NISCC website at www.niscc.gov.uk
______________________________________________________________________________

Title
=====

Two Hewlett Packard Security Bulletins:

1. HPSBMA02159 SSRT061238 rev.1 - HP System Management Homepage (SMH),
Remote Bypassing of Security Features or Cross Site Scripting or Denial
of Service (DoS)

2. HPSBMA02170 SSRT061270 rev.1 - HP System Management Homepage (SMH), 
Remote Cross Site Scripting or Denial of Service (DoS)

Detail
======

1. Potential security vulnerabilities have been identified in PHP, an open
source software component supplied with HP System Management Homepage
(SMH). These vulnerabilities could by exploited remotely resulting in
the bypassing of security features, cross site scripting, or Denial of
Service (DoS).

2. Potential security vulnerabilities have been identified with HP System
Management Homepage (SMH). These vulnerabilities could be exploited
remotely to create a cross site scripting attack or a Denial of Service
(DoS).


1.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00786522
Version: 1


NOTICE: The information in this Security Bulletin should be acted upon
as soon as possible.

Release Date: 2006-11-01
Last Updated: 2006-11-01

Potential Security Impact: Remote security bypass or cross site
scripting or Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in PHP, an open
source software component supplied with HP System Management Homepage
(SMH). These vulnerabilities could by exploited remotely resulting in
the bypassing of security features, cross site scripting, or Denial of
Service (DoS).

References: CVE-2005-2491, CVE-2005-3319, CVE-2005-3353, CVE-2005-3388,
CVE-2005-3389, CVE-2005-3390, CVE-2005-3391, CVE-2005-3392

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP System Management Homepage (SMH) versions prior to 2.1.5 running on
Linux and Windows.

BACKGROUND

RESOLUTION

HP has provided System Management Homepage (SMH) version 2.1.5 or
subsequent for each platform to resolve this issue.

HP System Management Homepage for Linux (x86) version 2.1.5-146 can be
downloaded from
http://h18023.www1.hp.com/support/files/server/us/download/24193.html

HP System Management Homepage for Linux (AMD64/EM64T) version 2.1.5-146
can be downloaded from
http://h18023.www1.hp.com/support/files/server/us/download/24172.html

HP System Management Homepage for Windows version 2.1.5-146 can be
downloaded from
http://h18007.www1.hp.com/support/files/server/us/download/23883.html

PRODUCT SPECIFIC INFORMATION

HISTORY:
Version:1 (rev.1) - 1 November 2006 Initial Release

Third Party Security Patches: Third party security patches which are to
be installed on systems running HP software products should be applied
in accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support
channel.

Report: To report a potential security vulnerability with any HP
supported product, send Email to: security-alert@xxxxxx
It is strongly recommended that security related information being
communicated to HP be encrypted using PGP, especially exploit
information.
To get the security-alert PGP key, please send an e-mail message as
follows:
  To: security-alert@xxxxxx
  Subject: get key

Subscribe: To initiate a subscription to receive future HP Security
Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=
USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
  - check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
  - verify your operating system selections are checked and save.

To update an existing subscription:
http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit
Profile to update appropriate sections.

To review previously published Security Bulletins visit:
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin relates to
is represented by the 5th and 6th characters of the Bulletin number in
the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to
maintain system integrity. HP is continually reviewing and enhancing the
security features of software products to provide customers with current
secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to
the attention of users of the affected HP products the important
security information contained in this Bulletin. HP recommends that all
users determine the applicability of this information to their
individual situations and take appropriate action. HP does not warrant
that this information is necessarily accurate or complete for all user
situations and, consequently, HP will not be responsible for any damages
resulting from user's use or disregard of the information provided in
this Bulletin. To the extent permitted by law, HP disclaims all
warranties, either express or implied, including the warranties of
merchantability and fitness for a particular purpose, title and
non-infringement."

(c)Copyright 2006 Hewlett-Packard Development Company, L.P.

Hewlett-Packard Company shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is
provided "as is" without warranty of any kind. To the extent permitted
by law, neither HP or its affiliates, subcontractors or suppliers will
be liable for incidental, special or consequential damages including
downtime cost; lost profits; damages relating to the procurement of
substitute products or services; or damages for loss of data, or
software restoration. The information in this document is subject to
change without notice. Hewlett-Packard Company and the names of
Hewlett-Packard products referenced herein are trademarks of
Hewlett-Packard Company in the United States and other countries. Other
product and company names mentioned herein may be trademarks of their
respective owners.
- -----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRUngl+AfOvwtKn1ZEQJI1ACghtQW/CXAVNRAxIC/WF3Y0xky2IIAoMN7
FrK+8N5WxaHjk6DRS1Kw/q/Q
=GCt9
- -----END PGP SIGNATURE-----



2.


The following Security Bulletin may contain long lines.  If this causes
a verification problem with the PGP signature, please use the copy in
the attached text file for verification.

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00798498
Version: 1

HPSBMA02170 SSRT061270 rev.1 - HP System Management Homepage (SMH),
Remote Cross Site Scripting or Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon
as soon as possible.

Release Date: 2006-10-01
Last Updated: 2006-11-01

Potential Security Impact: Remote cross site scripting or Denial of
Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP System
Management Homepage (SMH). These vulnerabilities could be exploited
remotely to create a cross site scripting attack or a Denial of Service
(DoS).

References: CVE-2005-3352, CVE-2005-3357

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
System Management Homepage (Version 2.0.0 through Version 2.1.5) running
on Microsoft Windows 2000, 2003, 2003 x64, and 2003 for Itanium; Linux
and Linux(AMD64/EM64T).

BACKGROUND

System Management Homepage is a component of HP ProLiant Support Pack
(PSP).

To ensure that HP System Management Homepage Software has the most
current enhancements and patches, upgrade to the latest versions as they
become available. For additional information, refer to the ProLiant
server management web site at the following URL:
http://www.hp.com/servers/manage

RESOLUTION

HP has provided System Management Homepage Version 2.1.6 or subsequent
to resolve the issues. These versions include OpenSSL 0.9.7i or
subsequent to address the potential vulnerabilities.

HP System Management Homepage for Windows version 2.1.6-156 can be
downloaded from
http://h18023.www1.hp.com/support/files/server/us/download/24235.html

HP System Management Homepage for Linux (x86) version 2.1.6-156 can be
downloaded from
http://h18023.www1.hp.com/support/files/server/us/download/24257.html

HP System Management Homepage for Linux (AMD64/EM64T) version 2.1.6-156
can be downloaded from
http://h18023.www1.hp.com/support/files/server/us/download/24256.html

PRODUCT SPECIFIC INFORMATION

HISTORY
Version:1 (rev.1) - 1 November 2006 Initial release

Third Party Security Patches: Third party security patches which are to
be installed on systems running HP software products should be applied
in accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support
channel.

Report: To report a potential security vulnerability with any HP
supported product, send Email to: security-alert@xxxxxx
It is strongly recommended that security related information being
communicated to HP be encrypted using PGP, especially exploit
information.
To get the security-alert PGP key, please send an e-mail message as
follows:
  To: security-alert@xxxxxx
  Subject: get key

Subscribe: To initiate a subscription to receive future HP Security
Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=
USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
  - check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
  - verify your operating system selections are checked and save.

To update an existing subscription:
http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit
Profile to update appropriate sections.

To review previously published Security Bulletins visit:
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin relates to
is represented by the 5th and 6th characters of the Bulletin number in
the title:

GN = HP General SW	
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to
maintain system integrity. HP is continually reviewing and enhancing the
security features of software products to provide customers with current
secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to
the attention of users of the affected HP products the important
security information contained in this Bulletin. HP recommends that all
users determine the applicability of this information to their
individual situations and take appropriate action. HP does not warrant
that this information is necessarily accurate or complete for all user
situations and, consequently, HP will not be responsible for any damages
resulting from user's use or disregard of the information provided in
this Bulletin. To the extent permitted by law, HP disclaims all
warranties, either express or implied, including the warranties of
merchantability and fitness for a particular purpose, title and
non-infringement."

(c)Copyright 2006 Hewlett-Packard Development Company, L.P.

Hewlett-Packard Company shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is
provided "as is" without warranty of any kind. To the extent permitted
by law, neither HP or its affiliates, subcontractors or suppliers will
be liable for incidental, special or consequential damages including
downtime cost; lost profits; damages relating to the procurement of
substitute products or services; or damages for loss of data, or
software restoration. The information in this document is subject to
change without notice. Hewlett-Packard Company and the names of
Hewlett-Packard products referenced herein are trademarks of
Hewlett-Packard Company in the United States and other countries. Other
product and company names mentioned herein may be trademarks of their
respective owners.

- -----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRUnfbuAfOvwtKn1ZEQKglgCg3b1QgKo1WBXGL7Zo6BIJZUc7kOIAoJAM
85Tvc8SZBHmlYJIzQutW7fMh
=8CuT
- -----END PGP SIGNATURE-----


______________________________________________________________________________

NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
(Place an 'X' next to your choice)

Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
______________________________________________________________________________

For additional information or assistance, please contact our help desk
by telephone.  You may send Not Protectively Marked information via
e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

______________________________________________________________________________

UNIRAS wishes to acknowledge the contributions of Hewlett Packard for the
information contained in this briefing.
______________________________________________________________________________

This notice contains information released by the original author.
Some of the information may have changed since it was released. If the
vulnerability affects you, it may be prudent to retrieve the advisory
from the site of the original source to ensure that you receive the most
current information concerning that problem.

Reference to any specific commercial product, process, or service by
trade name, trademark manufacturer, or otherwise, does not constitute or
imply its endorsement, recommendation, or favouring by UNIRAS or NISCC.
The views and opinions of authors expressed within this notice shall not
be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall not be liable for any loss or damage whatsoever, arising from or
in connection with the usage of information contained within this
notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST) and has contacts with other international Incident Response
Teams (IRTs) in order to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote
information sharing amongst its members and the community at large.
______________________________________________________________________________

<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRUtVK2l7oeQsXfKvEQLmWQCgkV7+mL9POWgp9JEXAfiCBzzZpo8AoLiA
7GOxoc9nQ+pbL61zbsRJck+n
=/Yu4
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________