[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 749/06 - Hewlett Packard Security Bulletin: HPSBTU02171 SSRT061222 rev.1 - HP Tru64 UNIX



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

 UNIRAS (UK Government CERT) Briefing - 749/06 dated 15.11.06 time 14:40
 UNIRAS is part of NISCC (the UK National Infrastructure Security
 Co-ordination Centre)
______________________________________________________________________________

 UNIRAS material is available from the NISCC website at www.niscc.gov.uk
______________________________________________________________________________

Title
=====

Hewlett Packard Security Bulletin: HPSBTU02171 SSRT061222 rev.1 - HP Tru64 UNIX 
POSIX Threads, Local Execution of Arbitrary Code, Privilege Elevation

Detail
======

A potential security vulnerability has been identified in the POSIX
Threads library "libpthread" on the HP Tru64 UNIX Operating System. The
vulnerability could be exploited by a local, authorized user to execute
arbitrary code with the privileges of the root user.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00800193
Version: 1

HPSBTU02171 SSRT061222 rev.1 - HP Tru64 UNIX POSIX Threads, Local
Execution of Arbitrary Code, Privilege Elevation

NOTICE: The information in this Security Bulletin should be acted upon
as soon as possible.

Release Date: 2006-11-09
Last Updated: 2006-11-08

Potential Security Impact: Local execution of arbitrary code, privilege
elevation

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in the POSIX
Threads library "libpthread" on the HP Tru64 UNIX Operating System. The
vulnerability could be exploited by a local, authorized user to execute
arbitrary code with the privileges of the root user.

References: NETRAGARD-20060810

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
The following supported software versions are affected:

    * HP Tru64 UNIX 5.1A PK6
    * HP Tru64 UNIX 4.0G PK4
    * HP Tru64 UNIX 4.0F PK8

BACKGROUND


The Hewlett-Packard Company thanks Adriel T. Desautels of Netragard,
L.L.C for reporting this vulnerability to security-alert@xxxxxx

RESOLUTION

HP has released the following Early Release Patch kits (ERPs) publicly
for use by any customer. The ERP kits use dupatch to install and will
not install over any Customer Specific Patches (CSPs) that have file
intersections with the ERP.

HP Tru64 UNIX Version 5.1B-3
Note: HP Tru64 UNIX 5.1B-3 is not impacted by this vulnerability.
No ERP download or installation is necessary.

HP Tru64 UNIX Version 5.1B-2/PK4
Note: HP Tru64 UNIX 5.1B-2/PK4 is not impacted by this vulnerability.
No ERP download or installation is necessary.

HP Tru64 UNIX Version 5.1A PK6 ERP Kit
Location:
http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT10009
74-V51AB24-ES-20061031
Name: T64KIT1000974-V51AB24-ES-20061031
MD5 Checksum: 5d61225e7bdbeed85b8f1a01153673c2

HP Tru64 UNIX Version 4.0G PK4 ERP Kit
Location:
http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT10009
76-V40GB22-ES-20061031
Name: T64KIT1000976-V40GB22-ES-20061031
MD5 Checksum: c0cf54eaa49b6984e4ff515e965c63d2

HP Tru64 UNIX Version 4.0F PK8 ERP Kit
Location:
http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=DUXKIT10009
75-V40FB22-ES-20061031
Name: DUXKIT1000975-V40FB22-ES-20061031
MD5 Checksum: 66c02c0b132b794d2b0888d0baefdaa6

PRODUCT SPECIFIC INFORMATION

HISTORY

Version:1 (rev.1) - 9 November 2006 Initial release

Third Party Security Patches: Third party security patches which are to
be installed on systems running HP software products should be applied
in accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support
channel.

Report: To report a potential security vulnerability with any HP
supported product, send Email to: security-alert@xxxxxx
It is strongly recommended that security related information being
communicated to HP be encrypted using PGP, especially exploit
information.
To get the security-alert PGP key, please send an e-mail message as
follows:
  To: security-alert@xxxxxx
  Subject: get key

Subscribe: To initiate a subscription to receive future HP Security
Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=
USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
  - check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
  - verify your operating system selections are checked and save.

To update an existing subscription:
http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit
Profile to update appropriate sections.

To review previously published Security Bulletins visit:
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin relates to
is represented by the 5th and 6th characters of the Bulletin number in
the title:

GN = HP General SW
MA = HP Management Agents 
MI = Misc. 3rd Party SW 
MP = HP MPE/iX	
NS = HP NonStop Servers 
OV = HP OpenVMS 
PI = HP Printing & Imaging 
ST = HP Storage SW
TL = HP Trusted Linux 
TU = HP Tru64 UNIX 
UX = HP-UX 
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to
maintain system integrity. HP is continually reviewing and enhancing the
security features of software products to provide customers with current
secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to
the attention of users of the affected HP products the important
security information contained in this Bulletin. HP recommends that all
users determine the applicability of this information to their
individual situations and take appropriate action. HP does not warrant
that this information is necessarily accurate or complete for all user
situations and, consequently, HP will not be responsible for any damages
resulting from user's use or disregard of the information provided in
this Bulletin. To the extent permitted by law, HP disclaims all
warranties, either express or implied, including the warranties of
merchantability and fitness for a particular purpose, title and
non-infringement."

(c)Copyright 2006 Hewlett-Packard Development Company, L.P.

Hewlett-Packard Company shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is
provided "as is" without warranty of any kind. To the extent permitted
by law, neither HP or its affiliates, subcontractors or suppliers will
be liable for incidental, special or consequential damages including
downtime cost; lost profits; damages relating to the procurement of
substitute products or services; or damages for loss of data, or
software restoration. The information in this document is subject to
change without notice. Hewlett-Packard Company and the names of
Hewlett-Packard products referenced herein are trademarks of
Hewlett-Packard Company in the United States and other countries. Other
product and company names mentioned herein may be trademarks of their
respective owners.

- -----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRVh3neAfOvwtKn1ZEQIOHgCg/KdAdmMGgqCXlBKgduzlAA5I+zsAni2V
F6yLU7yGuP7luIQktcbpm1Qa
=RzRf
- -----END PGP SIGNATURE-----




______________________________________________________________________________

NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
(Place an 'X' next to your choice)

Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
______________________________________________________________________________

For additional information or assistance, please contact our help desk
by telephone.  You may send Not Protectively Marked information via
e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

______________________________________________________________________________

UNIRAS wishes to acknowledge the contributions of Hewlett Packard for the
information contained in this briefing.
______________________________________________________________________________

This notice contains information released by the original author.
Some of the information may have changed since it was released. If the
vulnerability affects you, it may be prudent to retrieve the advisory
from the site of the original source to ensure that you receive the most
current information concerning that problem.

Reference to any specific commercial product, process, or service by
trade name, trademark manufacturer, or otherwise, does not constitute or
imply its endorsement, recommendation, or favouring by UNIRAS or NISCC.
The views and opinions of authors expressed within this notice shall not
be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall not be liable for any loss or damage whatsoever, arising from or
in connection with the usage of information contained within this
notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST) and has contacts with other international Incident Response
Teams (IRTs) in order to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote
information sharing amongst its members and the community at large.
______________________________________________________________________________

<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRVslZ2l7oeQsXfKvEQLd7QCgpvWNVkA+S2R9x4qKFw0joVHhDVoAn1+z
o1nobOZc3+BCUSYY3FMrqZSF
=+oPG
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________