hp-ux.hpterm+ftp.txt

1999-08-17T00:00:00
ID PACKETSTORM:12014
Type packetstorm
Reporter Packet Storm
Modified 1999-08-17T00:00:00

Description

                                        
                                            `Date: Wed, 31 Mar 1999 11:30:48 -0800 (PST)  
From: CIAC Mail User <ciac@rumpole.llnl.gov>  
To: ciac-bulletin@rumpole.llnl.gov  
Subject: CIAC Bulletin J-038: HP-UX Vulnerabilities (hpterm, ftp)  
  
[ For Public Release ]  
-----BEGIN PGP SIGNED MESSAGE-----  
  
__________________________________________________________  
  
The U.S. Department of Energy  
Computer Incident Advisory Capability  
___ __ __ _ ___  
/ | /_\ /  
\___ __|__ / \ \___  
__________________________________________________________  
  
INFORMATION BULLETIN  
  
HP-UX Vulnerabilities (hpterm, ftp)  
H-P Security Bulletins #00093 and #00094  
  
March 31, 1999 15:00 GMT Number J-038  
______________________________________________________________________________  
PROBLEM: Two vulnerabilities have been identified by Hewlett-Packard  
Company.  
1) PHSS_13560 introduced a library access problem into hpterm.  
2) There is a Security Vulnerability during ftp operations.  
PLATFORM: 1) HP9000 Series 700 and Series 800, HP-UX release 10.20 only.  
2) HP9000 Series 7/800 running HP-UX release 11.00 only.  
DAMAGE: Users can gain increased privileges.  
SOLUTION: Apply patches.  
______________________________________________________________________________  
VULNERABILITY Risk is high. Both of these vulnerabilities affect systems  
ASSESSMENT: security. Patches should be applied as soon as possible.  
______________________________________________________________________________  
  
[Start Hewlett-Packard Company Advisory]  
  
1) PHSS_13560  
  
Document ID: HPSBUX9903-093  
Date Loaded: 19990317  
Title: Security Vulnerability with hpterm on HP-UX 10.20  
  
- -----------------------------------------------------------------------  
HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00093, 18 March 1999  
- -----------------------------------------------------------------------  
  
The information in the following Security Bulletin should be acted upon  
as soon as possible. Hewlett-Packard Company will not be liable for any  
consequences to any customer resulting from customer's failure to fully  
implement instructions in this Security Bulletin as soon as possible.  
  
- -----------------------------------------------------------------------  
PROBLEM: PHSS_13560 introduced a library access problem into hpterm.  
  
PLATFORM: HP9000 Series 700 and Series 800, HP-UX release 10.20 only.  
  
DAMAGE: Users can gain increased privileges.  
  
SOLUTION: Install PHSS_17830.  
  
AVAILABILITY: The patch is available now.  
  
- -----------------------------------------------------------------------  
I.  
A. Background  
  
PHSS_13560 introduced a library access problem into hpterm, the  
terminal emulator for the X Window system. (See hpterm(1)).  
  
B. Fixing the problem  
  
Installing patch PHSS_17830 completely fixes this problem.  
  
NOTE: Three older hpterm patches have been released including  
PHSS_13560, PHSS_15431, and PHSS_17332. All of these older  
patches are being superseded with the release of the  
PHSS_17830.  
  
Do not use PHSS_13560, PHSS_15431, or PHSS_17332.  
  
  
C. To subscribe to automatically receive future NEW HP Security  
Bulletins from the HP Electronic Support Center via electronic  
mail, do the following:  
  
Use your browser to get to the HP Electronic Support Center page  
at:  
  
http://us-support.external.hp.com  
(for US, Canada, Asia-Pacific, & Latin-America)  
http://europe-support.external.hp.com (for Europe)  
  
Login with your user ID and password (or register for one).  
Remember to save the User ID assigned to you, and your password.  
Once you are in the Main Menu:  
To -subscribe- to future HP Security Bulletins,  
click on "Support Information Digests".  
To -review- bulletins already released from the main Menu,  
click on the "Technical Knowledge Database (Security Bulletins  
only)".  
Near the bottom of the next page, click on "Browse the HP Security  
Bulletin Archive".  
  
Once in the archive there is another link to our current Security  
Patch Matrix. Updated daily, this matrix categorizes security  
patches by platform/OS release, and by bulletin topic.  
  
The security patch matrix is also available via anonymous ftp:  
  
us-ffs.external.hp.com  
~ftp/export/patches/hp-ux_patch_matrix  
  
D. To report new security vulnerabilities, send email to  
  
security-alert@hp.com  
  
Please encrypt any exploit information using the security-alert  
PGP key, available from your local key server, or by sending a  
message with a -subject- (not body) of 'get key' (no quotes) to  
security-alert@hp.com.  
  
Permission is granted for copying and circulating this Bulletin to  
Hewlett-Packard (HP) customers (or the Internet community) for the  
purpose of alerting them to problems, if and only if, the Bulletin  
is not edited or changed in any way, is attributed to HP, and  
provided such reproduction and/or distribution is performed for  
non-commercial purposes.  
  
Any other use of this information is prohibited. HP is not liable  
for any misuse of this information by any third party.  
_____________________________________________________________________  
- ---End of Document ID: HPSBUX9903-093---------------------------------  
  
2) ftp  
  
Document ID: HPSBUX9903-094  
Date Loaded: 19990323  
Title: Security Vulnerability with ftp on HP-UX 11.00  
  
- -----------------------------------------------------------------------  
HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00094, 24 March 1999  
- -----------------------------------------------------------------------  
  
The information in the following Security Bulletin should be acted upon  
as soon as possible. Hewlett-Packard Company will not be liable for any  
consequences to any customer resulting from customer's failure to fully  
implement instructions in this Security Bulletin as soon as possible.  
  
- -----------------------------------------------------------------------  
PROBLEM: Security Vulnerability during ftp operations.  
  
PLATFORM: HP9000 Series 7/800 running HP-UX release 11.00 only.  
  
DAMAGE: Users can increase privileges  
  
SOLUTION: Apply the patch specified below  
  
AVAILABILITY: The patch is available now.  
- -----------------------------------------------------------------------  
I.  
A. Background  
Hewlett-Packard Company has found that during normal operations,  
the ftp program might grant users increased privileges.  
  
B. Fixing the problem  
Obtaining and installing the following patch will completely close  
this vulnerability. Rebooting the system will NOT be required.  
  
For all HP9000 S7/800 platforms running HP-UX 11.00: PHCO_17601  
  
C. To subscribe to automatically receive future NEW HP Security  
Bulletins or access the HP Electronic Support Center, use your  
browser to get to our ESC web page at:  
  
http://us-support.external.hp.com (for non-European locations),  
or http://europe-support.external.hp.com (for Europe)  
  
Login with your user ID and password (or register for one).  
Remember to save the User ID/password assigned to you.  
  
Once you are in the Main Menu:  
To -subscribe- to future HP Security Bulletins,  
click on "Support Information Digests".  
To -review Security bulletins already released-,  
click on the "Search Technical Knowledge Database."  
To -retrieve patches-, click on "Individual Patches" and select  
appropriate release and locate with the patch identifier (ID).  
To -browse the HP Security Bulletin Archive-, select the link at  
the bottom of the page once in the "Support Information Digests".  
To -view the Security Patch Matrix-, (updated daily) which  
categorizes security patches by platform/OS release, and by  
bulletin topic, go to the archive (above) and follow the links.  
  
The security patch matrix is also available via anonymous ftp:  
us-ffs.external.hp.com or ~ftp/export/patches/hp-ux_patch_matrix  
  
D. To report new security vulnerabilities, send email to  
  
security-alert@hp.com  
  
Please encrypt any exploit information using the security-alert  
PGP key, available from your local key server, or by sending a  
message with a -subject- (not body) of 'get key' (no quotes) to  
security-alert@hp.com.  
  
Permission is granted for copying and circulating this Bulletin to  
Hewlett-Packard (HP) customers (or the Internet community) for the  
purpose of alerting them to problems, if and only if, the Bulletin  
is not edited or changed in any way, is attributed to HP, and  
provided such reproduction and/or distribution is performed for  
non-commercial purposes.  
  
Any other use of this information is prohibited. HP is not liable  
for any misuse of this information by any third party.  
______________________________________________________________________  
- ---End of Document ID: HPSBUX9903-094---------------------------------  
  
[End Hewlett-Packard Company Advisory]  
___________________________________________________________________________  
  
  
CIAC wishes to acknowledge the contributions of Hewlett-Packard Company for  
the information contained in this bulletin.  
___________________________________________________________________________  
  
  
  
CIAC, the Computer Incident Advisory Capability, is the computer  
security incident response team for the U.S. Department of Energy  
(DOE) and the emergency backup response team for the National  
Institutes of Health (NIH). CIAC is located at the Lawrence Livermore  
National Laboratory in Livermore, California. CIAC is also a founding  
member of FIRST, the Forum of Incident Response and Security Teams, a  
global organization established to foster cooperation and coordination  
among computer security teams worldwide.  
  
CIAC services are available to DOE, DOE contractors, and the NIH. CIAC  
can be contacted at:  
Voice: +1 925-422-8193  
FAX: +1 925-423-8002  
STU-III: +1 925-423-2604  
E-mail: ciac@llnl.gov  
  
For emergencies and off-hour assistance, DOE, DOE contractor sites,  
and the NIH may contact CIAC 24-hours a day. During off hours (5PM -  
8AM PST), call the CIAC voice number 925-422-8193 and leave a message,  
or call 800-759-7243 (800-SKY-PAGE) to send a Sky Page. CIAC has two  
Sky Page PIN numbers, the primary PIN number, 8550070, is for the CIAC  
duty person, and the secondary PIN number, 8550074 is for the CIAC  
Project Leader.  
  
Previous CIAC notices, anti-virus software, and other information are  
available from the CIAC Computer Security Archive.  
  
World Wide Web: http://www.ciac.org/  
(or http://ciac.llnl.gov -- they're the same machine)  
Anonymous FTP: ftp.ciac.org  
(or ciac.llnl.gov -- they're the same machine)  
Modem access: +1 (925) 423-4753 (28.8K baud)  
+1 (925) 423-3331 (28.8K baud)  
  
CIAC has several self-subscribing mailing lists for electronic  
publications:  
1. CIAC-BULLETIN for Advisories, highest priority - time critical  
information and Bulletins, important computer security information;  
2. SPI-ANNOUNCE for official news about Security Profile Inspector  
(SPI) software updates, new features, distribution and  
availability;  
3. SPI-NOTES, for discussion of problems and solutions regarding the  
use of SPI products.  
  
Our mailing lists are managed by a public domain software package  
called Majordomo, which ignores E-mail header subject lines. To  
subscribe (add yourself) to one of our mailing lists, send the  
following request as the E-mail message body, substituting  
ciac-bulletin, spi-announce OR spi-notes for list-name:  
  
E-mail to ciac-listproc@llnl.gov or majordomo@tholia.llnl.gov:  
subscribe list-name  
e.g., subscribe ciac-bulletin  
  
You will receive an acknowledgment email immediately with a confirmation  
that you will need to mail back to the addresses above, as per the  
instructions in the email. This is a partial protection to make sure  
you are really the one who asked to be signed up for the list in question.  
  
If you include the word 'help' in the body of an email to the above address,  
it will also send back an information file on how to subscribe/unsubscribe,  
get past issues of CIAC bulletins via email, etc.  
  
PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing  
communities receive CIAC bulletins. If you are not part of these  
communities, please contact your agency's response team to report  
incidents. Your agency's team will coordinate with CIAC. The Forum of  
Incident Response and Security Teams (FIRST) is a world-wide  
organization. A list of FIRST member organizations and their  
constituencies can be obtained via WWW at http://www.first.org/.  
  
This document was prepared as an account of work sponsored by an  
agency of the United States Government. Neither the United States  
Government nor the University of California nor any of their  
employees, makes any warranty, express or implied, or assumes any  
legal liability or responsibility for the accuracy, completeness, or  
usefulness of any information, apparatus, product, or process  
disclosed, or represents that its use would not infringe privately  
owned rights. Reference herein to any specific commercial products,  
process, or service by trade name, trademark, manufacturer, or  
otherwise, does not necessarily constitute or imply its endorsement,  
recommendation or favoring by the United States Government or the  
University of California. The views and opinions of authors expressed  
herein do not necessarily state or reflect those of the United States  
Government or the University of California, and shall not be used for  
advertising or product endorsement purposes.  
  
LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)  
  
J-027: Digital Unix Vulnerabilities ( at , inc )  
J-028: Sun Solaris Vulnerabilities (sdtcm_convert, man/catman, CDE)  
J-029: Buffer Overflows in Various FTP Servers  
J-030: Microsoft BackOffice Vulnerability  
J-031: Debian Linux "Super" package Buffer Overflow  
J-032: Windows Backdoors Update II:  
J-034: Cisco 7xx TCP and HTTP Vulnerabilities  
J-035: Linux Blind TCP Spoofing  
J-036: LDAP Buffer overflow against Microsoft Directory Services  
J-037: W97M.Melissa Word Macro Virus  
  
-----BEGIN PGP SIGNATURE-----  
Version: 4.0 Business Edition  
  
iQCVAwUBNwJkHLnzJzdsy3QZAQHrWAP9E27Nc3P8XLWJ1IM/JOzMdHy5mvymnUdh  
dzkEuldX35r+KGPlZYGxAq6NbKeYQFgi24C1OHg7V/MhcgnXKHPB6DN7Zdd6g6ii  
sUAnZ7LD3MqQb7OIMq2D3GdWzLzn/u5qpanKt1VjNYtQCGi4RbH9YgJFnLFgma8I  
dX/jer4bE6M=  
=Q2lE  
-----END PGP SIGNATURE-----  
  
`