[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: [security bulletin] HPSBMA02323 SSRT080032 rev.1 - HP USB Floppy Drive Key (Option) for ProLiant Ser
From: security-alert () hp ! com
Date: 2008-04-04 11:41:40
Message-ID: 20080404114140.949133B76 () hpchs ! cup ! hp ! com
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01404119
Version: 1
HPSBMA02323 SSRT080032 rev.1 - HP USB Floppy Drive Key (Option) for ProLiant Servers, \
Local Virus Infection
NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.
Release Date: 2008-04-03
Last Updated: 2008-04-03
Potential Security Impact: Local virus infection.
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with two types of optional HP \
USB Floppy Drive Keys intended for use with certain ProLiant servers. This \
vulnerability could cause a local 'W32.Fakerecy' or 'W32.SillyFDC' virus infection.
References: CVE-2008-0708
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Option Part # 442084-B21 HP 256MB USB 2.0 Floppy Drive Key
Option Part # 442085-B21 HP 1GB USB 2.0 Floppy Drive Key
The optional Floppy Drive Keys listed above could be used on the following servers:
ProLiant BL20pG4; ProLiant BL25pG2
ProLiant BL45pG2
ProLiant BL260c
ProLiant BL460c; ProLiant BL465c; ProLiant BL465cG5; ProLiant BL480c
ProLiant BL680cG5; ProLiant BL685c; ProLiant BL685cG5
ProLiant DL120G5; ProLiant DL140G3; ProLiant DL145G3; ProLiant DL160G5; ProLiant \
DL165G5; ProLiant DL180; ProLiant DL180G5; ProLiant DL185G5 ProLiant DL320G5; \
ProLiant DL320G5p; ProLiant DL320s; ProLiant DL360G5; ProLiant DL365; ProLiant \
DL365G5; ProLiant DL380G5; ProLiant DL385G2; ProLiant DL385G5 ProLiant DL580G4; \
ProLiant DL580G5; ProLiant DL585G2; ProLiant DL585G5 ProLiant ML110G4; ProLiant \
ML110G5; ProLiant ML115; ProLiant ML115G5; ProLiant ML150G3; ProLiant Ml150G5 \
ProLiant ML310G4; ProLiant ML310G5; ProLiant ML350G5; ProLiant ML370G5 ProLiant \
ML570G4 IP Console Switch with virtual media
Server Console switch
Server Console Switch with virtual media
TFT7600 (USB Pass-through)
1U Rackmount Keyboard with USB
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score
CVE-2008-0708 (AV:L/AC:L/Au:S/C:N/I:N/A:P) 1.7
Information on CVSS is documented in HP Customer Notice: HPSN-2008-002.
Virus Information: W32.Fakerecy and W32.SillyFDC
Discovered: January/February 2007
Type: Worm
Threat Level: Low
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows NT, Windows \
2000 Virus detail: W32.Fakerecy and W32.SillyFDC are worms that spread by copying \
themselves to removable and/or mapped drives.
RESOLUTION
HP is providing the following procedure to resolve this vulnerability:
1. HP recommends that the optional HP USB Floppy Drive Key be checked for the \
potential virus infections and cleaned. To detect and clean this virus infection the \
HP USB Floppy Drive Key can be plugged into a USB 2.0 port on a system with current \
(up-to-date) anti-virus software and scanned.
2. If the optional HP USB Floppy Drive Key has been used in an environment without \
current (up-to-date) anti-virus software then the W32.Fakerecy or W32.SillyFDC virus \
may have spread to any mapped drives on the server. In this case HP recommends that \
the server and mapped drives are scanned with current (up-to-date) anti-virus \
software.
This virus infection would have been immediately detected and cleaned if the optional \
HP USB Floppy Drive Key had been used in an environment with any current (up-to-date) \
anti-virus software
Note: These are standard USB 2.0 Floppy Drive Keys (similar to 'Flash Drives') that \
can be plugged into a USB 2.0 port on any system.
PRODUCT SPECIFIC INFORMATION
None
HISTORY
Version: 1 (rev.1) - 3 April 2008 Initial release
Third Party Security Patches: Third party security patches which are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com It is strongly recommended that security \
related information being communicated to HP be encrypted using PGP, especially \
exploit information. To get the security-alert PGP key, please send an e-mail \
message as follows: To: security-alert@hp.com
Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via \
Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC \
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
- check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
- verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to \
update appropriate sections.
To review previously published Security Bulletins visit: \
http://www.itrc.hp.com/service/cki/secBullArchive.do
* The Software Product Category that this Security Bulletin relates to is represented \
by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain \
system integrity. HP is continually reviewing and enhancing the security features of \
software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention \
of users of the affected HP products the important security information contained in \
this Bulletin. HP recommends that all users determine the applicability of this \
information to their individual situations and take appropriate action. HP does not \
warrant that this information is necessarily accurate or complete for all user \
situations and, consequently, HP will not be responsible for any damages resulting \
from user's use or disregard of the information provided in this Bulletin. To the \
extent permitted by law, HP disclaims all warranties, either express or implied, \
including the warranties of merchantability and fitness for a particular purpose, \
title and non-infringement."
©Copyright 2008 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental, special or consequential \
damages including downtime cost; lost profits; damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
respective owners.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
iQA/AwUBR/U00OAfOvwtKn1ZEQICCwCgyfVDjqFGOnDspa165bqSfbznUcYAoLHH
4mLBscehaYJCR1AyTP+RRbpe
=0hwh
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic