[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    [security bulletin] HPSBMA02361 SSRT080119 rev.1 - HP OpenView Select Identity Connectors running on
From:       security-alert () hp ! com
Date:       2008-09-05 12:26:14
Message-ID: 20080905122615.1D7EE94BD () hpchs ! cup ! hp ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c01531379
Version: 1

HPSBMA02361 SSRT080119 rev.1 - HP OpenView Select Identity Connectors running on \
Windows, Local Information Disclosure

NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.

Release Date: 2008-09-04
Last Updated: 2008-09-04

Potential Security Impact: Local information disclosure

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP OpenView Select \
Identity (HPSI) Connectors running on Windows. The vulnerability could result in a \
local disclosure of information. 

References: CVE-2008-3539 

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPSI Active Directory Connector v 1.70.003 and earlier 
HPSI Active Directory Connector v 2.10.002 and earlier 
HPSI Active Directory Connector v 2.20.xxx and v2.30.xxx and earlier 
HPSI SunOne Connector v 1.14 and earlier 
HPSI eDirectory Connector v 1.12 and earlier 
HPSI eTrust Connector v 1.02 and earlier 
HPSI OID Connector v 1.02 and earlier 
HPSI IBM Tivoli Dir Connector v 1.02 and earlier 
HPSI TOPSecret Connector v 2.22.001 and earlier 
HPSI RACF Connector v 1.12.001 and earlier 
HPSI ACF2 Connector v 1.02 and earlier 
HPSI OpenLDAP Connector v 1.02 and earlier 
HPSI BiDir DirX Connector v 1.00.003 and earlier 

BACKGROUND

CVSS 2.0 Base Metrics 
===============================================
Reference                         Base Vector               Base Score 
CVE-2008-3539     (AV:L/AC:L/Au:S/C:N/I:N/A:N)      3.1
===============================================
Information on CVSS is documented in HP Customer Notice: HPSN-2008-002.

RESOLUTION

HP has provided the following software patch kits to resolve the vulnerability. 

The patch kits can be downloaded from \
http://support.openview.hp.com/selfsolve/patches by searching for 'select identity \
connectors' or the Patch Document ID. 

HP OpenView Select Identity Connector - BiDir ActiveDir Connector
Affected Software Version - v 1.70.003 and earlier 
Patch Software Version - v 2.30 p2
Patch Document ID - BILDAPADCONN_00009
 
HP OpenView Select Identity Connector - BiDir ActiveDir Connector
Affected Software Version - v 2.10.002 and earlier 
Patch Software Version - v 2.10 p3
Patch Document ID - BILDAPADCONN_00008
 
HP OpenView Select Identity Connector - BiDir ActiveDir Connector
Affected Software Version - v 2.20.xxx and v2.30.xxx and earlier 
Patch Software Version - v 1.70 p4
Patch Document ID - BILDAPADCONN_00010
 
HP OpenView Select Identity Connector - SunONE Connector
Affected Software Version - v 1.14 and earlier 
Patch Software Version - v 1.14.001 
Patch Document ID - SUNONECONN_00003
 
HP OpenView Select Identity Connector - Novell eDir Connector
Affected Software Version - v 1.12 and earlier 
Patch Software Version - v 1.12.001
Patch Document ID - BILDAPEDIRECTORYCONN_00001
 
HP OpenView Select Identity Connector - CA eTrust Connector
Affected Software Version - v 1.02 and earlier 
Patch Software Version - v 1.02.001
Patch Document ID - BILDAPETRUSTCONN_00001
 
HP OpenView Select Identity Connector - OID BiLDAP Connector
Affected Software Version - v 1.02 and earlier 
Patch Software Version - v 1.02.001v
Patch Document ID - BILDAPOIDCONN_00001
 
HP OpenView Select Identity Connector - IBM Tivoli Dir Connector
Affected Software Version - v 1.02 and earlier 
Patch Software Version - v 1.02.001 
Patch Document ID - BILDAPIBMDIRCONN_00001
 
HP OpenView Select Identity Connector - TopSecret Connector
Affected Software Version - v 2.22.001 and earlier 
Patch Software Version - v 2.22.002
Patch Document ID - TOPSECRETCONN_00002
 
HP OpenView Select Identity Connector - RACF Connector
Affected Software Version - v 1.12.001 and earlier 
Patch Software Version - v 1.12.002
Patch Document ID - RACFCONN_00002
 
HP OpenView Select Identity Connector - ACF2 Connector
Affected Software Version - v 1.02 and earlier 
Patch Software Version - v 1.02.001
Patch Document ID - ACF2CONN_00001
 
HP OpenView Select Identity Connector - OpenLDAP Connector
Affected Software Version - v 1.02 and earlier 
Patch Software Version - v 1.02.001
Patch Document ID - OPENLDAPCONN_00001
 
HP OpenView Select Identity Connector - BiDir DirX Connector
Affected Software Version - v 1.00.003 and earlier 
Patch Software Version - v 1.00.004
Patch Document ID - BILDAPDIRXCONN_00002
 


PRODUCT SPECIFIC INFORMATION 
None

HISTORY 
Version:1 (rev.1) - 4 September 2008 Initial release 

Third Party Security Patches: Third party security patches which are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy. 

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com  It is strongly recommended that security \
related information being communicated to HP be encrypted using PGP, especially \
exploit information.  To get the security-alert PGP key, please send an e-mail \
message as follows:  To: security-alert@hp.com 
  Subject: get key

Subscribe: To initiate a subscription to receive future HP Security Bulletins via \
Email:  http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC \
 On the web page: ITRC security bulletins and patch sign-up 
Under Step1: your ITRC security bulletins and patches 
  - check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems 
  - verify your operating system selections are checked and save.


To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php 
Log in on the web page: Subscriber's choice for Business: sign-in. 
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to \
update appropriate sections.


To review previously published Security Bulletins visit: \
http://www.itrc.hp.com/service/cki/secBullArchive.do 


* The Software Product Category that this Security Bulletin relates to is represented \
by the 5th and 6th characters of the Bulletin number in the title: 

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault
 
System management and security procedures must be reviewed frequently to maintain \
system integrity. HP is continually reviewing and enhancing the security features of \
software products to provide customers with current secure solutions.


"HP is broadly distributing this Security Bulletin in order to bring to the attention \
of users of the affected HP products the important security information contained in \
this Bulletin. HP recommends that all users determine the applicability of this \
information to their individual situations and take appropriate action. HP does not \
warrant that this information is necessarily accurate or complete for all user \
situations and, consequently, HP will not be responsible for any damages resulting \
from user's use or disregard of the information provided in this Bulletin. To the \
extent permitted by law, HP disclaims all warranties, either express or implied, \
including the warranties of merchantability and fitness for a particular purpose, \
title and non-infringement."

©Copyright 2008 Hewlett-Packard Development Company, L.P. 

Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental, special or consequential \
damages including downtime cost; lost profits; damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
                respective owners.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBSMEgm+AfOvwtKn1ZEQJ34ACfcwUaXS5kzGvZHeBMuTi2VkeQSoAAoNjJ
ikCnnhMM6tX5vgnGk69wOUAW
=L7zf
-----END PGP SIGNATURE-----


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic