[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    [security bulletin] HPSBMA02374 SSRT080046 rev.1 - HP OpenView Network Node Manager (OV NNM), Remote
From:       security-alert () hp ! com
Date:       2008-10-09 12:25:01
Message-ID: 20081009122501.985A3B8FB () hpchs ! cup ! hp ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c01567813
Version: 1

HPSBMA02374 SSRT080046 rev.1 - HP OpenView Network Node Manager (OV NNM), Remote \
Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.

Release Date: 2008-10-08
Last Updated: 2008-10-08

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP OpenView Network Node \
Manager (OV NNM). The vulnerability could be exploited remotely to create a Denial of \
Service (DoS).

References: CVE-2008-3545

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP OpenView Network Node Manager (OV NNM) v7.01, v7.51, v7.53 running on HP-UX, \
Linux, Solaris, and Windows

BACKGROUND

CVSS 2.0 Base Metrics 
===============================================
Reference                         Base Vector               Base Score 
CVE-2008-3545     (AV:N/AC:L/Au:N/C:N/I:N/A:C)      7.8
===============================================
Information on CVSS is documented in HP Customer Notice: HPSN-2008-002.


RESOLUTION
HP has made patches available to resolve the vulnerabilities for NNM v7.53.

HP has made a new version of the ovtopmd program available to resolve the \
vulnerabilities for NNM v7.01 and NNM v7.51. The new ovtopmd is available as a file \
to be installed manually. The files are listed in the table below. Instructions for \
installing the files are contained in the readme_for_ovtopmd.txt file.

For NNM v7.01 and NNM v7.51 patches must be installed before the ovtopmd file is \
installed.

The ovtopmd files and the readme_for_ovtopmd.txt file are available from \
ftp://ss080046:ss080046@hprc.external.hp.com/ 

The patches are available from http://itrc.hp.com 

Instructions for installing the files are contained in the readme_for_ovtopmd.txt \
file. 

Instruction File - readme_for_ovtopmd.txt
MD5 Sum - 1f169a097b6f267887ce6ba9c0cfbdb4
 


OV NNM v7.53
=========== 
Operating_System - HP-UX (IA)
Resolved in Patch - PHSS_38489 or subsequent
 
Operating_System - HP-UX (PA)
Resolved in Patch - PHSS_38488 or subsequent
 
Operating_System - Linux RedHatAS2.1 
Resolved in Patch - LXOV_00087 or subsequent
 
Operating_System - Linux RedHat4AS-x86_64 
Resolved in Patch - LXOV_00088 or subsequent
 
Operating_System - Solaris
Resolved in Patch - PSOV_03515 or subsequent
 
Operating_System - Windows
Resolved in Patch - NNM_01193 or subsequent
 


OV NNM v7.51 
===========
Operating_System - HP-UX (IA)
Required_Patch - PHSS_37274 or subsequent
File - 751_HP-UX_IA_ovtopmd
File MD5 Sum - 200c2ca31a690f521403fc8847eb1965
 
Operating_System - HP-UX (PA)
Required_Patch - PHSS_37273 or subsequent
File - 751_HP-UX_PA_ovtopmd
File MD5 Sum - 2a02d4c59f5026733053aa12b10ea106
 
Operating_System - Linux RedHatAS2.1 
Required_Patch - LXOV_00060 or subsequent
File - 751_Linux_ovtopmd
File MD5 Sum - ad787912a550e897aea8d20d1bff2ac9
 
Operating_System - Solaris
Required_Patch - PSOV_03490 or subsequent
File - 751_Solaris_ovtopmd
File MD5 Sum - ea3db1b518484a8640e040c92e58d0de
 
Operating_System - Windows
Required_Patch - NNM_01168 or subsequent
File - 751_Windows_ovtopmd.exe
File MD5 Sum - a4e22089c4d4011ecb9061f3eacc71f2
 


OV NNM v7.01
=========== 
Operating_System -HP-UX (PA)
Required_Patch - PHSS_36773 or subsequent
File - 701_HP-UX_ovtopmd
File MD5 Sum - 24804bf910f174f9d51cc31809fadfd8
 
Operating_System -Solaris
Required_Patch - PSOV_03480 or subsequent
File - 701_Solaris_ovtopmd
File MD5 Sum - 813c48629c06a496ab75e39406941bd7
 
Operating_System -Windows
Required_Patch - NNM_01159 or subsequent
File - 701_Windows_ovtopmd.exe
File MD5 Sum - cc277d71479a1cf3e83731130248593a
 


MANUAL ACTIONS: Yes - NonUpdate 
Apply the appropriate file as described in the Resolution. 

PRODUCT SPECIFIC INFORMATION 

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that \
replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP \
and lists recommended actions that may apply to a specific HP-UX system. It can also \
download patches and create a depot automatically. For more information see \
https://www.hp.com/go/swa 

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS (for HP-UX)

For HP-UX OV NNM 7.53 
HP-UX B.11.31 
HP-UX B.11.23 (IA) 
============= 
OVNNMgr.OVNNM-RUN 
action: install PHSS_38489 or subsequent 
URL: http://itrc.hp.com 

HP-UX B.11.23 (PA) 
HP-UX B.11.11 
HP-UX B.11.00 
============= 
OVNNMgr.OVNNM-RUN 
action: install PHSS_38488 or subsequent 
URL: http://itrc.hp.com 

For HP-UX OV NNM 7.51 
HP-UX B.11.31 
HP-UX B.11.23 (IA) 
============= 
OVNNMgr.OVNNM-RUN 
action: install PHSS_37274 or subsequent, then apply 751_HP-UX_IA_ovtopmd 
URL: ftp://ss080046:ss080046@hprc.external.hp.com/ 

HP-UX B.11.23 (PA) 
HP-UX B.11.11 
HP-UX B.11.00 
============= 
OVNNMgr.OVNNM-RUN 
action: install PHSS_37273 or subsequent, then apply 751_HP-UX_PA_ovtopmd 
URL: ftp://ss080046:ss080046@hprc.external.hp.com/ 

For HP-UX OV NNM 7.01 
HP-UX B.11.00 
HP-UX B.11.11 
============= 
OVNNMgr.OVNNM-RUN 
action: install PHSS_36773 or subsequent, then apply 701_HP-UX_ovtopmd 
URL: ftp://ss080046:ss080046@hprc.external.hp.com/ 

END AFFECTED VERSIONS (for HP-UX)

HISTORY 
Version:1 (rev.1) - 8 October 2008 Initial release 

Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy. 

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com  It is strongly recommended that security \
related information being communicated to HP be encrypted using PGP, especially \
exploit information.  To get the security-alert PGP key, please send an e-mail \
message as follows:  To: security-alert@hp.com 
  Subject: get key

Subscribe: To initiate a subscription to receive future HP Security Bulletins via \
Email:  http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC \
 On the web page: ITRC security bulletins and patch sign-up 
Under Step1: your ITRC security bulletins and patches 
  - check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems 
  - verify your operating system selections are checked and save.


To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php 
Log in on the web page: Subscriber's choice for Business: sign-in. 
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to \
update appropriate sections.


To review previously published Security Bulletins visit: \
http://www.itrc.hp.com/service/cki/secBullArchive.do 


* The Software Product Category that this Security Bulletin relates to is represented \
by the 5th and 6th characters of the Bulletin number in the title: 

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault
 
System management and security procedures must be reviewed frequently to maintain \
system integrity. HP is continually reviewing and enhancing the security features of \
software products to provide customers with current secure solutions.


"HP is broadly distributing this Security Bulletin in order to bring to the attention \
of users of the affected HP products the important security information contained in \
this Bulletin. HP recommends that all users determine the applicability of this \
information to their individual situations and take appropriate action. HP does not \
warrant that this information is necessarily accurate or complete for all user \
situations and, consequently, HP will not be responsible for any damages resulting \
from user's use or disregard of the information provided in this Bulletin. To the \
extent permitted by law, HP disclaims all warranties, either express or implied, \
including the warranties of merchantability and fitness for a particular purpose, \
title and non-infringement."

©Copyright 2008 Hewlett-Packard Development Company, L.P. 

Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental, special or consequential \
damages including downtime cost; lost profits; damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
                respective owners.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBSOz03+AfOvwtKn1ZEQKj1wCgyqh8JZvMnkUSeWrz3JQr2d/R3A4AoJQA
obTPlGi26AhyC7V0lDxWr36O
=9ZqX
-----END PGP SIGNATURE-----


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic