[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: [security bulletin] HPSBMA02425 SSRT080091 rev.1 - HP OpenView Network Node Manager (OV NNM), Remote
From: security-alert () hp ! com
Date: 2009-05-04 17:33:45
Message-ID: 20090504173346.215BBC01C () hpchs ! cup ! hp ! com
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01728300
Version: 1
HPSBMA02425 SSRT080091 rev.1 - HP OpenView Network Node Manager (OV NNM), Remote \
Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.
Release Date: 2009-05-04
Last Updated: 2009-05-04
Potential Security Impact: Remote execution of arbitrary code
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential vulnerability has been identified with HP OpenView Network Node Manager \
(OV NNM). The vulnerability could be exploited remotely to execute arbitrary code.
References: CVE-2009-0720
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP OpenView Network Node Manager (OV NNM) v7.01, v7.51, v7.53 running on HP-UX, \
Linux, Solaris, and Windows
BACKGROUND
CVSS 2.0 Base Metrics
===============================================
Reference Base Vector Base Score
CVE-2009-0720 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4
===============================================
Information on CVSS is documented in HP Customer Notice: HPSN-2008-002.
The Hewlett-Packard Company thanks an anonymous researcher working with the iDefense \
VCP for reporting this vulnerability to security-alert@hp.com.
RESOLUTION
HP has made patches available to resolve the vulnerability for NNM v7.53. HP has made \
archive files available to resolve the vulnerability for NNM v7.01.
The patches are available from http://support.openview.hp.com/selfsolve/patches
Note: The patches are not available from the HP IT Resource Center (ITRC).
The archive files are available from: ftp://ss080125:ss080125@hprc.external.hp.com
To install the archive files for NNM v7.01:
===============================
1. Install the required patch listed below
2. Uncompress the archive (SSRT080125.701_IP12.hotfix.tar.gz)
3. Unpack the archive (SSRT080125.701_IP12.hotfix.tar)
4. ovstop -c
5. Follow the instructions in the README.txt file
6. ovstart -c
OV NNM v7.53
===========
Operating System
Required Patch
HP-UX (IA)
PHSS_39246 or subsequent
HP-UX (PA)
PHSS_39245 or subsequent
Linux RedHatAS2.1
LXOV_00093 or subsequent
Linux RedHat4AS-x86_64
LXOV_00094 or subsequent
Solaris
PSOV_03519 or subsequent
Windows
NNM_01197 or subsequent
OV NNM v7.51
===========
Upgrade to NNM v7.53 and apply the NNM v7.53 resolution listed above. Patch bundles \
for upgrading from NNM v7.51 to NNM v7.53 are available here: \
ftp://nnm_753:update@hprc.external.hp.com/
OV NNM v7.01 with Intermediate Patch 12
===============================
Operating System
Required Patch
Archive File
Archive File MD5 Sum
HP-UX (PA)
PHSS_38761
SSRT080125.701_IP12.hotfix.tar
dbe7aec4e4a800c13eee0a46cd93f516
Solaris
PSOV_03516
SSRT080125.701_IP12.hotfix.tar
dbe7aec4e4a800c13eee0a46cd93f516
Windows
NNM_01194
SSRT080125.701_IP12.hotfix.tar
dbe7aec4e4a800c13eee0a46cd93f516
MANUAL ACTIONS: Yes - NonUpdate
Apply the appropriate archive as described in the Resolution.
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that \
replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP \
and lists recommended actions that may apply to a specific HP-UX system. It can also \
download patches and create a depot automatically. For more information see \
https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS (for HP-UX)
For HP-UX OV NNM 7.51 and 7.53
HP-UX B.11.31
HP-UX B.11.23 (IA)
HP-UX B.11.23 (PA)
HP-UX B.11.11
=============
OVNNMgr.OVNNM-RUN,fr=B.07.50.00
action: install the patches and archive files listed in the Resolution
URL: ftp://ss080125:ss080125@hprc.external.hp.com
For HP-UX OV NNM 7.01
HP-UX B.11.11
=============
OVNNMgr.OVNNM-RUN,fr=B.07.01.00
action: install the patches and archive files listed in the Resolution
URL: ftp://ss080125:ss080125@hprc.external.hp.com
END AFFECTED VERSIONS (for HP-UX)
HISTORY
Version:1 (rev.1) - 4 May 2009 Initial release
Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com It is strongly recommended that security \
related information being communicated to HP be encrypted using PGP, especially \
exploit information. To get the security-alert PGP key, please send an e-mail \
message as follows: To: security-alert@hp.com
Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via \
Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC \
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
- check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
- verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to \
update appropriate sections.
To review previously published Security Bulletins visit: \
http://www.itrc.hp.com/service/cki/secBullArchive.do
* The Software Product Category that this Security Bulletin relates to is represented \
by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain \
system integrity. HP is continually reviewing and enhancing the security features of \
software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention \
of users of the affected HP products the important security information contained in \
this Bulletin. HP recommends that all users determine the applicability of this \
information to their individual situations and take appropriate action. HP does not \
warrant that this information is necessarily accurate or complete for all user \
situations and, consequently, HP will not be responsible for any damages resulting \
from user's use or disregard of the information provided in this Bulletin. To the \
extent permitted by law, HP disclaims all warranties, either express or implied, \
including the warranties of merchantability and fitness for a particular purpose, \
title and non-infringement."
©Copyright 2009 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental, special or consequential \
damages including downtime cost; lost profits; damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
respective owners.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
iQA/AwUBSf7keOAfOvwtKn1ZEQJHnACePzWtiaE6F9MJPN3uPsErUaInka4AoNUY
ihhWBNf1I1sy0wvWcs7t2iz+
=Uk2o
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic