[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    [security bulletin] HPSBUX02508 SSRT100007 rev.1 - HP-UX Running sendmail with STARTTLS Enabled, Rem
From:       security-alert () hp ! com
Date:       2010-03-25 1:29:56
Message-ID: 20100325012956.730D422427D () security ! hp ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02009860
Version: 1

HPSBUX02508 SSRT100007 rev.1 - HP-UX Running sendmail with STARTTLS Enabled, Remote \
Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.

Release Date: 2010-03-24
Last Updated: 2010-03-24

Potential Security Impact: Remote unauthorized access

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP-UX running sendmail \
and STARTTLS enabled. This vulnerability could allow a user to gain remote \
unauthorized access.

References: CVE-2009-4565

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.11, B.11.23 and B.11.31 running sendmail 8.13.3 with STARTTLS enabled.

BACKGROUND

CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2009-4565    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following upgrades to resolve the vulnerability.
The updates are available are available using ftp.

Location
 User Name / Password

ftp://ftp.usa.hp.com
 sb02508 / Secure12

HP-UX Release / Sendmail version / Action / SHA-1 Signature

B.11.11 / 8.13.3 / Upgrade to B.11.11.02.007.1 or subsequent / \
96DC01ACF66A5E03CC6BD1D65457DC1849F3B1C6

B.11.23 / 8.13.3 / Upgrade to B.11.23.1.006.1 or subsequent /  \
9519112CE694D4114908A546CE36ADA53A5334A3

B.11.31 / 8.13.3 / Upgrade to C.8.13.3.4.1 or subsequent / \
2F46340CDBA7573A4589EDD90F9D83442CD114CE

Note: Installations of HP-UX B.11.11 running sendmail 8.11.1 should upgrade to \
sendmail 8.13.3 or subsequent. This Sendmail 8.13.3 Special Release Upgrade is \
available for download from http://software.hp.com

Note: To identify a system in a vulnerable configuration:
1. Log on to the HP-UX system
2. Run .telnet localhost 25.
3. Enter .ehlo xyz.
4. Search the output for .250-STARTTLS.
5. If .250-STARTTLS. is found, the system is in a vulnerable configuration

It is recommended that the update be applied even if the system is not currently in a \
vulnerable configuration. Applying the update will eliminate the possibility of \
introducing the vulnerability by a configuration change.

MANUAL ACTIONS: Yes - Update
B.11.11 - install SMAIL B.11.23.1.006.1 or subsequent
B.11.23 - install SMAIL B.11.23.1.006.1 or subsequent
B.11.31 - install SENDMAIL C.8.13.3.4.1 or subsequent

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that \
replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP \
and lists recommended actions that may apply to a specific HP-UX system. It can also \
download patches and create a depot automatically. For more information see: \
https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.11
=============
SMAIL-UPGRADE.INETSVCS-SMAIL
action: install B.11.11.02.007.1 or subsequent

HP-UX B.11.23
=============
SMAIL-UPGRADE.INET-SMAIL
SMAIL-UPGRADE.INET2-SMAIL
action: install B.11.23.1.006.1 or subsequent

HP-UX B.11.31
=============
Sendmail.SENDMAIL-AUX
Sendmail.SENDMAIL-RUN
action: install C.8.13.3.4.1 or subsequent

END AFFECTED VERSIONS

HISTORY
Version: 1 (rev.1) - 24 March 2010 Initial release

Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com It is strongly recommended that security related \
information being communicated to HP be encrypted using PGP, especially exploit \
information. To get the security-alert PGP key, please send an e-mail message as \
follows:  To: security-alert@hp.com
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via \
Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
 On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
    -check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
    -verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to \
update appropriate sections.

To review previously published Security Bulletins visit: \
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to maintain \
system integrity. HP is continually reviewing and enhancing the security features of \
software products to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the attention \
of users of the affected HP products the important security information contained in \
this Bulletin. HP recommends that all users determine the applicability of this \
information to their individual situations and take appropriate action. HP does not \
warrant that this information is necessarily accurate or complete for all user \
situations and, consequently, HP will not be responsible for any damages resulting \
from user's use or disregard of the information provided in this Bulletin. To the \
extent permitted by law, HP disclaims all warranties, either express or implied, \
including the warranties of merchantability and fitness for a particular purpose, \
title and non-infringement."

Copyright 2009 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental,special or consequential \
damages including downtime cost; lost profits;damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
                respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkuqu/sACgkQ4B86/C0qfVkj/ACfTaanr3OUFbWdpH6droEU6DOl
zIwAoOrVPYM1+O787cEGUlwEfRU3qzV0
=xslf
-----END PGP SIGNATURE-----


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic