[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    [security bulletin] HPSBMA02674 SSRT100487 rev.1 - HP Service Manager and HP Service Center, Unautho
From:       security-alert () hp ! com
Date:       2011-06-08 16:48:36
Message-ID: 20110608164836.245CA20340 () security ! hp ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02863015
Version: 1

HPSBMA02674 SSRT100487 rev.1 - HP Service Manager and HP Service Center, Unauthorized \
Remote Access, Unsecured Local Access, Remote Disclosure of Privileged Information, \
HTTP Session Credential Re-use, Cross Site Scripting (XSS) and Remote Script Inject

NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.

Release Date: 2011-06-07
Last Updated: 2011-06-07

Potential Security Impact: Unauthorized remote access, unsecured local access, remote \
disclosure of privileged information, HTTP session credential re-use, cross site \
scripting (XSS) and remote script injection

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HP Service Manager and HP \
Service Center which may allow remote authenticated users unauthorized access, \
unsecured local access, remote disclosure of privileged information, HTTP session \
credential re-use, cross site scripting (XSS) and remote script injection.

References: Reference
 Description

CVE-2011-1857
 Unauthorized Remote Access

CVE-2011-1858
 Unsecured Local Access

CVE-2011-1859
 Remote Disclosure of Privileged Information

CVE-2011-1860
 HTTP Session Credential Re-use

CVE-2011-1861
 Unauthorized Remote Access

CVE-2011-1862
 Cross Site Scripting (XSS)

CVE-2011-1863
 Remote Script Injection

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Service Manager v9.21, v9.20, v7.11, v7.02 running on AIX, HP-UX, Linux, Solaris \
and Windows HP Service Manager client v9.21, v9.20, v7.11, v7.02 running on Windows
HP Service Center v6.2.8 Client running on Windows
HP Service Center v6.2.8 running on AIX, HP-UX, Linux, Solaris and Windows

BACKGROUND

CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2011-1857    (AV:N/AC:M/Au:S/C:P/I:C/A:C)       8.2
CVE-2011-1858    (AV:L/AC:L/Au:S/C:N/I:N/A:N)       3.1
CVE-2011-1859    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0
CVE-2011-1860    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0
CVE-2011-1861    (AV:N/AC:M/Au:N/C:C/I:P/A:N)       7.8
CVE-2011-1862    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
CVE-2011-1863    (AV:N/AC:M/Au:S/C:C/I:P/A:P)       7.5
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002

RESOLUTION

The vulnerability can be resolved by updating affected versions of the HP Service \
Manager and HP Service Center with the following patches or the subsequent version of \
the patch. Customers can download the patches from HP SSO at \
http://support.openview.hp.com/selfsolve/patches .

Notes:

Each table below lists the security vulnerabilities which impact the product version \
and the minimum patch or patches needed to resolve the issue.

To locate the patch document on HP SSO, use a URL in this form: \
http://support.openview.hp.com/selfsolve/document/ Document ID . Please substitute \
the appropriate document id. For example, to go to the page for document id \
KM1061984, use this URL: http://support.openview.hp.com/selfsolve/document/KM1061984

SM v9.21 Vulnerability reference
 SM v9.21 patch document title
 Document ID

CVE-2011-1858
 SM9.21p1 Web Tier
 KM1061984

CVE-2011-1859
 SM9.21p1 Web Tier
 KM1061984

CVE-2011-1861
 SM9.21p1 Web Tier
 KM1061984

SM v9.21 client Vulnerability reference
 SM v9.21 client patch document title
 Document ID

CVE-2011-1858
 SM9.21p1 Windows Client
 KM1061983

SM v9.20 Vulnerability reference
 SM v9.20 patch document title
 Document ID

CVE-2011-1857
 SM9.20p1HF1 Web Tier
 KM1099883

CVE-2011-1858
 Upgrade to SM v9.21

CVE-2011-1859
 SM9.20p1HF1 Web Tier
 KM1099883

CVE-2011-1860
 SM9.20p1HF1 Web Tier
 KM1099883

CVE-2011-1861
 Upgrade to SM v9.21

CVE-2011-1862
 SM9.20p1HF1 Web Tier
 KM1099883

CVE-2011-1863
 SM9.20p1HF1 Web Tier
 KM1099883

SM v9.20 client Vulnerability reference
 SM v9.20 client resolution

CVE-2011-1858
 Upgrade to SM v9.21

SM v7.11 Vulnerability reference
 SM v7.11 patch document title document title
 Document ID

CVE-2011-1857
 SM7.11p15 Web Tier
 KM1030364

CVE-2011-1858
 SM7.11p15 Web Tier
 KM1030364

CVE-2011-1860
 SM7.11p15 Web Tier
 KM1030364

CVE-2011-1861
 SM7.11p15HF1 Web Tier
 Request HP support channel for this hotfix

CVE-2011-1862
 SM7.11p15 Web Tier
 KM1030364

CVE-2011-1863
 SM7.11p15 Web Tier
 KM1030364

SM v7.11 client Vulnerability reference
 SM v7.11 client patch document title
 Document ID

CVE-2011-1858
 SM7.11p15 Windows Client
 KM1030362

SM v7.02 Vulnerability reference
 SM v7.02 patch document title
 Document ID

CVE-2011-1857
 SM7.02p15 Web Tier
 KM973524 (included in next patch)

CVE-2011-1858
 SM7.02p16 Web Tier
 KM1099883

CVE-2011-1860
 SM7.02p16 Web Tier
 KM1099883

CVE-2011-1861
 SM7.02p16 Web Tier
 KM1099883

SM v7.02 client Vulnerability reference
 SM v7.02 client patch document title
 Document ID

CVE-2011-1858
 SM7.02p16 Windows Client
 KM1083673

CVE-2011-1862
 SM7.02p16 Windows Client
 KM1083673

SC v6.2.8 Vulnerability reference
 SC v6.2.8 patch document title
 Document ID

CVE-2011-1857
 SC6.2.8.7 Web Tier
 KM1111638

CVE-2011-1858
 SC6.2.8.7 Web Tier
 KM1111638

CVE-2011-1861
 SC6.2.8.7 Web Tier
 KM1111638

CVE-2011-1862
 SC6.2.8.7 Web Tier
 KM1111638

SC v6.2.8 client Vulnerability reference
 SC v6.2.8 client patch document title
 Document ID

CVE-2011-1858
 SC6.2.8.7 Windows Client
 KM1113091

CVE-2011-1862
 SC6.2.8.7 Windows Client
 KM1113091

HISTORY
Version:1 (rev.1) - 07 June 2011 Initial Release

Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com It is strongly recommended that security related \
information being communicated to HP be encrypted using PGP, especially exploit \
information. To get the security-alert PGP key, please send an e-mail message as \
follows:  To: security-alert@hp.com
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via \
Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
 On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
    -check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
    -verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to \
update appropriate sections.

To review previously published Security Bulletins visit: \
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to maintain \
system integrity. HP is continually reviewing and enhancing the security features of \
software products to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the attention \
of users of the affected HP products the important security information contained in \
this Bulletin. HP recommends that all users determine the applicability of this \
information to their individual situations and take appropriate action. HP does not \
warrant that this information is necessarily accurate or complete for all user \
situations and, consequently, HP will not be responsible for any damages resulting \
from user's use or disregard of the information provided in this Bulletin. To the \
extent permitted by law, HP disclaims all warranties, either express or implied, \
including the warranties of merchantability and fitness for a particular purpose, \
title and non-infringement."

Copyright 2011 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental,special or consequential \
damages including downtime cost; lost profits;damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
                respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk3ubnkACgkQ4B86/C0qfVkhjACfftORt2vsYRsfZsVU1LHaAGYk
zNcAn1ALDaiIJ+UWOLr7g/o0fQVERc7/
=3T+T
-----END PGP SIGNATURE-----


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic