[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: [security bulletin] HPSB3C02687 SSRT100377 rev.1 - HP Intelligent Management Center User Access Mana
From: security-alert () hp ! com
Date: 2011-07-01 15:17:55
Message-ID: 20110701151755.B9DE61FC4D () security ! hp ! com
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02901775
Version: 1
HPSB3C02687 SSRT100377 rev.1 - HP Intelligent Management Center User Access Manager \
(UAM) and Endpoint Admission Defense (EAD), Remote Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.
Release Date: 2011-06-30
Last Updated: 2011-06-30
Potential Security Impact: Remote execution of arbitrary code
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP Intelligent Management \
Center User Access Manager (UAM) and Endpoint Admission Defense (EAD). The \
vulnerability could be exploited to allow remote execution of arbitrary code.
References:
CVE-2011-1867 (ZDI-CAN-1082)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Intelligent Management Center User Access Manager (UAM) 5.0 (E0101) or earlier.
HP Intelligent Management Center Endpoint Admission Defense (EAD) 5.0 (E0101) or \
earlier.
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2011-1867 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Luigi Auriemma and TippingPoint \
(zdi-disclosures@tippingpoint.com) for reporting these vulnerabilities to \
security-alert@hp.com
RESOLUTION
HP has made an update available to resolve the vulnerabilities. The update can be \
downloaded from the following locations:
Product
Version
Location
HP Intelligent Management Center User Access Manager (UAM)
IMC_UAM_5.0_SP1_E0101P03
https://h10145.www1.hp.com/downloads/SoftwareReleases.aspx?ProductNumber=JF388A
HP Intelligent Management Center Endpoint Admission Defense (EAD)
IMC_EAD_5.0_SP1_E0101P03
https://h10145.www1.hp.com/downloads/SoftwareReleases.aspx?ProductNumber=JF391A
HISTORY
Version:1 (rev.1) - 30 June 2011 Initial release
Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com It is strongly recommended that security related \
information being communicated to HP be encrypted using PGP, especially exploit \
information. To get the security-alert PGP key, please send an e-mail message as \
follows: To: security-alert@hp.com
Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts \
via Email: https://h41183.www4.hp.com/signup_alerts.php?lang=en&cc=US&prodSeriesId=&jumpid=hpsc_secbulletins
* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
System management and security procedures must be reviewed frequently to maintain \
system integrity. HP is continually reviewing and enhancing the security features of \
software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention \
of users of the affected HP products the important security information contained in \
this Bulletin. HP recommends that all users determine the applicability of this \
information to their individual situations and take appropriate action. HP does not \
warrant that this information is necessarily accurate or complete for all user \
situations and, consequently, HP will not be responsible for any damages resulting \
from user's use or disregard of the information provided in this Bulletin. To the \
extent permitted by law, HP disclaims all warranties, either express or implied, \
including the warranties of merchantability and fitness for a particular purpose, \
title and non-infringement."
Copyright 2011 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental,special or consequential \
damages including downtime cost; lost profits;damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk4M5i8ACgkQ4B86/C0qfVkuNgCeNHWy0AVgrfZhU0ffXar9MDAK
9v0AnR4rjXlAVdBnJD4Zib/amdHZcHLA
=iG/0
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic