[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: [security bulletin] HPSBMU02693 SSRT100583 rev.1 - HP Network Automation Running on Linux, Solaris,
From: security-alert () hp ! com
Date: 2011-07-28 16:42:51
Message-ID: 20110728164251.0BBCE2033E () security ! hp ! com
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02942385
Version: 1
HPSBMU02693 SSRT100583 rev.1 - HP Network Automation Running on Linux, Solaris, and \
Windows, Remote SQL Injection, Cross Site Scripting (XSS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.
Release Date: 2011-07-28
Last Updated: 2011-07-28
Potential Security Impact: Remote SQL injection, cross site scripting (XSS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP Network Automation \
running on Linux, Solaris, and Windows. The vulnerabilities could be exploited \
remotely resulting in SQL injection and cross site scripting (XSS).
References: CVE-2011-2402(XSS), CVE-2011-2403 (SQL injection)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Network Automation v7.2x, v7.5x, v7.6x, v9.0, v9.10
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2011-2402 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
CVE-2011-2403 (AV:N/AC:L/Au:S/C:C/I:C/A:C) 9.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided a patch to resolve the vulnerabilities for HP Network Automation \
v9.10. The patch is available here: http://support.openview.hp.com/selfsolve/patches
Upgrade to HP Network Automation v9.10
Apply patch 1 or subsequent (Title: Network Automation 09.10.01, Document ID: \
KM1207081)
HISTORY
Version:1 (rev.1) - 28 July 2011 Initial Release
Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts \
via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Software Product Category: The Software Product Category is represented in the title \
by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2011 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental,special or consequential \
damages including downtime cost; lost profits;damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk4xdeMACgkQ4B86/C0qfVntSwCdF4drR9sS5wJ4+kFmIYfnv4NJ
7QcAn13pc8sXX/aSZf4FHCfx+7aFUpQw
=v+ei
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic