[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: [security bulletin] HPSBUX02700 SSRT100506 rev.1 - HP-UX running VEA, Remote Denial of Service (DoS)
From: security-alert () hp ! com
Date: 2011-08-31 21:33:38
Message-ID: 20110831213338.9B465200A9 () security ! hp ! com
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02962262
Version: 1
HPSBUX02700 SSRT100506 rev.1 - HP-UX running VEA, Remote Denial of Service (DoS), \
Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.
Release Date: 2011-08-24
Last Updated: 2011-08-24
-----------------------------------------------------------------------------
Potential Security Impact: Remote Denial of Service (DoS), execution of arbitrary \
code.
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HP-UX running the Veritas \
Enterprise Administrator (VEA), which comes bundled with VxVM. The vulnerabilities \
could be exploited remotely to create a Denial of Service (DoS) or execute arbitrary \
code.
References: CVE-2011-0546, ZDI-CAN-1110, ZDI-CAN-1111
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.11, HP-UX B.11.23, and HP-UX B.11.31
BACKGROUND
CVSS 2.0 Base Metrics
==========================================================
Reference Base Vector Base Score
CVE-2011-0546 (AV:N/ACL/Au:N/C:C/I:C/A:C) 10
==========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Luigi Auriemma for working with TippingPoint.s \
Zero Day Initiative for reporting these vulnerabilities to security-alert@hp.com.
RESOLUTION
HP has made the following patches available to resolve this issue.
The patches are available from http://www.hp.com/go/HPSC
OS Release
VxFS version / Package
Patch ID
HP-UX B.11.11 / 3.5 / (VRTSob) / PHCO_42175 or subsequent
HP-UX B.11.23 / 4.1 / (VRTSob) / PHCO_42173 or subsequent
HP-UX B.11.23 / 5.0 / (VRTSob) / PHCO_42180 or subsequent
HP-UX B.11.23 / 5.0 / (VRTSobc) / PHCO_42181 or subsequent
HP-UX B.11.31 / 5.0 / (VRTSob) / PHCO_42176 or subsequent
HP-UX B.11.31 / 5.0 / (VRTSobc) / PHCO_42177 or subsequent
HP-UX B.11.31 / 5.0.1 / (VRTSob) / PHCO_42178 or subsequent
HP-UX B.11.31 / 5.0.1 / (VRTSobc) / PHCO_42179 or subsequent
HP-UX B.11.31 / 5.1 SP1 / (VRTSob) / PHCO_42182 or subsequent
HP-UX B.11.23 / 3.5 / (VRTSob) / PHCO_42317 or subsequent
HP-UX B.11.31 / 4.1 / (VRTSob) / PHCO_42316 or subsequent
MANUAL ACTIONS: No
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that \
replaces HP-UX Security Patch Check.
It analyzes all Security Bulletins issued by HP and lists recommended actions that \
may apply to a specific HP-UX
system. It can also download patches and create a depot automatically. For more \
information see:
https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.11
=============
VRTSob.VEAS-FILESET
action: install patch PHCO_42175 or subsequent
HP-UX B.11.23
=============
VRTSob.VEAS-FILESET
action: install patch PHCO_42173 or subsequent
VRTSob.VEAS-FILESET
action: install patch PHCO_42180 or subsequent
VRTSobc33.VRTSOBC33
action: install patch PHCO_42181 or subsequent
VRTSob.VEAS-FILESET
action: install patch PHCO_42317 or subsequent
HP-UX B.11.31
=============
VRTSob.VEAS-FILESET
action: install patch PHCO_42176 or subsequent
VRTSobc33.VRTSOBC33
action: install patch PHCO_42177 or subsequent
VRTSob.VEAS-FILESET
action: install patch PHCO_42178 or subsequent
VRTSobc33.VRTSOBC33
action: install patch PHCO_42179 or subsequent
VRTSob.VEAS-FILESET
action: install patch PHCO_42182 or subsequent
VRTSob.VEAS-FILESET
action: install patch PHCO_42316 or subsequent
END AFFECTED VERSIONS
HISTORY
Version:1 (rev.1) - 24 August 2011 Initial release
Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts \
via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is \
contained in HP Security Notice HPSN-2011-001: \
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2011 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental,special or consequential \
damages including downtime cost; lost profits;damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk5VVpkACgkQ4B86/C0qfVlm0gCg9bqLUJt45nkk6p4m64sWbPxQ
khUAnjQT9FxbGpxcbu7ClQAvuDW96CMF
=cJDo
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic