[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    [security bulletin] HPSBUX02700 SSRT100506 rev.1 - HP-UX running VEA, Remote Denial of Service (DoS)
From:       security-alert () hp ! com
Date:       2011-08-31 21:33:38
Message-ID: 20110831213338.9B465200A9 () security ! hp ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02962262
Version: 1

HPSBUX02700 SSRT100506 rev.1 - HP-UX running VEA, Remote Denial of Service (DoS), \
Execution of Arbitrary Code

NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.

Release Date: 2011-08-24
Last Updated: 2011-08-24

 -----------------------------------------------------------------------------

Potential Security Impact: Remote Denial of Service (DoS), execution of arbitrary \
code.

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HP-UX running the Veritas \
Enterprise Administrator (VEA), which comes bundled with VxVM. The vulnerabilities \
could be exploited remotely to create a Denial of Service (DoS) or execute arbitrary \
code.

References: CVE-2011-0546, ZDI-CAN-1110, ZDI-CAN-1111

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.11, HP-UX B.11.23, and HP-UX B.11.31

BACKGROUND

CVSS 2.0 Base Metrics
==========================================================
  Reference              Base Vector            Base Score
CVE-2011-0546    (AV:N/ACL/Au:N/C:C/I:C/A:C)        10
==========================================================
            Information on CVSS is documented
           in HP Customer Notice: HPSN-2008-002

The Hewlett-Packard Company thanks Luigi Auriemma for working with TippingPoint.s \
Zero Day Initiative for reporting these vulnerabilities to security-alert@hp.com.

RESOLUTION

HP has made the following patches available to resolve this issue.
The patches are available from http://www.hp.com/go/HPSC

OS Release
 VxFS version / Package
 Patch ID

HP-UX B.11.11 / 3.5 / (VRTSob) / PHCO_42175 or subsequent

HP-UX B.11.23 / 4.1 / (VRTSob) / PHCO_42173 or subsequent

HP-UX B.11.23 / 5.0 / (VRTSob) / PHCO_42180 or subsequent

HP-UX B.11.23 / 5.0 / (VRTSobc) / PHCO_42181 or subsequent

HP-UX B.11.31 / 5.0 / (VRTSob) / PHCO_42176 or subsequent

HP-UX B.11.31 / 5.0 / (VRTSobc) / PHCO_42177 or subsequent

HP-UX B.11.31 / 5.0.1 / (VRTSob) / PHCO_42178 or subsequent

HP-UX B.11.31 / 5.0.1 / (VRTSobc) / PHCO_42179 or subsequent

HP-UX B.11.31 / 5.1 SP1 / (VRTSob) / PHCO_42182 or subsequent

HP-UX B.11.23 / 3.5 / (VRTSob) / PHCO_42317 or subsequent

HP-UX B.11.31 / 4.1 / (VRTSob) / PHCO_42316 or subsequent

MANUAL ACTIONS: No

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that \
replaces HP-UX Security Patch Check.

It analyzes all Security Bulletins issued by HP and lists recommended actions that \
may apply to a specific HP-UX

system. It can also download patches and create a depot automatically. For more \
information see:

https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.11
=============
VRTSob.VEAS-FILESET
action: install patch PHCO_42175 or subsequent

HP-UX B.11.23
=============
VRTSob.VEAS-FILESET
action: install patch PHCO_42173 or subsequent
VRTSob.VEAS-FILESET
action: install patch PHCO_42180 or subsequent
VRTSobc33.VRTSOBC33
action: install patch PHCO_42181 or subsequent
VRTSob.VEAS-FILESET
action: install patch PHCO_42317 or subsequent

HP-UX B.11.31
=============
VRTSob.VEAS-FILESET
action: install patch PHCO_42176 or subsequent
VRTSobc33.VRTSOBC33
action: install patch PHCO_42177 or subsequent
VRTSob.VEAS-FILESET
action: install patch PHCO_42178 or subsequent
VRTSobc33.VRTSOBC33
action: install patch PHCO_42179 or subsequent
VRTSob.VEAS-FILESET
action: install patch PHCO_42182 or subsequent
VRTSob.VEAS-FILESET
action: install patch PHCO_42316 or subsequent
END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 24 August 2011 Initial release

Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts \
via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin List: A list of HP Security Bulletins, updated periodically, is \
contained in HP Security Notice HPSN-2011-001: \
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430


3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2011 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental,special or consequential \
damages including downtime cost; lost profits;damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
                respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk5VVpkACgkQ4B86/C0qfVlm0gCg9bqLUJt45nkk6p4m64sWbPxQ
khUAnjQT9FxbGpxcbu7ClQAvuDW96CMF
=cJDo
-----END PGP SIGNATURE-----


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic