[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: [security bulletin] HPSBMU02703 SSRT100242 rev.1 - HP Network Node Manager i (NNMi) for HP-UX, Linux
From: security-alert () hp ! com
Date: 2011-09-13 17:15:14
Message-ID: 20110913171514.B063E2033E () security ! hp ! com
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03005726
Version: 1
HPSBMU02703 SSRT100242 rev.1 - HP Network Node Manager i (NNMi) for HP-UX, Linux, \
Solaris, and Windows, Remote Denial of Service (DoS), Unauthorized Disclosure of \
Information, Unauthorized Modification
NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.
Release Date: 2011-09-12
Last Updated: 2011-09-12
Potential Security Impact: Remote Denial of Service (DoS), unauthorized disclosure of \
information, unauthorized modification
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP Network Node Manager \
i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be \
remotely exploited resulting in Denial of Service (DoS), unauthorized disclosure of \
information, and unauthorized modification.
References: CVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, \
CVE-2009-3872, CVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, \
CVE-2009-3877
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Network Node Manager i (NNMi) v8.1x and v9.0x for HP-UX, Linux, Solaris, and \
Windows
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2009-3867 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3
CVE-2009-3868 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3
CVE-2009-3869 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3
CVE-2009-3871 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3
CVE-2009-3872 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3
CVE-2009-3873 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3
CVE-2009-3874 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3
CVE-2009-3875 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0
CVE-2009-3876 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2009-3877 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made a hotfixes available to resolve these vulnerabilities for NNMi v9.0x and \
NNMi v8.1x. The hotfixes can be obtained by contacting the normal HP Services support \
channel.
For NNMi 9.0x
Operating System
Hotfix Identifier
HP-UX
QCCR1B90090
Linux
QCCR1B90091
Solaris
QCCR1B90092
Windows
QCCR1B90093
NNMi v9.0x Required Patches
Note: Before installing the hotfix on NNMi v9.0x insure that the following patches \
have been installed.
Operating System
Patch
HP-UX
PHSS_41982
Linux
NNM900L_00004
Solaris
NNM900S_00004
Windows
NNM900W_00004
For NNMi 8.1x
NNMi Version
Hotfix Identifier
NNMi v8.1x
QCCR1B45223
NNMi v8.1x Required Patches
Note: Before installing the hotfix on NNMi v8.1x insure that the following patches \
have been installed.
Operating System
Patch
HP-UX
PHSS_41147
Linux
NNM810L_00009
Solaris
NNM810S_00009
Windows
NNM810W_00009
MANUAL ACTIONS: Yes - NonUpdate
Install appropriate hotfix after installing the required patch.
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that \
replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP \
and lists recommended actions that may apply to a specific HP-UX system. It can also \
download patches and create a depot automatically. For more information see: \
https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS (for HP-UX)
For HP-UX NNMi v9.0x
HP-UX B.11.31
HP-UX B.11.23 (IA)
=============
HPOvNNM.HPNMSJBOSS
action: install the QCCR1B90090 hotfix after installing the required patch
For HP-UX NNMi v8.1x
HP-UX B.11.31
HP-UX B.11.23 (IA)
=============
HPOvNNM.HPNMSJBOSS
action: install the QCCR1B45223 hotfix after installing the required patch
END AFFECTED VERSIONS (for HP-UX)
HISTORY
Version:1 (rev.1) - 12 September 2011 Initial release
Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts \
via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is \
contained in HP Security Notice HPSN-2011-001: \
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2011 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental,special or consequential \
damages including downtime cost; lost profits;damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk5uIHYACgkQ4B86/C0qfVlPDgCdFeqfoaamrARzUiqlpSuWFvK8
FLgAnRIzmRNNn78sy7TyYJHPjgPHObei
=y8+8
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic