[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    [security bulletin] HPSBUX02725 SSRT100627 rev.1 - HP-UX Apache Running Tomcat Servlet Engine, Remot
From:       security-alert () hp ! com
Date:       2011-11-23 19:07:43
Message-ID: 20111123190743.C03911FF87 () security ! hp ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03090723
Version: 1

HPSBUX02725 SSRT100627 rev.1 - HP-UX Apache Running Tomcat Servlet Engine, Remote \
Information Disclosure, Authentication Bypass, Cross-Site Scripting (XSS), \
Unauthorized Access, Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.

Release Date: 2011-11-21
Last Updated: 2011-11-22

 ------------------------------------------------------------------------------

Potential Security Impact: Remote information disclosure, authentication bypass, \
cross-site scripting (XSS), unauthorized access, Denial of Service (DoS).

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP-UX Apache Running \
Tomcat Servlet Engine. These vulnerabilities could be exploited remotely to disclose \
information, allow authentication bypass, allow cross-site scripting (XSS), gain \
unauthorized access, or create a Denial of Service (DoS). The Tomcat-based Servlet \
Engine is contained in the HP-UX Apache Web Server Suite.

References: CVE-2011-3190, CVE-2011-2729, CVE-2011-2526, CVE-2011-2204, \
CVE-2011-0013, CVE-2010-4476, CVE-2010-3718

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.19 or earlier

BACKGROUND

CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2011-3190    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-2729    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0
CVE-2011-2526    (AV:L/AC:M/Au:N/C:P/I:P/A:P)       4.4
CVE-2011-2204    (AV:L/AC:M/Au:N/C:P/I:N/A:N)       1.9
CVE-2011-0013    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3
CVE-2010-4476    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2010-3718    (AV:L/AC:H/Au:N/C:N/I:P/A:N)       1.2
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following software updates to resolve the vulnerabilities.
The updates are available for download from http://software.hp.com
Note: HP-UX Web Server Suite v3.20 contains HP-UX Tomcat-based Servlet Engine \
v5.5.34.01

Web Server Suite Version
 Apache Depot name

HP-UX Web Server Suite v.3.20
 HP-UX B.11.23 HPUXWS22ATW-B320-64.depot

HP-UX B.11.23 HPUXWS22ATW-B320-32.depot

HP-UX B.11.31 HPUXWS22ATW-B320-64.depot

HP-UX B.11.31 HPUXWS22ATW-B320-32.depot

MANUAL ACTIONS: Yes - Update
Install HP-UX Web Server Suite v3.20 or subsequent.

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that \
replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP \
and lists recommended actions that may apply to a specific HP-UX system. It can also \
download patches and create a depot automatically. For more information see \
https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX Web Server Suite

HP-UX B.11.23
HP-UX B.11.31
==================
hpuxws22TOMCAT.TOMCAT
action: install revision B.5.5.34.01 or subsequent

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 21 November 2011 Initial release

Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, \
contact normal HP Services support channel.  For other issues about the content of \
this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts \
via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin List: A list of HP Security Bulletins, updated periodically, is \
contained in HP Security Notice HPSN-2011-001: \
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430


Security Bulletin Archive: A list of recently released Security Bulletins is \
available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title \
by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2011 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental,special or consequential \
damages including downtime cost; lost profits;damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
                respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk7LLNkACgkQ4B86/C0qfVk/+gCeOHQNV4ukpJDzkJrwUm/kiT/d
AGsAmwTQ4H3PsOZx19ijcb+QRMb1Bt5K
=kfRh
-----END PGP SIGNATURE-----


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic