[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    [security bulletin] HPSBUX02741 SSRT100728 rev.1 - HP-UX Apache Running Tomcat Servlet Engine, Remot
From:       security-alert () hp ! com
Date:       2012-02-07 21:33:27
Message-ID: 20120207213327.DD2AB1FD56 () security ! hp ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03183543
Version: 1

HPSBUX02741 SSRT100728 rev.1 - HP-UX Apache Running Tomcat Servlet Engine, Remote \
Denial of Service (DoS), Access Restriction Bypass

NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.

Release Date: 2012-02-06
Last Updated: 2012-02-06

 ------------------------------------------------------------------------------

Potential Security Impact: Remote Denial of Service (DoS), access restriction bypass

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP-UX Apache Running \
Tomcat Servlet Engine. These vulnerabilities could be exploited remotely to create a \
Denial of Service (DoS) or to perform an access restriction bypass. The Tomcat-based \
Servlet Engine is contained in the HP-UX Apache Web Server Suite.

References: CVE-2006-7243, CVE-2011-4858, CVE-2011-4885, CVE-2012-0022

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.21 or earlier

BACKGROUND

CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2006-7243    (AV:N/AC:L/Au:N/C:N/I:P/A:N)       5.0
CVE-2011-4858    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4885    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-0022    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following software updates to resolve the vulnerability.
The updates are available for download from
ftp://srt10728:Secure12@ftp.usa.hp.com

Note: HP-UX Web Server Suite v3.22 contains HP-UX Tomcat-based Servlet Engine \
v5.5.35.01

Web Server Suite Version
 Apache Depot Name

HP-UX Web Server Suite v.3.22
HP-UX B.11.23 HPUXWS22ATW-B322-64.depot

HP-UX B.11.23 HPUXWS22ATW-B322-32.depot

HP-UX B.11.31 HPUXWS22ATW-B322-64.depot

HP-UX B.11.31 HPUXWS22ATW-B322-32.depot

MANUAL ACTIONS: Yes - Update
Install HP-UX Web Server Suite v3.22 or subsequent.

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that \
replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP \
and lists recommended actions that may apply to a specific HP-UX system. It can also \
download patches and create a depot automatically. For more information see \
https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX Web Server Suite

HP-UX B.11.23
HP-UX B.11.31
==================
hpuxws22TOMCAT.TOMCAT
action: install revision B.5.5.35.01 or subsequent

hpuxws22APCH32.APACHE
hpuxws22APCH32.APACHE2
hpuxws22APCH32.AUTH_LDAP
hpuxws22APCH32.AUTH_LDAP2
hpuxws22APCH32.MOD_JK
hpuxws22APCH32.MOD_JK2
hpuxws22APCH32.MOD_PERL
hpuxws22APCH32.MOD_PERL2
hpuxws22APCH32.PHP
hpuxws22APCH32.PHP2
hpuxws22APCH32.WEBPROXY
action: install revision B.2.2.15.11 or subsequent

END AFFECTED VERSION

HISTORY
Version:1 (rev.1) - 06 February 2012 Initial release

Third Party Security Patches: Third party security patches that are to be installed \
on systems running HP software products should be applied in accordance with the \
customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, \
contact normal HP Services support channel.  For other issues about the content of \
this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, \
send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts \
via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin List: A list of HP Security Bulletins, updated periodically, is \
contained in HP Security Notice HPSN-2011-001: \
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430


Security Bulletin Archive: A list of recently released Security Bulletins is \
available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title \
by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2012 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental,special or consequential \
damages including downtime cost; lost profits;damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein \
are trademarks of Hewlett-Packard Company in the United States and other countries. \
Other product and company names mentioned herein may be trademarks of their \
                respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk8wTt0ACgkQ4B86/C0qfVno3QCfZcYhXRNaSBkjdb3mNEN6X4YS
mN8An2X+ZiallrAV3NcTWqbB9oP7t3j3
=AZ4n
-----END PGP SIGNATURE-----


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic