|
_____________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ _____________________________________________________ INFORMATION BULLETIN New and Revised HP Bulletins January 20, 1995 1300 PST Number F-07a _____________________________________________________________________________ PROBLEM: Security vulnerabilities in HP-UX Support Watch and CORE-DIAG fileset. PLATFORM: HP 9000 series 700 and 800, for versions see below. DAMAGE: Users can increase access privileges. SOLUTION: Apply appropriate security patches. _____________________________________________________________________________ VULNERABILITY These vulnerabilities are widely known and used to compromise ASSESSMENT: systems. CIAC urges affected sites to install the appropriate patches immediately. ______________________________________________________________________________ Critical Information about the New and Revised HP Bulletins CIAC has obtained information from Hewlett Packard regarding a new security vulnerability and a revision to an existing security patch. This bulletin contains information which updates CIAC Bulletin F-02 (Summary of HP Bulletins). The patches are presented first in a table format, then a summary of the vulnerability information is presented for each patch. CIAC has also created a document, available on our FTP server ciac.llnl.gov as /pub/ciac/bulletin/f-fy95/hppatchs.txt. This document contains the entire list of all HP Bulletins and patches, and is an update to CIAC Bulletin F-02. HP has set up an automatic server to allow patches and other security information to be retrieved over the Internet. To utilize this server, send a message to support@support.mayfield.hp.com. The subject line of the message will be ignored. The body (text) of the message should contain the words send XXXX where XXXX is the identifier for the information you want retrieved. For example, to retrieve the patch PHSS_4834, the message would be "send PHSS_4834". Other information that can be retrieved include the HP SupportLine mail service user's guide (send guide.txt), the readme file for a patch (send doc PHSS_4834), and the original HP bulletin (send doc HPSBUX9410-018). HP also has a World Wide Web server to browse and retrieve bulletins and patches. To utilize this server, use a WWW client and connect to http://support.mayfield.hp.com. IMPORTANT NOTE: Hewlett Packard updates patches periodically. These updates are not reflected in the text of each HP bulletin. The overview presented here contains current information on the patches available at the time of the release of this CIAC bulletin. If you request an updated patch, when you try to retrieve the patch you will receive a message stating that the patch is obsolete and the name of the patch which supersedes it. Hewlett Packard has made sum and MD5 checksums available for their patches and for their security bulletins. See the detailed explanation for HPSBUX9408-016 in CIAC bulletin F-02 for information on how to access and utilize these checksums. _____________________________________________________________________________ CIAC wishes to thank Hewlett Packard for the information contained in this bulletin. _____________________________________________________________________________ CIAC is the computer security incident response team for the U.S. Department of Energy. Services are available free of charge to DOE and DOE contractors. ------------------- A - T - T - E - N - T - I - O - N --------------------- For emergencies and off-hour assistance, DOE and DOE contractor sites can contact CIAC 24-hours a day via an integrated voicemail and SKYPAGE number. To use this service, dial 1-510-422-8193 or 1-800-759-7243 (SKYPAGE). The primary SKYPAGE PIN number, 8550070 is for the CIAC duty person. A second PIN, 8550074 is for the CIAC Project Leader. CIAC's FAX number is 510-423-8002, and the STU-III number is 510-423-2604. Send E-mail to ciac@llnl.gov. --------------------------------------------------------------------------- Previous CIAC Bulletins and other information are available via anonymous FTP from ciac.llnl.gov (IP address 128.115.19.53). CIAC has several self-subscribing mailing lists for electronic publications: 1. CIAC-BULLETIN for Advisories, highest priority - time critical information, and Bulletins, important computer security information; 2. CIAC-NOTES for Notes, a collection of computer security articles; 3. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI) software updates, new features, distribution and availability; 4. SPI-NOTES, for discussion of problems and solutions regarding the use of SPI products. CIAC's mailing lists are managed by a public domain software package called ListProcessor, which ignores E-mail header subject lines. To subscribe (add yourself) to one of our mailing lists, send the following request as the E-mail message body, substituting CIAC-BULLETIN, CIAC-NOTES, SPI-ANNOUNCE or SPI-NOTES for "list-name" and valid information for "LastName" "FirstName" and "PhoneNumber" when sending E-mail to ciac-listproc@llnl.gov: subscribe list-name LastName, FirstName PhoneNumber e.g., subscribe ciac-notes O'Hara, Scarlett 404-555-1212 x36 You will receive an acknowledgment containing address, initial PIN, and information on how to change either of them, cancel your subscription, or get help. _____________________________________________________________________________ PLEASE NOTE: Many users outside of the DOE and ESnet computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained by sending E-mail to first-request@first.org with an empty subject line and a message body containing the line: send first-contacts. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government nor the University of California, and shall not be used for advertising or product endorsement purposes. Appendix 1: Table of HP Security Bulletins * HP Progs Patches to Overview of Bulletin Affected Platform Install Vulnerability 9411-019 Support HP 9000 700,800 PHSS_4874 Users can Watch HP-UX 8.0, 8.02, potentially 8.06, and 9.0 only increase access privileges. 9409-017 System HP 9000 700,800 Install Users can Message HP-UX 8.x, 9.x appropriate increase their catalog patch(es) privileges (fileset dependent upon CORE-DIAG) configuration * All HP-UX bulletins have the prefix HPSBUX, for example bulletin 9311-019 would be requested from HP as HPSBUX9311-019. Appendix II: Details of each HP Bulletin After every patch is installed, be sure to examine /tmp/update.log for any relevant WARNINGs or ERRORs. This can be done by typing "tail -60 /tmp/update.log | more", then paging through the next three screens via the space bar, looking for WARNING or ERROR messages. ================================================== HPSBUX9411-019: Support Watch, dated November 30, 1994 This vulnerability, which can allow users to increase their access privileges, exists ONLY in HP 9000 series 800 running HP-UX revisions 8.0, 8.02, 8.06 and 9.0. Later HP-UX releases including 9.04 are NOT affected by this vulnerability. Obtain patch PHSS_4874, install it per the installation instructions included with the patch. ================================================== HPSBUX9409-017: CORE-DIAG vulnerability, dated September 21, 1994 (Revised October 18, 1994, then revised December 1, 1994) This vulnerability can allow a user to increase their access privileges. The vulnerability exists for all HP-UX systems using the CORE-DIAG fileset. No patches will be available for versions of HP_UX prior to version 8.0. The patch to install depends on which operating system version and series you are currently using. To determine the operating system version of your system, display the file /system/UX-CORE/index with the "more" or "pg" command. The line will look similar to: fv: A.BX.YY.ZZ Where X is the major revision, YY is the minor revision, and ZZ is the PCO index. For example, if your system needed to install an item on the chart below, (HP-UX 9.00.4A) the major revision would be "9", the minor revision would be "00" and the PCO index would be "4A". Note that these patches are quite large. Use the following chart to determine which patch to retrieve and install in /tmp: Operating System Series Apply patch HP-UX 8.0, 8.06 800 PHSS_4578 HP-UX 8.02 800 PHSS_4577 HP-UX 8.05, 8.07 700 PHSS_4574 HP-UX 9.00.2O or 9.00.3A 800 PHSS_4532 HP-UX 9.00.4A 800 PHSS_4660 HP-UX 9.01 700 PHSS_4475 HP-UX 9.03, 9.05 700 PHSS_4863 HP-UX 9.04 800 PHSS_4913 Obtain necessary patches, install per the installation instructions included with the patches. ____________________________________________________________________________