TUCoPS :: HP/UX :: ciacf018.txt

HP MPE IX

            _____________________________________________________
                       The U.S. Department of Energy
                    Computer Incident Advisory Capability
                           ___  __ __    _     ___
                          /       |     /_\   /
                          \___  __|__  /   \  \___
            _____________________________________________________

                             INFORMATION BULLETIN

		            MPE/iX Vulnerabilities


March 24, 1995 1500 PST                                        Number F-18
_____________________________________________________________________________

PROBLEM:	Three security vulnerabilities exist in the MPE/iX operating
                system.
PLATFORMS:      HP3000 Series 900 systems running any release of MPE through
                and including the Limited Release of MPE/iX 5.0 (X.50.20).
DAMAGE:		Users can gain additional privileges and/or special
                capabilities.
SOLUTION:       Update all systems to the General Release of MPE/iX 5.0, or
                Apply patch MPEHX26A (MPE/iX Release 4.0  B.40.00), or
                patch MPEHX26B (Limited Release MPE/iX 5.0  X.50.20).
FIX:            The problem is fixed in the General Release of MPE/iX 5.0
                (C.50.00).
AVAILABILITY:   The 5.0 General Release and all patches are available now.
_____________________________________________________________________________

VULNERABILITY	The security vulnerabilities in the MPE/iX operating system
ASSESSMENT:	can be used by local users to gain unauthorized access
		privileges which may result in system compromise.  CIAC urges
		affected sites to install the appropriate patch as soon as
		possible.
_____________________________________________________________________________
 
       CRITICAL Information about MPE/iX Vulnerabilities

CIAC has obtained information from Hewlett Packard regarding new security
vulnerabilities in the MPE/iX operaing system which will allow local users
to gain unauthorized access privileges.  Specific patch details are provided
below.

Following are the copies of the HP bulletins (HPSBMP9503-00x):

[Begin HP Bulletin]
-------------------------------------------------------------------------------
Summary of 'Daily Security Bulletins Digest' documents
-------------------------------------------------------------------------------
Document Id    Description						Page 1
-------------------------------------------------------------------------------
HPSBMP9503-003 Security Vulnerability (HPSBMP9503-003) in MPE/iX releases
HPSBMP9503-002 Security Vulnerability (HPSBMP9503-002) in MPE/iX releases
HPSBMP9503-001 Security Vulnerability (HPSBMP9503-001) in MPE/iX releases


===============================================================================
Detailed list of 'Daily Security Bulletins Digest' documents
===============================================================================
Document Id: [HPSBMP9503-003]
Date Loaded: [03-20-95]

Description: Security Vulnerability (HPSBMP9503-003) in MPE/iX releases
===============================================================================

-------------------------------------------------------------------------
      HEWLETT-PACKARD SECURITY BULLETIN: (MPE/iX) #00003, 20 March 95
-------------------------------------------------------------------------

    The information in the following Security Bulletin should be acted
    upon as soon as possible. Hewlett-Packard will not be liable for
    any consequences to any customer resulting from customer's failure
    to fully implement instructions in this Security Bulletin as soon
    as possible.

_______________________________________________________________________
PROBLEM:  Security vulnerability in the MPE/iX operating system
PLATFORM: HP3000 Series 900 systems running any release of MPE through and
          including the Limited Release of MPE/iX 5.0 (X.50.20)
DAMAGE:   Users can gain additional privileges and/or special capabilities
SOLUTION: Update all systems to the General Release of MPE/iX 5.0, or
          Apply patch MPEHX26A (MPE/iX Release 4.0  B.40.00), or
                patch MPEHX26B (Limited Release MPE/iX 5.0  X.50.20)
FIX:      The problem is fixed in the General Release of MPE/iX 5.0 (C.50.00)
AVAILABILITY: The 5.0 General Release and all patches are available now.
_______________________________________________________________________


   A. Nature of the problem

      It has been found that HP 3000 systems running MPE/iX Release 4.0
      (B.40.00), Release 4.5 (C.45.00), and the Limited Release of
      MPE/iX 5.0 (X.50.20) have a vulnerability that can be exploited by
      users to gain additional privileges and/or capabilities, but only if
      the users are already logged on to the system.  This problem does not
      permit a user to gain additional privileges by accident.  However, a
      user can exploit this vulnerability to gain System Manager (SM)
      capability.

   B. Fixing the problem

      Hewlett-Packard recommends that you update your HP 3000 Series 900
      computer systems to the General Release of MPE/iX 5.0 (C.50.00), as
      this problem is fixed in that release.  Updating to the 5.0 General
      Release is the easiest and safest way to get the fix for this security
      problem.  Customers with HP System Support contracts should have
      already received their shipments of the General Release of MPE/iX 5.0
      (C.50.00).

      However, if you feel that you cannot update to the 5.0 General
      Release at this time, the proper corrective measure depends on which
      release of MPE/iX your HP 3000 system is running.

      The vulnerability can be eliminated from Release 4.0 and the Limited
      Release of MPE/iX 5.0 by applying a patch, MPEHX26A or MPEHX26B.
      Release 4.5 (C.45.00) MUST be updated to the General Release of
      MPE/iX 5.0 (C.50.00), as no patch will be created for Release 4.5.

      No patches will be available for versions of MPE/iX prior to
      Release 4.0.  Instead, you must update to a supported release.  HP
      recommends that you update such systems to the General Release of
      MPE/iX 5.0.  If you update to one of the other supported releases,
      you will have to follow the patch instructions described in the next
      section of this bulletin.

   C. How to Install the Patch (for MPE/iX 4.0 & Limited Release MPE/iX 5.0)

   1. Determine which patch is appropriate for your operating system release:

              MPEHX26A for Series 900, MPE/iX 4.0 (B.40.00)
              MPEHX26B for Series 900, Limited Release MPE/iX 5.0 (X.50.20)

   2. Obtaining the patch.

       If you have an HP System Support contract, you should be receiving a
       security notification packet that includes a FAX-back form for
       ordering the patches that fix the problems described in the following
       three Security Bulletins -- HPSBMP9503-001, HPSBMP9503-002, and
       HPSBMP9503-003.

       If you do not have an HP System Support contract, you can obtain the
       same patches by ordering MPE/iX SECURITY PATCH, Product Number B5116AA.
       This product is available at no charge.  When ordering the product,
       you need to know which MPE/iX release you are patching and on what
       media you want the patch delivered.  The following chart shows the
       two product options:

                  Option Table for Product Number B5116AA

                           1600BPI   6250BPI
                             Tape      Tape      DDS
                         |---------|---------|---------|
                B.40.00  | 240,AA1 | 240,AA2 | 240,AAH |
                         |---------|---------|---------|
                X.50.20  | 250,AA1 | 250,AA2 | 250,AAH |
                         |---------|---------|---------|

       Phone numbers to HP Direct and other HP Country Sales offices have
       been included at the end of this bulletin for your convenience.

   3.  Apply the patch to your MPE/iX system.

       Installation instructions are included with the MPE/iX SECURITY PATCH
       product.


    D. Impact of the patch and workaround

       Application of the patch will eliminate the vulnerability.


    E. Obtaining General Security Information
       To subscribe to automatically receive future NEW HP Security
       Bulletins from the HP SupportLine mail service via electronic
       mail, send an email message to:

        support@support.mayfield.hp.com   (no Subject is required)

       Multiple instructions are allowed in the TEXT PORTION OF THE
       MESSAGE, here are some basic instructions you may want to use:

       To add your name to the subscription list for new Security
       Bulletins, send the following in the TEXT PORTION OF THE MESSAGE:

                  subscribe security_info

       To retrieve the index of all HP Security Bulletins issued to date,
       send the following in the TEXT PORTION OF THE MESSAGE:

                  send security_info_list

       World Wide Web service for browsing of bulletins is available via
       the HPSL URL:
                  http://support.mayfield.hp.com

       Choose "Support news", then under Support news,
       choose "Security Bulletins"

    F. To report new security vulnerabilities, send email to

          security-alert@hp.com



===============================================================================
Document Id: [HPSBMP9503-002]
Date Loaded: [03-20-95]

Description: Security Vulnerability (HPSBMP9503-002) in MPE/iX releases
===============================================================================

-------------------------------------------------------------------------
      HEWLETT-PACKARD SECURITY BULLETIN: (MPE/iX) #00002, 20 March 95
-------------------------------------------------------------------------

    The information in the following Security Bulletin should be acted
    upon as soon as possible. Hewlett-Packard will not be liable for
    any consequences to any customer resulting from customer's failure
    to fully implement instructions in this Security Bulletin as soon
    as possible.

_______________________________________________________________________
PROBLEM:  Security vulnerability in the MPE/iX operating system
PLATFORM: HP3000 Series 900 systems running the Limited Release of MPE/iX 5.0
DAMAGE:   Users can gain access to a higher TurboImage privilege
SOLUTION: Update all systems to the General Release of MPE/iX 5.0, or
          Apply patch MPEHX25A (Limited Release MPE/iX 5.0  X.50.20).
FIX:      The problem is fixed in the General Release of MPE/iX 5.0 (C.50.00)
AVAILABILITY: The 5.0 General Release and all patches are available now.
_______________________________________________________________________


   A. Nature of the problem

      It has been found that HP 3000 systems running the Limited Release of
      MPE/iX 5.0 (X.50.20) have a vulnerability that can be exploited by
      logged on users to gain a higher TurboImage privilege.  This problem
      does not permit a user to gain additional privileges by accident.

   B. Fixing the problem

      Hewlett-Packard recommends that you update your HP 3000 Series 900
      computer systems to the General Release of MPE/iX 5.0 (C.50.00), as
      this problem is fixed in that release.  Updating to the 5.0 General
      Release is the easiest and safest way to get the fix for this security
      problem.  Customers with HP System Support contracts should have
      already received their shipments of the General Release of MPE/iX 5.0
      (C.50.00).

      However, if you feel that you cannot update to the 5.0 General
      Release at this time, the vulnerability can be eliminated from the
      Limited Release of MPE/iX 5.0 by applying a patch, MPEHX25A.

   C. How to Install the Patch (for the Limited Release MPE/iX 5.0)

   1. Determine which patch is appropriate for your operating system release:

              MPEHX25A for Series 900, Limited Release MPE/iX 5.0 (X.50.20)

   2. Obtaining the patch.

      If you have an HP System Support contract, you should be receiving a
      security notification packet that includes a FAX-back form for
      ordering the patches that fix the problems described in the following
      three Security Bulletins -- HPSBMP9503-001, HPSBMP9503-002, and
      HPSBMP9503-003.

      If you do not have an HP System Support contract, you can obtain the
      same patches by ordering MPE/iX SECURITY PATCH, Product Number B5116AA.
      This product is available at no charge.  When ordering the product,
      you need to know which MPE/iX release you are patching and on what
      media you want the patch delivered.  The following chart shows the
      two product options:

                  Option Table for Product Number B5116AA

                           1600BPI   6250BPI
                             Tape      Tape      DDS
                         |---------|---------|---------|
                B.40.00  | 240,AA1 | 240,AA2 | 240,AAH |
                         |---------|---------|---------|
                X.50.20  | 250,AA1 | 250,AA2 | 250,AAH |
                         |---------|---------|---------|

      Phone numbers to HP Direct and other HP Country Sales offices have
      been included at the end of this bulletin for your convenience.

   3. Apply the patch to your MPE/iX system.

      Installation instructions are included with the MPE/iX SECURITY PATCH
      product.


   D. Impact of the patch and workaround

      Application of the patch will eliminate the vulnerability.


   E. Obtaining General Security Information
      To subscribe to automatically receive future NEW HP Security
      Bulletins from the HP SupportLine mail service via electronic
      mail, send an email message to:

        support@support.mayfield.hp.com   (no Subject is required)

      Multiple instructions are allowed in the TEXT PORTION OF THE
      MESSAGE, here are some basic instructions you may want to use:

      To add your name to the subscription list for new Security
      Bulletins, send the following in the TEXT PORTION OF THE MESSAGE:

                  subscribe security_info

      To retrieve the index of all HP Security Bulletins issued to date,
      send the following in the TEXT PORTION OF THE MESSAGE:

                  send security_info_list

      World Wide Web service for browsing of bulletins is available via
      the HPSL URL:
                http://support.mayfield.hp.com

      Choose "Support news", then under Support news,
      choose "Security Bulletins"

   F. To report new security vulnerabilities, send email to

          security-alert@hp.com


===============================================================================
Document Id: [HPSBMP9503-001]
Date Loaded: [03-20-95]

Description: Security Vulnerability (HPSBMP9503-001) in MPE/iX releases
===============================================================================

-------------------------------------------------------------------------
      HEWLETT-PACKARD SECURITY BULLETIN: (MPE/iX) #00001, 20 March 95
-------------------------------------------------------------------------

    The information in the following Security Bulletin should be acted
    upon as soon as possible. Hewlett-Packard will not be liable for
    any consequences to any customer resulting from customer's failure
    to fully implement instructions in this Security Bulletin as soon
    as possible.

_______________________________________________________________________
PROBLEM:  Security vulnerability in the MPE/iX operating system
PLATFORM: HP3000 Series 900 systems running Release 4.0, Release 4.5, and
          the 5.0 Limited Release of MPE/iX
DAMAGE:   Users can gain additional privileges and/or special capabilities
SOLUTION: Update all systems to the General Release of MPE/iX 5.0, or
          Apply patch MPEHX24A (MPE/iX Release 4.0  B.40.00), or
                patch MPEHX24B (Limited Release MPE/iX 5.0  X.50.20)
FIX:      The problem is fixed in the General Release of MPE/iX 5.0 (C.50.00)
AVAILABILITY: The 5.0 General Release and all patches are available now.
_______________________________________________________________________


   A. Nature of the problem

      It has been found that HP 3000 systems running MPE/iX Release 4.0
      (B.40.00), Release 4.5 (C.45.00), and the Limited Release of
      MPE/iX 5.0 (X.50.20) have a vulnerability that can be exploited by
      users to gain additional privileges and/or capabilities, but only if
      the users are already logged on to the system.  This problem does not
      permit a user to gain additional privileges by accident.  However, a
      user can exploit this vulnerability to gain System Manager (SM)
      capability.

   B. Fixing the problem

      Hewlett-Packard recommends that you update your HP 3000 Series 900
      computer systems to the General Release of MPE/iX 5.0 (C.50.00), as
      this problem is fixed in that release.  Updating to the 5.0 General
      Release is the easiest and safest way to get the fix for this security
      problem.  Customers with HP System Support contracts should have
      already received their shipments of the General Release of MPE/iX 5.0
      (C.50.00).

      However, if you feel that you cannot update to the 5.0 General
      Release at this time, the proper corrective measure depends on which
      release of MPE/iX your HP 3000 system is running.

      The vulnerability can be eliminated from Release 4.0 and the Limited
      Release of MPE/iX 5.0 by applying a patch, MPEHX24A/B.  Release 4.5
      (C.45.00) MUST be updated to the General Release of MPE/iX 5.0
      (C.50.00), as no patch will be created for Release 4.5.

   C. How to Install the Patch (for MPE/iX 4.0 & Limited Release MPE/iX 5.0)

   1. Determine which patch is appropriate for your operating system release:

              MPEHX24A for Series 900, MPE/iX 4.0 (B.40.00)
              MPEHX24B for Series 900, Limited Release MPE/iX 5.0 (X.50.20)

   2. Obtaining the patch.

       If you have an HP System Support contract, you should be receiving a
       security notification packet that includes a FAX-back form for
       ordering the patches that fix the problems described in the following
       three Security Bulletins -- HPSBMP9503-001, HPSBMP9503-002, and
       HPSBMP9503-003.

       If you do not have an HP System Support contract, you can obtain the
       same patches by ordering MPE/iX SECURITY PATCH, Product Number B5116AA.
       This product is available at no charge.  When ordering the product,
       you need to know which MPE/iX release you are patching and on what
       media you want the patch delivered.  The following chart shows the
       two product options:

                  Option Table for Product Number B5116AA

                           1600BPI   6250BPI
                             Tape      Tape      DDS
                         |---------|---------|---------|
                B.40.00  | 240,AA1 | 240,AA2 | 240,AAH |
                         |---------|---------|---------|
                X.50.20  | 250,AA1 | 250,AA2 | 250,AAH |
                         |---------|---------|---------|

       Phone numbers to HP Direct and other HP Country Sales offices have
       been included at the end of this bulletin for your convenience.


   3.  Apply the patch to your MPE/iX system.

       Installation instructions are included with the MPE/iX SECURITY PATCH
       product.

       NOTE: IF YOU DECIDE TO APPLY ONE OF THE TWO PATCHES MENTIONED
       ABOVE RATHER THAN UPDATE YOUR HP 3000 TO THE GENERAL RELEASE OF
       MPE/iX 5.0, YOU MUST RE-APPLY ALL MPE/iX PATCHES PREVIOUSLY INSTALLED
       ON YOUR SYSTEM.

       Patch MPEHX24A/B replaces the Operating System SOM (OS SOM) in
       NL.PUB.SYS.  This process has the effect of removing all previously
       installed MPE/iX patches from the OS SOM.  You can obtain all prior
       General Release patches by ordering the current MPE/iX PowerPatch tape
       (B.40.09) for Release 4.0 or the current MPE/iX PowerPatch tape
       (X.50.24) for the Limited Release of 5.0.  If you have an HP System
       Support contract, call your local Hewlett-Packard support contact.
       Otherwise, call your local HP Sales representative and order Product
       Number 50757A -- PowerPatch Tape.  Be sure to indicate which version
       of the PowerPatch tape you require and the correct media type.
       PowerPatch tapes are available free of charge to customers who have an
       HP System Support contract and at a nominal charge to customers who
       do not.


    D. Impact of the patch and workaround

       Application of the patch will eliminate the vulnerability.  See the
       NOTE above for the patch impact.


    E. Obtaining General Security Information
        To subscribe to automatically receive future NEW HP Security
        Bulletins from the HP SupportLine mail service via electronic
        mail, send an email message to:

        support@support.mayfield.hp.com   (no Subject is required)

        Multiple instructions are allowed in the TEXT PORTION OF THE
        MESSAGE, here are some basic instructions you may want to use:

        To add your name to the subscription list for new Security
        Bulletins, send the following in the TEXT PORTION OF THE MESSAGE:

                  subscribe security_info

        To retrieve the index of all HP Security Bulletins issued to date,
        send the following in the TEXT PORTION OF THE MESSAGE:

                  send security_info_list

        World Wide Web service for browsing of bulletins is available via
        the HPSL URL:
                  http://support.mayfield.hp.com

        Choose "Support news", then under Support news,
        choose "Security Bulletins"

    F. To report new security vulnerabilities, send email to

          security-alert@hp.com

_______________________________________________________________________

          United States                          Canada
          Tel: 800-386-1117                      Tel: 800-387-3154
          Fax: 800-386-1118

          Austria                                Netherlands
          Tel: 43 222/250 00-200                 Tel: 31 20-5476040
          Fax: 43 222/250 00-311                 Fax: 31 20-5477778

          Belgium                                Norway
          Tel: 32 2/778.33.99                    Tel: 47 2 273 5767
          Fax: 32 2/778.33.88                    Fax: 47 2 273 5620

          Czech Republic                         Poland
          Tel: 42/2/4717230                      Tel: 48/22/375085
          Fax: 42/2/4717611                      Fax: 48/22/374783

          Denmark                                Portugal
          Tel: 45 45 99 11 45                    Tel: 351(1)301 7343
          Fax: 45 45 82 11 46                    Fax: 351(1)301 7568

          Finland                                Russia
          Tel: 358 0-8872 2000                   Tel: 7095-923-5001
          Fax: 358 0-8872 2002                   Fax: 7095-230-2611

          France                                 Slovenia
          Tel: 33(1)60 77 30 04                  Tel: 386(61)159-3322
          Fax: 33(1)69 91 86 79                  Fax: 386(61)558-597

          Germany                                Slovak Republic
          Tel: 49 70 31/14-55 40                 Tel: 42/7/765896
          Fax: 49 70 31/14-10 80                 Fax: 42/7/763408

          Greece                                 Spain
          Tel: 30/1/6896411                      Tel: 34(1)631 11 11
          Fax: 30/1/6896512                      Fax: 34(1)631 11 22

          Hungary                                Sweden
          Tel: 36/1/1420986                      Tel: 46 8-750 22 10
          Fax: 36/1/1223692                      Fax: 46 8-793 90 50

          Iceland                                Switzerland (French)
          Tel: 354/1/671000                      Tel: 41(22)780 44 65
          Fax: 354/1/673031                      Fax: 41(22)780 42 20

          Ireland                                Switzerland (German)
          Tel: 353/1/2844633                     Tel: 41 1/735 72 70
          Fax: 353/1/2844622                     Fax: 41 1/735 77 11

          Italy                                  Turkey
          Tel:                                   Tel: 90-1-224 59 25
          Fax: 39 2/75.30.645                    Fax: 90-1-224 59 39

          Mexico                                 UK
          Tel: (+52 5) 326-4684                  Tel: 44-344-369231
                                                 Fax: 44 344-361014

          European Headquarters &                Middle East and
          Multicountry Sales Region              Afrika Operation
          Tel: 41/22/780/8111                    Tel: 41/22/780/4111
          Fax: 41/22/780/8609                    Fax: 41/22/780/4770

          Australia                              Korea
          Tel: (61-2)950-7491                    Tel: (822)769-0612
          Fax: (61-2)878-5596                    Fax: (822)769-0523

          Asia Pacific Headquarters              Malaysia
          Tel: (65) 290-6217                     Tel: (60-3)295-2315
          Fax: (65) 291-9697                     Fax: (60-3)291-5495

          Hong Kong                              Singapore
          Tel: (852)599-7571                     Tel: (65) 290-6005
          Fax: (852)506-9261                     Fax: (65) 296-9023

          Japan                                  Taiwan
          Tel: (81-423)30-7888                   Tel: (886-2)717-9620
          Fax: (81-426)45-4312                   Fax: (886-2)714-8793

          Other Countries
          Call your local HP Country Sales office or distributor
-----------------------------------------------------------------------------
[End HP Bulletin]

CIAC is the computer security incident response team for the U.S.
Department of Energy.  Services are available free of charge to DOE and DOE
contractors.

DOE and DOE contractor sites can contact CIAC at:
    Voice:   510-422-8193
    FAX:     510-423-8002
    STU-III: 510-423-2604
    E-mail:  ciac@llnl.gov

For DOE and DOE contract site emergencies only, call 1-800-SKYPAGE
(1-800-759-7243) and enter PIN number 8550070 (primary) or 8550074
(secondary).

Previous CIAC notices, anti-virus software, and other information are
available via WWW (http://ciac.llnl.gov/) and anonymous FTP from
ciac.llnl.gov (IP address 128.115.19.53).

CIAC has several self-subscribing mailing lists for electronic publications:
1.  CIAC-BULLETIN for Advisories, highest priority - time critical
    information, and Bulletins, important computer security information;
2.  CIAC-NOTES for Notes, a collection of computer security articles;
3.  SPI-ANNOUNCE for official news about Security Profile Inspector (SPI)
    software updates, new features, distribution and availability;
4.  SPI-NOTES, for discussion of problems and solutions regarding the use of
    SPI products.

Our mailing lists are managed by a public domain software package called
ListProcessor, which ignores E-mail header subject lines. To subscribe (add
yourself) to one of our mailing lists, send requests of the following form:

subscribe list-name LastName, FirstName PhoneNumber

as the E-mail message body, substituting CIAC-BULLETIN, CIAC-NOTES,
SPI-ANNOUNCE or SPI-NOTES for "list-name" and valid information for
"LastName" "FirstName" and "PhoneNumber."  Send to: ciac-listproc@llnl.gov
not to: ciac@llnl.gov

e.g.,
subscribe ciac-notes O'Hara, Scarlett 404-555-1212 x36
subscribe ciac-bulletin O'Hara, Scarlett 404-555-1212 x36

You will receive an acknowledgment containing address and initial PIN, and
information on how to change either of them, cancel your subscription, or get
help.
_____________________________________________________________________________


PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins. If you are not part of these communities, please
contact your agency's response team to report incidents. Your agency's team
will coordinate with CIAC. The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization. A list of FIRST member organizations
and their constituencies can be obtained by sending E-mail to
first-request@first.org with an empty subject line and a message body
containing the line: send first-contacts.

This document was prepared as an account of work sponsored by an agency of
the United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for
the accuracy, completeness, or usefulness of any information, product, or
process disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products, process,
or service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring
by the United States Government or the University of California. The views
and opinions of authors expressed herein do not necessarily state or reflect
those of the United States Government nor the University of California, and
shall not be used for advertising or product endorsement purposes.

_____________________________________________________________________________

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH