[security bulletin] HPSBUX02508 SSRT100007 rev.2 - HP-UX Running

看板Bugtraq作者時間16年前 (2010/04/27 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/2 (看更多)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c02009860 Version: 2 HPSBUX02508 SSRT100007 rev.2 - HP-UX Running sendmail with STARTTLS Enabled= , Remote Unauthorized Access NOTICE: The information in this Security Bulletin should be acted upon as s= oon as possible. Release Date: 2010-04-20 Last Updated: 2010-04-20 Potential Security Impact: Remote unauthorized access Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running s= endmail and STARTTLS enabled. This vulnerability could allow a user to gain= remote unauthorized access. References: CVE-2009-4565 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23 and B.11.31 running sendmail 8.13.3 with STARTTLS en= abled. BACKGROUND CVSS 2.0 Base Metrics =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D Reference Base Vector Base Score CVE-2009-4565 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following upgrades to resolve the vulnerability. The updates are available from http://software.hp.com. HP-UX Release / Sendmail version / Action B.11.11 / 8.13.3 / Upgrade to B.11.11.02.008 or subsequent B.11.23 / 8.13.3 / Upgrade to B.11.23.1.007 or subsequent B.11.31 / 8.13.3 / Upgrade to C.8.13.3.5 or subsequent Note: Installations of HP-UX B.11.11 running sendmail 8.11.1 should upgrade= to sendmail 8.13.3 or subsequent. This Sendmail 8.13.3 Special Release Upg= rade is available for download from http://software.hp.com Go to >> Internet ready and networking >> Sendmail 8.13.3 Special Release U= pgrade Note: To identify a system in a vulnerable configuration: 1. Log on to the HP-UX system 2. Run .telnet localhost 25. 3. Enter .ehlo xyz. 4. Search the output for .250-STARTTLS. 5. If .250-STARTTLS. is found, the system is in a vulnerable configuration It is recommended that the update be applied even if the system is not curr= ently in a vulnerable configuration. Applying the update will eliminate the= possibility of introducing the vulnerability by a configuration change. MANUAL ACTIONS: Yes - Update B.11.11 - install SMAIL B.11.11.02.008 or subsequent B.11.23 - install SMAIL B.11.23.1.007 or subsequent B.11.31 - install SENDMAIL C.8.13.3.5 or subsequent PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced applicati= on that replaces HP-UX Security Patch Check. It analyzes all Security Bulle= tins issued by HP and lists recommended actions that may apply to a specifi= c HP-UX system. It can also download patches and create a depot automatical= ly. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.11 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D SMAIL-UPGRADE.INETSVCS-SMAIL action: install B.11.11.02.008 or subsequent HP-UX B.11.23 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D SMAIL-UPGRADE.INET-SMAIL SMAIL-UPGRADE.INET2-SMAIL action: install B.11.23.1.007 or subsequent HP-UX B.11.31 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Sendmail.SENDMAIL-AUX Sendmail.SENDMAIL-RUN action: install C.8.13.3.5 or subsequent END AFFECTED VERSIONS HISTORY Version: 1 (rev.1) - 24 March 2010 Initial release Version: 2 (rev.2) - 20 April 2010 Updated revisions for download and downl= oad location. Third Party Security Patches: Third party security patches that are to be i= nstalled on systems running HP software products should be applied in accor= dance with the customer's patch management policy. Support: For further information, contact normal HP Services support channe= l. Report: To report a potential security vulnerability with any HP supported = product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communic= ated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows= : To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulleti= ns via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=3DNA&langcode= =3DUSENG&jumpid=3Din_SC-GEN__driverITRC&topiccode=3DITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profi= le to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp= ..com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN =3D HP General SW MA =3D HP Management Agents MI =3D Misc. 3rd Party SW MP =3D HP MPE/iX NS =3D HP NonStop Servers OV =3D HP OpenVMS PI =3D HP Printing & Imaging ST =3D HP Storage SW TL =3D HP Trusted Linux TU =3D HP Tru64 UNIX UX =3D HP-UX VV =3D HP VirtualVault System management and security procedures must be reviewed frequently to ma= intain system integrity. HP is continually reviewing and enhancing the secu= rity features of software products to provide customers with current secure= solutions. "HP is broadly distributing this Security Bulletin in order to bring to the= attention of users of the affected HP products the important security info= rmation contained in this Bulletin. HP recommends that all users determine = the applicability of this information to their individual situations and ta= ke appropriate action. HP does not warrant that this information is necessa= rily accurate or complete for all user situations and, consequently, HP wil= l not be responsible for any damages resulting from user's use or disregard= of the information provided in this Bulletin. To the extent permitted by l= aw, HP disclaims all warranties, either express or implied, including the w= arranties of merchantability and fitness for a particular purpose, title an= d non-infringement." Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial erro= rs or omissions contained herein. The information provided is provided "as = is" without warranty of any kind. To the extent permitted by law, neither H= P or its affiliates, subcontractors or suppliers will be liable for inciden= tal,special or consequential damages including downtime cost; lost profits;= damages relating to the procurement of substitute products or services; or = damages for loss of data, or software restoration. The information in this = document is subject to change without notice. Hewlett-Packard Company and t= he names of Hewlett-Packard products referenced herein are trademarks of He= wlett-Packard Company in the United States and other countries. Other produ= ct and company names mentioned herein may be trademarks of their respective= owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkvONX0ACgkQ4B86/C0qfVnPrACfW+SrdtpqWypGS5qZBfusIu4M /GcAoJC7dkpGvbBvbOviNP01LTjT2gVC =3DStCm -----END PGP SIGNATURE-----
文章代碼(AID): #1BrTJlHK (Bugtraq)
文章代碼(AID): #1BrTJlHK (Bugtraq)