[security bulletin] HPSBUX02508 SSRT100007 rev.2 - HP-UX Running
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02009860
Version: 2
HPSBUX02508 SSRT100007 rev.2 - HP-UX Running sendmail with STARTTLS Enabled=
, Remote Unauthorized Access
NOTICE: The information in this Security Bulletin should be acted upon as s=
oon as possible.
Release Date: 2010-04-20
Last Updated: 2010-04-20
Potential Security Impact: Remote unauthorized access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP-UX running s=
endmail and STARTTLS enabled. This vulnerability could allow a user to gain=
remote unauthorized access.
References: CVE-2009-4565
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.11, B.11.23 and B.11.31 running sendmail 8.13.3 with STARTTLS en=
abled.
BACKGROUND
CVSS 2.0 Base Metrics
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D
Reference Base Vector Base Score
CVE-2009-4565 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following upgrades to resolve the vulnerability.
The updates are available from http://software.hp.com.
HP-UX Release / Sendmail version / Action
B.11.11 / 8.13.3 / Upgrade to B.11.11.02.008 or subsequent
B.11.23 / 8.13.3 / Upgrade to B.11.23.1.007 or subsequent
B.11.31 / 8.13.3 / Upgrade to C.8.13.3.5 or subsequent
Note: Installations of HP-UX B.11.11 running sendmail 8.11.1 should upgrade=
to sendmail 8.13.3 or subsequent. This Sendmail 8.13.3 Special Release Upg=
rade is available for download from http://software.hp.com
Go to >> Internet ready and networking >> Sendmail 8.13.3 Special Release U=
pgrade
Note: To identify a system in a vulnerable configuration:
1. Log on to the HP-UX system
2. Run .telnet localhost 25.
3. Enter .ehlo xyz.
4. Search the output for .250-STARTTLS.
5. If .250-STARTTLS. is found, the system is in a vulnerable configuration
It is recommended that the update be applied even if the system is not curr=
ently in a vulnerable configuration. Applying the update will eliminate the=
possibility of introducing the vulnerability by a configuration change.
MANUAL ACTIONS: Yes - Update
B.11.11 - install SMAIL B.11.11.02.008 or subsequent
B.11.23 - install SMAIL B.11.23.1.007 or subsequent
B.11.31 - install SENDMAIL C.8.13.3.5 or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced applicati=
on that replaces HP-UX Security Patch Check. It analyzes all Security Bulle=
tins issued by HP and lists recommended actions that may apply to a specifi=
c HP-UX system. It can also download patches and create a depot automatical=
ly. For more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.11
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
SMAIL-UPGRADE.INETSVCS-SMAIL
action: install B.11.11.02.008 or subsequent
HP-UX B.11.23
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
SMAIL-UPGRADE.INET-SMAIL
SMAIL-UPGRADE.INET2-SMAIL
action: install B.11.23.1.007 or subsequent
HP-UX B.11.31
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Sendmail.SENDMAIL-AUX
Sendmail.SENDMAIL-RUN
action: install C.8.13.3.5 or subsequent
END AFFECTED VERSIONS
HISTORY
Version: 1 (rev.1) - 24 March 2010 Initial release
Version: 2 (rev.2) - 20 April 2010 Updated revisions for download and downl=
oad location.
Third Party Security Patches: Third party security patches that are to be i=
nstalled on systems running HP software products should be applied in accor=
dance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channe=
l.
Report: To report a potential security vulnerability with any HP supported =
product, send Email to: security-alert@hp.com
It is strongly recommended that security related information being communic=
ated to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows=
:
To: security-alert@hp.com
Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulleti=
ns via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=3DNA&langcode=
=3DUSENG&jumpid=3Din_SC-GEN__driverITRC&topiccode=3DITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
-check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
-verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profi=
le to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp=
..com/service/cki/secBullArchive.do
* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:
GN =3D HP General SW
MA =3D HP Management Agents
MI =3D Misc. 3rd Party SW
MP =3D HP MPE/iX
NS =3D HP NonStop Servers
OV =3D HP OpenVMS
PI =3D HP Printing & Imaging
ST =3D HP Storage SW
TL =3D HP Trusted Linux
TU =3D HP Tru64 UNIX
UX =3D HP-UX
VV =3D HP VirtualVault
System management and security procedures must be reviewed frequently to ma=
intain system integrity. HP is continually reviewing and enhancing the secu=
rity features of software products to provide customers with current secure=
solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the=
attention of users of the affected HP products the important security info=
rmation contained in this Bulletin. HP recommends that all users determine =
the applicability of this information to their individual situations and ta=
ke appropriate action. HP does not warrant that this information is necessa=
rily accurate or complete for all user situations and, consequently, HP wil=
l not be responsible for any damages resulting from user's use or disregard=
of the information provided in this Bulletin. To the extent permitted by l=
aw, HP disclaims all warranties, either express or implied, including the w=
arranties of merchantability and fitness for a particular purpose, title an=
d non-infringement."
Copyright 2009 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial erro=
rs or omissions contained herein. The information provided is provided "as =
is" without warranty of any kind. To the extent permitted by law, neither H=
P or its affiliates, subcontractors or suppliers will be liable for inciden=
tal,special or consequential damages including downtime cost; lost profits;=
damages relating to the procurement of substitute products or services; or =
damages for loss of data, or software restoration. The information in this =
document is subject to change without notice. Hewlett-Packard Company and t=
he names of Hewlett-Packard products referenced herein are trademarks of He=
wlett-Packard Company in the United States and other countries. Other produ=
ct and company names mentioned herein may be trademarks of their respective=
owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkvONX0ACgkQ4B86/C0qfVnPrACfW+SrdtpqWypGS5qZBfusIu4M
/GcAoJC7dkpGvbBvbOviNP01LTjT2gVC
=3DStCm
-----END PGP SIGNATURE-----
討論串 (同標題文章)
完整討論串 (本文為第 2 之 2 篇):