Xref: utgpu comp.security.announce:200
Path: utgpu!utcsri!rutgers!news.iag.net!news.sgi.com!swrinde!cs.utexas.edu!math.ohio-state.edu!news.cis.ohio-state.edu!nntp.sei.cmu.edu!news.sei.cmu.edu!cert-advisory
From: CERT Bulletin <[log in to unmask]>
Newsgroups: comp.security.announce
Subject: CERT Vendor-Initiated Bulletin VB-96.13 - hp
Date: 13 Aug 1996 19:06:08 GMT
Organization: CERT(sm) Coordination Center - +1 412-268-7090
Lines: 188
Approved: [log in to unmask]
Distribution: world
Message-ID: <[log in to unmask]>
Reply-To: [log in to unmask]
NNTP-Posting-Host: why.cert.org
Keywords: security CERT
Originator: [log in to unmask]
Originator: [log in to unmask]
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Vendor-Initiated Bulletin VB-96.13.hp
August 13, 1996
Topic: Security Vulnerability in elm
Source: Hewlett-Packard Company
Related CERT documents: VB-96.10a.elm
To aid in the wide distribution of essential security information, the CERT
Coordination Center is forwarding the following information from
Hewlett-Packard Company. Hewlett-Packard urges you to act on this information
as soon as possible. Their contact information is included in the forwarded
text below; please contact them if you have any questions or need further
information.
=======================FORWARDED TEXT STARTS HERE============================
===============================================================================
Document Id: [HPSBUX9608-037]
Date Loaded: [08-08-96]
Description: Security Vulnerability in elm
===============================================================================
- -------------------------------------------------------------------------
HEWLETT-PACKARD SECURITY ADVISORY: HPSBUX08-037, 08 August 1996
- -------------------------------------------------------------------------
The information in the following Security Advisory should be acted upon
as soon as possible. Hewlett Packard will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Advisory as soon as possible.
_________________________________________________________________________
PROBLEM: Vulnerabilities in elm executable.
PLATFORM: HP 9000 series 300/400/700/800 systems running any version HP-UX
9.X or 10.X.
DAMAGE: User files can be modified by non-owners. When running a
restricted shell escapes may be possible.
SOLUTION: Apply patch PHCO_7204 (series 300/400,HP-UX 9.X), or
PHNE_7342 (series 700/800, HP-UX 9.X), or
PHNE_7343 (series 700/800, HP-UX 10.X).
AVAILABILITY:
All of the patches are available now.
For BLS system patch availability please contact your support
representative.
_________________________________________________________________________
I. elm
A. Background
Based on information detailed in CERT(sm) Vendor-Initiated Bulletin
VB-95:10 Hewlett-Packard has found problems in the version of elm
shipped with currently supported HP-UX releases.
B. Fixing the problem
Hewlett-Packard has created the above patches using the
information from the vendor. These vulnerabilities can be eliminated
by installing the patches referenced herein.
C. Impact of the patch
The patches provide a new version of the necessary executables
to fix the vulnerability. Installation instructions are contained
within the patches.
D. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP SupportLine mail service via electronic
mail, send an email message to:
[log in to unmask] (no Subject is required)
Multiple instructions are allowed in the TEXT PORTION OF THE
MESSAGE, here are some basic instructions you may want to use:
To add your name to the subscription list for new security
bulletins, send the following in the TEXT PORTION OF THE MESSAGE:
subscribe security_info
To retrieve the index of all HP Security Bulletins issued to
date, send the following in the TEXT PORTION OF THE MESSAGE:
send security_info_list
To get a patch matrix of current HP-UX and BLS security
patches referenced by either Security Bulletin or Platform/OS,
put the following in the text portion of your message:
send hp-ux_patch_matrix
World Wide Web service for browsing of bulletins is available
via our URL: http://us.external.hp.com
Choose "Support news", then under Support news,
choose "Security Bulletins"
E. To report new security vulnerabilities, send email to
[log in to unmask]
Please encrypt exploit information using the security-alert PGP
key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
[log in to unmask]
Permission is granted for copying and circulating this Bulletin to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Bulletin
is not edited or changed in any way, is attributed to HP, and
provided such reproduction and/or distribution is performed for
non-commercial purposes.
Any other use of this information is prohibited. HP is not liable
for any misuse of this information by any third party.
========================FORWARDED TEXT ENDS HERE=============================
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (FIRST).
We strongly urge you to encrypt any sensitive information you send by email.
The CERT Coordination Center can support a shared DES key and PGP. Contact
the CERT staff for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
CERT Contact Information
- ------------------------
Email [log in to unmask]
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST
(GMT-5)/EDT(GMT-4), and are on call for
emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
CERT publications, information about FIRST representatives, and other
security-related information are available from
http://www.cert.org/
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
To be added to our mailing list for CERT advisories and bulletins, send your
email address to
[log in to unmask]
CERT is a service mark of Carnegie Mellon University.
This file: ftp://info.cert.org/pub/cert_bulletins/VB-96.13.hp
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMhC3DXVP+x0t4w7BAQFu5QQAjOpdWO2sMqPGxVAKey/ZSbCvFvh4jNfB
FPe4/QHaBxNaKljGslT4eTR2r8U7lIPZAiffkcOf0AsSBLrHfCrTPoNimLZ6goZq
g2Sab+kwucs/fba98k8gHP3yvwhf2bh2vPG1zXtZZzaOSWjccP68PCQ9TPASldrT
j/PFyUaqzLo=
=+5DW
-----END PGP SIGNATURE-----
|