LISTSERV mailing list manager LISTSERV 16.0

Help for MICHAEL-L Archives


MICHAEL-L Archives

MICHAEL-L Archives


MICHAEL-L@C7LSERV-DEV.NS.UTORONTO.CA


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

MICHAEL-L Home

MICHAEL-L Home

MICHAEL-L  August 1996

MICHAEL-L August 1996

Subject:

HP-UX 10.x security vulnerability in 'rdist'

From:

Mike Peterson <[log in to unmask]>

Date:

Fri, 9 Aug 1996 22:06:33 -0400

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (109 lines)

Xref: utgpu comp.security.misc:31788
Path: utgpu!utcsri!rutgers!news.sgi.com!sdd.hp.com!hp-pcd!hpbs2500.boi.hp.com!hpax!secure
From: [log in to unmask] (Security Alert)
Newsgroups: comp.security.misc
Subject: Security Vulnerability in SAM remote admin
Date: 8 Aug 1996 21:35:49 GMT
Organization: Hewlett Packard Cupertino Site
Lines: 96
Message-ID: <[log in to unmask]>
NNTP-Posting-Host: hpcugsya.cup.hp.com
X-Newsreader: TIN [version 1.2 PL0.9]


-----------------------------------------------------------------------
HEWLETT-PACKARD SECURITY BULLETIN: #HPSBUX9607-034, 22 July 1996
-----------------------------------------------------------------------

The information in the following Security Bulletin should be acted upon
as soon as possible.  Hewlett Packard will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Bulletin as soon as possible.

-----------------------------------------------------------------------
PROBLEM:  Vulnerabilities in SAM remote administration.
PLATFORM: HP 9000/300/400/700 and 800 systems running any currently
          supported version of HP-UX 9.X and 10.X.
DAMAGE:   The security of the enterprise and its applications could
          be compromised.
SOLUTION: Follow the procedure below.

AVAILABILITY: Not applicable

-----------------------------------------------------------------------
I. Mailing list discussions

   A. Background

      It has recently come to the attention of Hewlett-Packard that
      remote administration of cluster nodes via SAM (System
      Administration Manager) is done with a now widely known
      password.  There is a default account password used in the
      currently shipping SAM binary.  That user gets created via rsh
      on the remote machine.

   B. Recommended workaround

      Hewlett-Packard strongly recommends that administrators concerned
      with the security of their enterprise either:
        a) do not configure remote administration, or
        b) replace that existing password field in /etc/passwd with an
           asterisk (*)

      Hewlett-Packard is working to deliver new scheme in a future
      release of the SAM product.

   C. To subscribe to automatically receive future NEW HP Security
      Bulletins from the HP SupportLine mail service via electronic
      mail, send an email message to:

      [log in to unmask]   (no Subject is required)

      Multiple instructions are allowed in the TEXT PORTION OF THE
      MESSAGE, here are some basic instructions you may want to use:

      To add your name to the subscription list for new security
      bulletins, send the following in the TEXT PORTION OF THE MESSAGE:

                  subscribe security_info

      To retrieve the index of all HP Security Bulletins issued to
      date, send the following in the TEXT PORTION OF THE MESSAGE:

                  send security_info_list

      To get a patch matrix of current HP-UX and BLS security
      patches referenced by either Security Bulletin or Platform/OS,
      put the following in the text portion of your message:

                  send hp-ux_patch_matrix

       World Wide Web service for browsing of bulletins
       is available via our URL:
       (http://us.external.hp.com)

       Choose &quot;Support news&quot;, then under Support news,
       choose &quot;Security Bulletins&quot;


   D. To report new security vulnerabilities, send email to

          [log in to unmask]

      Please encrypt exploit information using the security-alert PGP
      key, available from your local key server, or by sending a
      message with a -subject- (not body) of 'get key' (no quotes) to
      [log in to unmask]


     Permission is granted for copying and circulating this Bulletin to
     Hewlett-Packard (HP) customers (or the Internet community) for the
     purpose of alerting them to problems, if and only if, the Bulletin
     is not edited or changed in any way, is attributed to HP, and
     provided such reproduction and/or distribution is performed for
     non-commercial purposes.

     Any other use of this information is prohibited. HP is not liable
     for any misuse of this information by any third party.
______________________________________________________________________

Top of Message | Previous Page | Permalink

Advanced Options


Options

Log In

Log In

Get Password

Get Password


Search Archives

Search Archives


Subscribe or Unsubscribe

Subscribe or Unsubscribe


Archives

April 2018
January 2018
December 2017
November 2017
February 2016
April 2015
February 2015
July 2014
November 2013
November 2012
October 2011
September 2011
May 2011
February 2011
December 2010
June 2010
April 2010
August 2009
June 2009
April 2009
February 2009
December 2008
September 2008
August 2008
March 2008
February 1997
August 1996

ATOM RSS1 RSS2



LISTSERV.UTORONTO.CA

CataList Email List Search Powered by the LISTSERV Email List Manager