Xref: utgpu comp.security.misc:31788 Path: utgpu!utcsri!rutgers!news.sgi.com!sdd.hp.com!hp-pcd!hpbs2500.boi.hp.com!hpax!secure From: [log in to unmask] (Security Alert) Newsgroups: comp.security.misc Subject: Security Vulnerability in SAM remote admin Date: 8 Aug 1996 21:35:49 GMT Organization: Hewlett Packard Cupertino Site Lines: 96 Message-ID: <[log in to unmask]> NNTP-Posting-Host: hpcugsya.cup.hp.com X-Newsreader: TIN [version 1.2 PL0.9] ----------------------------------------------------------------------- HEWLETT-PACKARD SECURITY BULLETIN: #HPSBUX9607-034, 22 July 1996 ----------------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett Packard will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ----------------------------------------------------------------------- PROBLEM: Vulnerabilities in SAM remote administration. PLATFORM: HP 9000/300/400/700 and 800 systems running any currently supported version of HP-UX 9.X and 10.X. DAMAGE: The security of the enterprise and its applications could be compromised. SOLUTION: Follow the procedure below. AVAILABILITY: Not applicable ----------------------------------------------------------------------- I. Mailing list discussions A. Background It has recently come to the attention of Hewlett-Packard that remote administration of cluster nodes via SAM (System Administration Manager) is done with a now widely known password. There is a default account password used in the currently shipping SAM binary. That user gets created via rsh on the remote machine. B. Recommended workaround Hewlett-Packard strongly recommends that administrators concerned with the security of their enterprise either: a) do not configure remote administration, or b) replace that existing password field in /etc/passwd with an asterisk (*) Hewlett-Packard is working to deliver new scheme in a future release of the SAM product. C. To subscribe to automatically receive future NEW HP Security Bulletins from the HP SupportLine mail service via electronic mail, send an email message to: [log in to unmask] (no Subject is required) Multiple instructions are allowed in the TEXT PORTION OF THE MESSAGE, here are some basic instructions you may want to use: To add your name to the subscription list for new security bulletins, send the following in the TEXT PORTION OF THE MESSAGE: subscribe security_info To retrieve the index of all HP Security Bulletins issued to date, send the following in the TEXT PORTION OF THE MESSAGE: send security_info_list To get a patch matrix of current HP-UX and BLS security patches referenced by either Security Bulletin or Platform/OS, put the following in the text portion of your message: send hp-ux_patch_matrix World Wide Web service for browsing of bulletins is available via our URL: (http://us.external.hp.com) Choose "Support news", then under Support news, choose "Security Bulletins" D. To report new security vulnerabilities, send email to [log in to unmask] Please encrypt exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to [log in to unmask] Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. ______________________________________________________________________