-----BEGIN PGP SIGNED MESSAGE----- <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Automated Systems Security Incident Support Team _____ ___ ___ _____ ___ _____ | / /\ / \ / \ | / \ | | / Integritas / \ \___ \___ | \___ | | < et /____\ \ \ | \ | | \ Celeritas / \ \___/ \___/ __|__ \___/ | |_____\ <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Bulletin 95-18 Release date: 11 May, 1995, 10:00 AM EDT (GMT -4) SUBJECT: Security Vulnerability in Hewlett Packard (HP) VUE 3.0. SUMMARY: A vulnerability in HP VUE 3.0 has been found that affects HP 9000 series 300/400s and/or 700/800s running HP-UX 9.x. BACKGROUND: All HP-UX series 300, 400, 700, and 800 systems at HP-UX 9.x are vulnerable to this problem. Systems running HP-UX version 8.x are not vulnerable because they run VUE 2.01. IMPACT: Local users can obtain root privilege. RECOMMENDED SOLUTIONS: The vulnerability can be eliminated from releases 9.x HP-UX by applying a patch that has been developed by HP. Obtain and install the appropriate patch according to the instructions provided below. The patch for HP-UX releases 9.x provides a new version of HP VUE 3.0 which fixes the vulnerability. A. Determine which patch is appropriate for your hardware platform and operating system: PHSS_4994 (series 700/800, HP-UX 9.x), PHSS_5438 (series 300/400, HP-UX 9.x) Hewlett Packard"s HP-UX patches are available via email and World Wide Web. The HP SupportLine email service user"s guide explains the process for downloading HP-UX patches via email and other available services. To obtain a copy of the HP SupportLine email service user"s guide, send the following in the TEXT PORTION OF A MESSAGE to support@support.mayfield.hp.com (no Subject is required): send guide The World Wide Web service for downloading of patches is available through the following URL: (http://support.mayfield.hp.com) B. Apply the patch to your HP-UX system. C. Examine /tmp/update.log for any relevant WARNINGs or ERRORs as follows: 1. At the shell prompt, type: ""tail -60 /tmp/update.log | more"" 2. Page through the next three screens via the space bar, looking for WARNING or ERROR messages. D. To add your name to the subscription list for new security bulletins, send the following in the TEXT PORTION OF A MESSAGE to support@support.mayfield.hp.com: subscribe security_info To retrieve the index of all HP Security Bulletins issued to date, send the following in the TEXT PORTION OF A MESSAGE to support@support.mayfield.hp.com: send security_info_list To get a patch matrix of current HP-UX and BLS security patches referenced by either Security Bulletin or Platform/OS, put the following in the TEXT PORTION OF A MESSAGE to support@support.mayfield.hp.com: send hp-ux_patch_matrix To report new security vulnerabilities, send email to security-alert@hp.com ASSIST would like to thank HP for information contained in this bulletin. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> ASSIST is an element of the Defense Information Systems Agency (DISA), Center for Information Systems Security (CISS), that provides service to the entire DoD community. Constituents of the DoD with questions about ASSIST or computer security security issues, can contact ASSIST using one of the methods listed below. Non-DoD organizations/institutions, contact the Forum of Incident Response and Security Teams (FIRST) (FIRST) representative. To obtain a list of FIRST member organizations and their constituencies send an email to docserver@first.org with an empty "subject" line and a message body containing the line "send first-contacts". ASSIST Information Resources: To be included in the distribution list for the ASSIST bulletins, send your Milnet (Internet) e-mail address to assist-request@assist.mil. Back issues of ASSIST bulletins, and other security related information, are available from the ASSIST BBS at 703-756-7993/1154 DSN 289-7993/1154, and through anonymous FTP from assist.mil (IP address 199.211.123.11). Note: assist.mil will only accept anonymous FTP connections from Milnet addresses that are registered with the NIC or DNS. ASSIST Contact Information: PHONE: 800-357-4231 (or 703-756-7974 DSN 289), duty hours are 06:00 to 22:30 EDT (GMT -4) Monday through Friday. During off duty hours, weekends and holidays, ASSIST can be reached via pager at 800-791- 4857. The page will be answered within 30 minutes, however if a quicker response is required, prefix the phone number with "999". ELECTRONIC MAIL: Send to assist@assist.mil. ASSIST BBS: Leave a message for the "sysop". ASSIST uses Pretty Good Privacy (PGP) 2.6.2 as the digital signature mechanism for bulletins. PGP 2.6.2 incorporates the RSAREF(tm) Cryptographic Toolkit under license from RSA Data Security, Inc. A copy of that license is available via anonymous FTP from net-dist.mit.edu (IP 18.72.0.3) in the file /pub/PGP/rsalicen.txt. In accordance with the terms of that license, PGP 2.6.2 may be used for non-commercial purposes only. Instructions for downloading the PGP 2.6.2 software can also be obtained from net-dist.mit.edu in the pub/PGP/README file. PGP 2.6.2 and RSAREF may be subject to the export control laws of the United States of America as implemented by the United States Department of State Office of Defense Trade Controls. The PGP signature information will be attached to the end of ASSIST bulletins. Reference herein to any specific commercial product, process, or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by ASSIST. The views and opinions of authors expressed herein shall not be used for advertising or product endorsement purposes. - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6 mQCNAi4uZ40AAAEEAM1uraimCNeh5PtzX7KoGxC2u8uMTdl8V5sujk3MHbWvCuOM W0FqDy5s9iwfQLZWzJ7cbM6L0mNOj8eJGoz7TqGKZDDRFlKAwg0x8joleZLC2gXw FVdF/g6Mdv7ok7heoa+Y//YMeADnsSrmzqLCnhFbKYffww3EbdH6sbnW3Io9AAUR tB9BU1NJU1QgVGVhbSA8YXNzaXN0QGFzc2lzdC5taWw+iQCVAwUQL1xx7tH6sbnW 3Io9AQEBYwP9FvIJbnKjtMLUj8ghd6hophSx8WZnfQsOmZX/BbX8vKz1a5BkBn4q ANvW+uKGdUlE8LLMEm1PD59Cihcb3OoWDOU8zIOIErvry4eqa+LzEXV8nnBdes+A a1MCMGSz+K3OaP78lQ7JCGoY9TXTWIelfAdBVBG4VQcSQRn8tjRdG2e0KEFTU0lT VCBUZWFtIDxhc3Npc3RAYXNzaXN0Lmltcy5kaXNhLm1pbD6JAJUCBRAuLnHoh0Y9 0jC+b6kBAU0TA/4yXSL7K6tcfVm9ACnP4crCoutFM2w10e7YKxD850ajhWrh6rI9 O+sjU5WObqiPJ7sZHdEw/KARzPSijH/5h8HlyYa6ClksWxYuymzCsUYYJctdjcGr uakfXgYQ1TkkyUfNrN5G90NuRK/vTRe7bkmyGNYjN9Njac1Q18WVF59Chg== =d5rP - -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUBL7Iav9H6sbnW3Io9AQFeTwP/RG0clKQ3eaeiwWyGu9oXWRVJL9Thiwqc B8EJ5glBKNHqTE4ZJJkcuGtQqEobJ7bwi0XNGwG8ApVElhEdxHEiGAs6e7eE85TC Yo1BH6pUZugFAkr9WFnJiPId5gPT0wm3owpGPOVoJmuGallCYoJhuTe4c7y4h5Da eqqdpi+MW+A= =nQ2H -----END PGP SIGNATURE-----