[support_feedback@us-support.external.hp.com: Security Bulletins

From: Patrick Oonk (patrickat_private)
Date: Thu Oct 21 1999 - 07:14:42 PDT

  • Next message: Solar Designer: "Re: Compaq Alpha Bounds Checking"

    --FL5UXtIhxfXey3p5
    Content-Type: text/plain; charset=us-ascii
    Content-Transfer-Encoding: quoted-printable
    
    ----- Forwarded message from HP Electronic Support Center  <support_feedbac=
    k@us-support.external.hp.com> -----
    
    Date: Thu, 21 Oct 1999 04:37:35 -0700 (PDT)
    Subject: Security Bulletins Digest
    From: support_feedback@us-support.external.hp.com (HP Electronic Support Ce=
    nter )
    To: security_info@us-support.external.hp.com
    Reply-To: support_feedback@us-support.external.hp.com
    Errors-To: support_errors@us-support.external.hp.com
    
    
                            HP Support Information Digests
    
    =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
    =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
    =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
    =3D=3D=3D=3D
    o  HP Electronic Support Center World Wide Web Service
       ---------------------------------------------------
    
       If you subscribed through the HP Electronic Support Center and would
       like to be REMOVED from this mailing list, access the
       HP Electronic Support Center on the World Wide Web at:
    
         http://us-support.external.hp.com
    
       Login using your HP Electronic Support Center User ID and Password.
       Then select Support Information Digests.  You may then unsubscribe from =
    the
       appropriate digest.
    =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
    =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
    =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
    =3D=3D=3D=3D
    
    =0C
    Digest Name:  Daily Security Bulletins Digest
        Created:  Thu Oct 21  3:00:03 PDT 1999
    
    Table of Contents:
    
    Document ID      Title
    ---------------  -----------
    HPSBUX9910-104   Security Advisory regarding automountd
    
    The documents are listed below.
    ---------------------------------------------------------------------------=
    ----
    
    =0C
    Document ID:  HPSBUX9910-104
    Date Loaded:  19991020
          Title:  Security Advisory regarding automountd
    
    -------------------------------------------------------------------------
          HEWLETT-PACKARD COMPANY SECURITY ADVISORY: #00104, 21 Oct. 99
    -------------------------------------------------------------------------
    
    The information in the following Security Advisory should be acted upon
    as soon as possible.  Hewlett-Packard Company will not be liable for any
    consequences to any customer resulting from customer's failure to fully
    implement instructions in this Security Advisory as soon as possible.
    
    -------------------------------------------------------------------------
    PROBLEM:  automountd can run user programs as root.
    
    PLATFORM: HP-9000 Series 700/800 HP-UX releases 10.X and 11.00.
    
    DAMAGE:   Allows users to gain root privileges
    
    SOLUTION: Temporarily set AutoFS =3D 0 in  /etc/rc.config.d/nfsconf
              (see below)
    
    AVAILABILITY: No patches for 10.X and 11.00 are available at this time.
              NOTE: This advisory will be revised when patches are available.
    -------------------------------------------------------------------------
    I.
       A. Background
          This problem was originally reported in CERT Advisory CA-99-05,
          regarding the vulnerability in automountd which allows an
          intruder to execute arbitrary commands with the privileges of
          the automountd process.
    
          We had previously reported that Hewlett-Packard platforms were
          not vulnerable; we now have new information showing that we
          are indeed vulnerable.
    
       B. Fixing the problem -
          At this time there are no patches available for any releases.
    
          As a work around, setting AutoFS =3D 0 in the file
          /etc/rc.config.d/nfsconf,  we believe, will disallow most
          exploitations.  We continue to work on this problem and this
          advisory will be updated when patches become available.
    
       C. To subscribe to automatically receive future NEW HP Security
          Bulletins from the HP IT Resource Center via electronic mail,
          do the following:
    
          Use your browser to get to the HP IT Resource Center page
          at:
             http://us-support2.external.hp.com
                   (for US, Canada, Asia-Pacific, & Latin-America)
          or:
             http://europe-support2.external.hp.com     (for Europe).
    
          Under the heading "Maintenance and Support (Electronic Support
          Center)," click on the link "More..."  Then at the very bottom,
          click on "Support Information Digests" underneath the
          heading NOTIFICATION.
    
          Now login with your user ID and password (or register for one).
          Remember to save the User ID assigned to you, and your password.
    
          Once you are on the Spport Information Main page, follow the
          instructions there.
          To -subscribe- to future HP Security Bulletins,
            click on "Support Information Digests".
          To -review- bulletins already released,
            click on the link "HP Security Bulletins Archive."
    
          In the archive there is another link to our current Security
          Patch Matrix.  Updated daily, this matrix categorizes security
          patches by platform/OS release, and by topic.
    
          The security patch matrix is also available via anonymous ftp
          from:   us-ffs.external.hp.com     in
          ~ftp/export/patches/hp-ux_patch_matrix
    
       D. To report new security vulnerabilities, send email to
    
           security-alertat_private
    
          Please encrypt any exploit information using the security-alert
          PGP key, available from your local key server, or by sending a
          message with a -subject- (not body) of 'get key' (no quotes) to
          security-alertat_private
    
         Permission is granted for copying and circulating this advisory to
         Hewlett-Packard (HP) customers (or the Internet community) for the
         purpose of alerting them to problems, if and only if, the advisory
         is not edited or changed in any way, is attributed to HP, and
         provided such reproduction and/or distribution is performed for
         non-commercial purposes.
    
         Any other use of this information is prohibited. HP is not liable
         for any misuse of this information by any third party.
    ________________________________________________________________________
    -----End of Document ID:  HPSBUX9910-104-----------------------------------=
    ---
    
    ----- End forwarded message -----
    
    --=20
     Patrick Oonk - PO1-6BONE - patrickat_private - www.pine.nl/~patrick
     Pine Internet B.V.                            PGP key ID BE7497F1 =20
     Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/
     -- Pine Security Digest - http://security.pine.nl/ (Dutch) ----
     Excuse of the day: short leg on process table
    
    --FL5UXtIhxfXey3p5
    Content-Type: application/pgp-signature
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3ia
    
    iQB1AwUBOA8f0vMOST2+dJfxAQH+5QMAqooXow90wtTOpOYOvtF//9OfJKoBvsZ6
    hzouss3EFlohPZa6c+4b2vKZpCw3UAibEb7j0O9Ahx+5qXfOOh1eeX4MXzOCfmZM
    1WSTF8w1Uv95IIOJs59/lCYAZ6Hc4c7S
    =qemi
    -----END PGP SIGNATURE-----
    
    --FL5UXtIhxfXey3p5--
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:08:18 PDT