Bugtraq mailing list archives
Security Bulletins Digest
From: aleph1 () DFW NET (Aleph One)
Date: Thu, 13 Feb 1997 08:50:32 -0600
HP Support Information Digests =============================================================================== o HP Electronic Support Center World Wide Web Service --------------------------------------------------- If you subscribed through the HP Electronic Support Center and would like to be REMOVED from this mailing list, access the HP Electronic Support Center on the World Wide Web at: http://us-support.external.hp.com Enter the Support Information Digests service as a registered user, using your HP Electronic Support Center User ID and Password to login. You may then unsubscribe from the appropriate digest. =============================================================================== Digest Name: Daily Security Bulletins Digest Created: Thu Feb 13 3:00:04 PST 1997 Table of Contents: Document ID Title --------------- ----------- HPSBUX9702-053 Security Vulnerability in the ppl executable The documents are listed below. ------------------------------------------------------------------------------- Document ID: HPSBUX9702-053 Date Loaded: 970213 Title: Security Vulnerability in the ppl executable ------------------------------------------------------------------------- HEWLETT-PACKARD SECURITY BULLETIN: #00053, 13 February 1997 ------------------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett Packard will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------------- PROBLEM: Security Vulnerability in [/usr]/bin/ppl PLATFORM: HP 9000 Series 700/800s running HP-UX releases 9.X & 10.X DAMAGE: Vulnerabilities exist allowing local users to gain root privileges. SOLUTION: Apply patch: PHNE_9378 for all platforms with HP-UX releases 9.X PHNE_9375 for all platforms with HP-UX releases 10.00/10.01 PHNE_9376 for all platforms with HP-UX releases 10.10 PHNE_9771 for all platforms with HP-UX releases 10.20 AVAILABILITY: All patches are available now. ------------------------------------------------------------------------- I. A. Background A vulnerability with the ppl executable ([/usr]/bin/ppl) has been discovered. The fileset affected is Networking.SLIP-RUN. B. Fixing the problem The vulnerability can be eliminated from HP-UX releases 9.X and 10.X by applying the appropriate patch. C. Recommended solution 1. Determine which patch is appropriate for your operating system. 2. Hewlett-Packard's HP-UX patches are available via email and the World Wide Web To obtain a copy of the Hewlett-Packard SupportLine email service user's guide, send the following in the TEXT PORTION OF THE MESSAGE to support () us external hp com (no Subject is required): send guide The users guide explains the HP-UX patch downloading process via email and other services available. World Wide Web service for downloading of patches is available via our URL: (http://us.external.hp.com) 3. Apply the patch to your HP-UX system. 4. Examine /tmp/update.log (9.X), or /var/adm/sw/swinstall.log (10.X), for any relevant WARNING's or ERROR's. D. Impact of the patch The patches for HP-UX releases 9.X and 10.X provide enhancements to the ppl executable to avoid this vulnerability. E. To subscribe to automatically receive future NEW HP Security Bulletins from the HP SupportLine mail service via electronic mail, do the following: 1) From your Web browser, access the URL: http://us-support.external.hp.com (US,Canada, Asia-Pacific, and Latin-America) http://europe-support.external.hp.com (Europe) 2) On the HP Electronic Support Center main screen, select the hyperlink "Support Information Digests". 3) On the "Welcome to HP's Support Information Digests" screen, under the heading "Register Now", select the appropriate hyperlink "Americas and Asia-Pacific", or "Europe". 4) On the "New User Registration" screen, fill in the fields for the User Information and Password and then select the button labeled "Submit New User". 5) On the "User ID Assigned" screen, select the hyperlink "Support Information Digests". 6) You should now be on the "HP Support Information Digests Main" screen. You might want to verify that your email address is correct as displayed on the screen. From this screen, you may also view/subscribe to the digests, including the security bulletins digest. F. To report new security vulnerabilities, send email to security-alert () hp com Please encrypt exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert () hp com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. ________________________________________________________________________ -----End of Document ID: HPSBUX9702-053--------------------------------------
Current thread:
- Wierd behavior of MS's NT4 DNS, (continued)
- Wierd behavior of MS's NT4 DNS Jason T. Luttgens (Feb 07)
- New OFFICIAL patch for BSD/OS 2.1 (*SECURITY*) (fwd) Josh Gilliam (Feb 07)
- Bliss: The Facts Jared Mauch (Feb 08)
- view-source myst (Feb 08)
- IRIX: Bug in startmidi David Hedley (Feb 09)
- Re: IRIX: Bug in startmidi Nafees Bin Zafar (Feb 09)
- Security Advisory: A simple TCP spoofing attack Oliver Friedrichs (Feb 09)
- Re: Security Advisory: A simple TCP spoofing attack Wietse Venema (Feb 12)
- buffer overflow in configurable fingerd? M Shariful Anam (Feb 12)
- Re: buffer overflow in configurable fingerd? Ken Hollis (Feb 12)
- Security Bulletins Digest Aleph One (Feb 13)
- Linux NLSPATH buffer overflow solar () IDEAL RU (Feb 13)
- Re: Linux NLSPATH buffer overflow Alan Cox (Feb 14)
- CIAC Bulletin H-27: HP-UX vgdisplay Buffer Overrun Vulnerability Aleph One (Feb 15)
- screen 3.05.02 Khelbin Sunvold (Feb 15)
- Re: screen 3.05.02 test (Feb 16)
- Bug in apache httpd 1.1.3 Mihai Ibanescu (Feb 16)
- Re: Bug in apache httpd 1.1.3 Dean Gaudet (Feb 16)
- Announce new phf prober release Ray W. Hiltbrand (Feb 17)
- Re: Announce new phf prober release J. Bouvrie (Feb 17)
- NT password dictionary attack. Paul Ashton (Feb 18)