Bugtraq mailing list archives
Alert: Sec. Vuln. in libXt for HP-UX 9.X & 10.X
From: aleph1 () dfw net (Aleph One)
Date: Tue, 6 May 1997 22:24:41 -0500
Please direct any follow-ups to comp.sys.hp.hpux. ------------------------------------------------------------------------- HEWLETT-PACKARD SECURITY BULLETIN: #00058, 28 April 1997 ------------------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett Packard will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------------- PROBLEM: Buffer overflow condition in libXt/Error.c PLATFORM: HP 9000 series 700/800 systems running version 9.X or 10.X DAMAGE: Users could increase privileges. SOLUTION: Apply the patches listed below and relink any suid/sgid programs that use libXt.a. Programs that use the shared library libXt.sl require no action other than loading the patches. AVAILABILITY: All patches are available now. ------------------------------------------------------------------------- I. A. Background A buffer overflow condition has been identified in the Xt library. This can be exploited using suid/sgid programs to increase privileges. B. Fixing the problem Apply the library patches and relink any suid/sgid programs that are linked with the archived version of libXt. C. Recommended solution Install the applicable patches: PHSS_10167 9.X X11R5/Motif1.2 Runtime PHSS_10168 9.X X11R5/Motif1.2 Development PHSS_9809 10.0X/10.10 X11R5/Motif1.2 Runtime PHSS_9810 10.0X/10.10 X11R5/Motif1.2 Development PHSS_10688 10.20 X11R5/Motif1.2 Runtime PHSS_9813 10.20 X11R5/Motif1.2 Development PHSS_10789 10.20 X11R6/Motif1.2 Runtime PHSS_9815 10.20 X11R6/Motif1.2 Development Then relink as indicated above. D. Impact of the patch Installs new versions of X11R5 or X11R6 and Motif1.2. E. To subscribe to automatically receive future NEW HP Security Bulletins from the HP Electronic Support Center via electronic mail, do the following: User your browser to get to the HP Electronic Support Center page at: http://us-support.external.hp.com (for US, Canada, Asia-Pacific, & Latin-America) http://europe-support.external.hp.com (for Europe) Click on the Technical Knowledge Database, register as a user (remember to save the User ID assigned to you, and your password), and it will connect to a HP Search Technical Knowledge DB page. Near the bottom is a hyperlink to our Security Bulletin archive. Once in the archive there is another link to our current security patch matrix. Updated daily, this matrix is categorized by platform/OS release, and by bulletin topic. F. To report new security vulnerabilities, send email to security-alert () hp com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert () hp com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. ________________________________________________________________________ ------------------------------------------------------------
Current thread:
- Alert: Sec. Vuln. in libXt for HP-UX 9.X & 10.X Aleph One (May 06)