************************************************************************** Security Bulletin 9503 DISA Defense Communications System January 31, 1995 Published by: DDN Security Coordination Center (SCC@NIC.DDN.MIL) 1-(800) 365-3642 DEFENSE DATA NETWORK SECURITY BULLETIN The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security Coordination Center) under DISA contract as a means of communicating information on network and host security exposures, fixes, and concerns to security and management personnel at DDN facilities. Back issues may be obtained via FTP (or Kermit) from NIC.DDN.MIL [192.112.36.5] using login="anonymous" and password="guest". The bulletin pathname is scc/ddn-security-yynn (where "yy" is the year the bulletin is issued and "nn" is a bulletin number, e.g. scc/ddn-security-9428). ************************************************************************** + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + ! ! ! The following important advisory was issued by the Automated ! ! Systems Security Incident Support Team (ASSIST) and is being ! ! relayed unedited via the Defense Information Systems Agency's ! ! Security Coordination Center distribution system as a means ! ! of providing DDN subscribers with useful security information. ! ! ! + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Automated Systems Security Incident Support Team _____ ___ ___ _____ ___ _____ | / /\ / \ / \ | / \ | | / Integritas / \ \___ \___ | \___ | | < et /____\ \ \ | \ | | \ Celeritas / \ \___/ \___/ __|__ \___/ | |_____\ <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Bulletin 95-02 Release date: 30 January, 1995, 09:30 AM EST (GMT -4) SUBJECT: Security vulnerabilities in HP-UX Support Watch and CORE-DIAG fileset. SUMMARY: This bulletin contains information from Hewlett Packard about a new security vulnerability and a revision to an existing security patch. This information updates ASSIST bulletin 94-037, subject: Summary of HP Security Bulletins. HP has set up an automatic server to allow patches and other security information to be retrieved over the Internet. To utilize this server, send a message to support@support.mayfield.hp.com. The subject line of the message will be ignored. The body (text) of the message should contain the words send XXXX where XXXX is the identifier for the information you want retrieved. For example, to retrieve the patch PHSS_4834, the message would be "send PHSS_4834". Other information that can be retrieved include the HP SupportLine mail service user's guide (send guide.txt), the readme file for a patch (send doc PHSS_4834), and the original HP bulletin (send doc HPSBUX9410-018). HP also has a World Wide Web server to browse and retrieve bulletins and patches. To utilize this server, use a WWW client and connect to http://support.mayfield.hp.com. IMPORTANT NOTE: Hewlett Packard updates patches periodically. These updates are not reflected in the text of each HP bulletin. The overview presented here contains current information on the patches available at the time of the release of this bulletin. If you request an updated patch, when you try to retrieve the patch you will receive a message stating that the patch is obsolete and the name of the patch which supersedes it. Hewlett Packard has made sum and MD5 checksums available for their patches and for their security bulletins. See the detailed explanation for HPSBUX9408-016 in ASSIST 94-037 for information on how to access and utilize these checksums. BACKGROUND: The Support Watch and CORE-DIAG fileset vulnerabilities are widely known and are being used to compromise networked systems. HP Progs Patches to Overview of Bulletin Affected Platform Install Vulnerability - --------- -------- --------------- ---------- ------------- 9411-019 Support HP 9000 700,800 PHSS_4874 Users can Watch HP-UX 8.0, 8.02, potentially 8.06, and 9.0 increase only access privileges. 9409-017 System HP 9000 700,800 Install Users can Message HP-UX 8.x, 9.x appropriate increase their catalog patch(es) access (fileset dependent privileges. CORE-DIAG) uopn configuration * All HP-UX bulletins have the prefix HPSBUX, for example bulletin 9311-019 would be requested from HP as HPSBUX9311-019. NOTE: After every patch is installed, be sure to examine /tmp/update.log for any relevant WARNINGs or ERRORs. This can be done by typing "tail -60 /tmp/update.log | more", then paging through the next three screens via the space bar, looking for WARNING or ERROR messages. IMPACT: Users can increase access privileges. RECOMMENDED SOLUTION: HPSBUX9411-019: Support Watch, dated November 30, 1994. This vulnerability exists ONLY in HP 9000 series 800 running HP-UX revisions 8.0, 8.02, 8.06 and 9.0. Later HP-UX releases including 9.04 are NOT affected by this vulnerability. Obtain patch PHSS_4874, install it per the installation instructions included with the patch. HPSBUX9409-017: CORE-DIAG vulnerability, dated September 21, 1994 (Revised October 18, 1994, then revised December 1, 1994). The vulnerability exists for all HP-UX systems using the CORE-DIAG fileset. No patches will be available for versions of HP_UX prior to version 8.0. The patch to install depends on which operating system version and series you are currently using. To determine the operating system version of your system, display the file /system/UX-CORE/index with the "more" or "pg" command. The line will look similar to: fv: A.BX.YY.ZZ Where X is the major revision, YY is the minor revision, and ZZ is the PCO index. For example, if your system needed to install an item on the chart below, (HP-UX 9.00.4A) the major revision would be "9", the minor revision would be "00" and the PCO index would be "4A". Note that these patches are quite large. Use the following chart to determine which patch to retrieve and install in /tmp: Operating System Series Apply patch - ---------------- ------ ----------- HP-UX 8.0, 8.06 800 PHSS_4578 HP-UX 8.02 800 PHSS_4577 HP-UX 8.05, 8.07 700 PHSS_4574 HP-UX 9.00.2O or 9.00.3A 800 PHSS_4532 HP-UX 9.00.4A 800 PHSS_4660 HP-UX 9.01 700 PHSS_4475 HP-UX 9.03, 9.05 700 PHSS_4863 HP-UX 9.04 800 PHSS_4913 Obtain necessary patches, install per the installation instructions included with the patches. ASSIST would like to thank the DOE CIAC for information contained in this bulletin. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> ASSIST is an element of the Defense Information Systems Agency (DISA), Center for Information Systems Security (CISS), that provides service to the entire DoD community. Constituents of the DoD with questions about ASSIST or computer security security issues, can contact ASSIST using one of the methods listed below. Non-DoD organizations/institutions, contact the Forum of Incident Response and Security Teams (FIRST) (FIRST) representative. To obtain a list of FIRST member organizations and their constituencies send an email to docserver@first.org with an empty "subject" line and a message body containing the line "send first-contacts". ASSIST Information Resources: To be included in the distribution list for the ASSIST bulletins, send your Milnet (Internet) e-mail address to assist-request@assist.mil. Back issues of ASSIST bulletins, and other security related information, are available from the ASSIST BBS at 703-756-7993/1154 DSN 289-7993/1154, and through anonymous FTP from assist.mil (IP address 199.211.123.11). Note: assist.mil will only accept anonymous FTP connections from Milnet addresses that are registered with the NIC or DNS. ASSIST Contact Information: PHONE: 800-357-4231 (or 703-756-7974 DSN 289), duty hours are 06:00 to 22:30 EDT (GMT -4) Monday through Friday. During off duty hours, weekends and holidays, ASSIST can be reached via pager at 800-791- 4857. The page will be answered within 30 minutes, however if a quicker response is required, prefix the phone number with "999". ELECTRONIC MAIL: Send to assist@assist.mil. ASSIST BBS: Leave a message for the "sysop". Reference herein to any specific commercial product, process, or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by ASSIST. The views and opinions of authors expressed herein shall not be used for advertising or product endorsement purposes. **************************************************************************** * * * The point of contact for MILNET security-related incidents is the * * Security Coordination Center (SCC). * * * * E-mail address: SCC@NIC.DDN.MIL * * * * Telephone: 1-(800)-365-3642 * * * * NIC Help Desk personnel are available from 7:00 a.m.-7:00 p.m. EST, * * Monday through Friday except on federal holidays. * * * **************************************************************************** PLEASE NOTE: Some users outside of the DOD computing communities may receive DDN Security bulletins. If you are not part of the DOD community, please contact your agency's incident response team to report incidents. Your agency's team will coordinate with DOD. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained by sending email to docserver@first.org with an empty subject line and a message body containing the line: send first-contacts. This document was prepared as an service to the DOD community. Neither the United States Government nor any of their employees, makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government. The opinions of the authors expressed herein do not necessarily state or reflect those of the United States Government, and shall not be used for advertising or product endorsement purposes.