OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
 
From: IT Resource Center (support_feedbackus-support-mail.external.hp.com)
Date: Thu Jun 06 2002 - 08:20:28 CDT

  • Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]

                            HP Support Information Digests

    ===============================================================================
    o Security Bulletin Digest Split
       ------------------------------

       The security bulletins digest has been split into multiple digests
       based on the operating system (HP-UX, MPE/iX, and HP Secure OS
       Software for Linux). You will continue to receive all security
       bulletin digests unless you choose to update your subscriptions.
       
       To update your subscriptions, use your browser to access the
       IT Resource Center on the World Wide Web at:

         http://www.itresourcecenter.hp.com/

       Under the Maintenance and Support Menu, click on the "more..." link.
       Then use the 'login' link at the left side of the screen to login
       using your IT Resource Center User ID and Password.

       Under the notifications section (near the bottom of the page), select
       Support Information Digests.

       To subscribe or unsubscribe to a specific security bulletin digest,
       select or unselect the checkbox beside it. Then click the
       "Update Subscriptions" button at the bottom of the page.

    o IT Resource Center World Wide Web Service
       ---------------------------------------------------

       If you subscribed through the IT Resource Center and would
       like to be REMOVED from this mailing list, access the
       IT Resource Center on the World Wide Web at:

         http://www.itresourcecenter.hp.com/

       Login using your IT Resource Center User ID and Password.
       Then select Support Information Digests (located under
       Maintenance and Support). You may then unsubscribe from the
       appropriate digest.
    ===============================================================================


    Digest Name: daily HP Secure OS Software for Linux security bulletins digest
        Created: Thu Jun 6 3:00:05 PDT 2002

    Table of Contents:

    Document ID Title
    --------------- -----------
    HPSBTL0206-046 Security vulnerability in xchat
    HPSBTL0206-045 Security vulnerability in bind
    HPSBTL0602-047 Security vulnerability in ghostscript

    The documents are listed below.
    -------------------------------------------------------------------------------


    Document ID: HPSBTL0206-046
    Date Loaded: 20020605
          Title: Security vulnerability in xchat

    TEXT

                            

                                    

    ---------------------------------------------------------------
        HEWLETT-PACKARD COMPANY SECURITY ADVISORY: #046
        Originally issued: 05 June '02
    ---------------------------------------------------------------

    The information in the following Security Advisory should be acted
    upon as soon as possible. Hewlett-Packard Company will not be
    liable for any consequences to any customer resulting from the
    customer's failure to fully implement instructions in this Security
    Advisory as soon as possible.

    Because the vulnerability does not require a Hewlett-Packard Secure OS
    1.0 patch or re-packaging of the RPM affected by the advisory, the
    RPMs have not been produced or tested by Hewlett-Packard.

    ---------------------------------------------------------------
    PROBLEM: Security vulnerability in xchat

    PLATFORM: Any system running HP Secure OS software for Linux Release 1.0

    DAMAGE: Potential execution of arbitrary commands

    SOLUTION: Apply the appropriate RPMs (see section B below)

    MANUAL ACTIONS: None

    AVAILABILITY: The RPMs are available now.
     ---------------------------------------------------------------
     A. Background
     
        X-Chat is an IRC client for the X Window System and GTK+. A security
        issue in XChat allows a malicious server to execute arbitrary commands.

     B. Fixing the problem

        Hewlett-Packard Company recommends that customers who have installed
        xchat, download the RPMs listed in the following Red Hat Security
        Advisory:

        2002-06-04 RHSA-2002:097 Updated xchat packages fix /dns vulnerability

        http://rhn.redhat.com/errata/RHSA-2002-097.html

        To install the security advisory RPMs, use the following sequence
        of commands:

        1. If you use the tripwire product, we recommend that you run a
           a consistency check and fix any violations before installing
           the security advisory RPM.

               tripwire --check --interactive

        2. Install the advisory RPM from the root account.

               rpm -F <advisory RPM name>

        3. Update the tripwire database

               tripwire --check --interactive

        NOTE:
        The rpm -q <package name> command can be used to determine if the
        package is installed. Hewlett-Packard recommends applying the
        security advisory fixes to installed packages only. The -F option
        to the RPM installer will only apply the fix if the package is
        currently installed on the system. Dependent RPMs can be found by
        using the "Find Latest RPMs" search facility at
        http://www.redhat.com/apps/download. To find the latest dependent
        RPM enter the RPM's name in the "By Keyword" box.
        

     C. To subscribe to automatically receive future HP Security
        Bulletins from the HP IT Resource Center via electronic
        mail, do the following:

        Use your browser to access the HP IT Resource Center page
        at:

           http://itrc.hp.com

        Use the 'Login' tab at the left side of the screen to login
        using your ID and password. Use your existing login or the
        "Register" button at the left to create a login. Remember to
        save the User ID assigned to you, and your password. This
        login provides access to many useful areas of the ITRC.

        In the left most frame select "Maintenance and Support".

        Under the "Notifications" section (near the bottom of
        the page), select "Support Information Digests".

        To -subscribe- to future HP Security Bulletins or other
        Technical Digests, click the check box (in the left column)
        for the appropriate digest and then click the "Update
        Subscriptions" button at the bottom of the page.

        or

        To -review- bulletins already released, select the link
        (in the middle column) for the appropriate digest.

     D. To report new security vulnerabilities, send email to

        security-alerthp.com

        Please encrypt any exploit information using the
        security-alert PGP key, available from your local key
        server. You may also get the security-alert PGP key by
        sending a message with a -subject- (not body) of
        'get key' (no quotes) to security-alerthp.com.

        Permission is granted for copying and circulating this
        advisory to Hewlett-Packard (HP)customers (or the Internet
        community) for the purpose of alerting them to problems,
        if and only if, the advisory is not edited or changed in
        any way, is attributed to HP, and provided such reproduction
        and/or distribution is performed for non-commercial purposes.

        Any other use of this information is prohibited. HP is not
        liable for any misuse of this information by any third party.
     ---------------------------------------------------------------
    -----End of Document ID: HPSBTL0206-046--------------------------------------


    Document ID: HPSBTL0206-045
    Date Loaded: 20020605
          Title: Security vulnerability in bind

    TEXT

                            

                                    

    ---------------------------------------------------------------
        HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #045
        Originally issued: 05 June '02
    ---------------------------------------------------------------

    The information in the following Security Bulletin should be acted
    upon as soon as possible. Hewlett-Packard Company will not be
    liable for any consequences to any customer resulting from the
    customer's failure to fully implement instructions in this Security
    Bulletin as soon as possible.

    Because the vulnerability does not require a HP Secure OS
    1.0 patch or re-packaging of the RPM affected by the bulletin, the
    RPMs have not been produced or tested by Hewlett-Packard Company.

    ---------------------------------------------------------------
    PROBLEM: Security vulnerability in bind

    PLATFORM: Any system running HP Secure OS software for Linux Release 1.0

    DAMAGE: Potential denial of service attack

    SOLUTION: Apply the appropriate RPMs (see section B below)

    MANUAL ACTIONS: None

    AVAILABILITY: The RPMs are available now.
     ---------------------------------------------------------------
     A. Background

        BIND (Berkeley Internet Name Domain) is an implementation of the DNS
        (Domain Name System) protocols. Versions of BIND 9 prior to 9.2.1 can
        be exploited to cause a denial of service attack against name servers.
     
     B. Fixing the problem

        Hewlett-Packard Company recommends that customers who have installed
        bind, download the RPMs listed in the following Red Hat Security
        Advisory:

        2002-06-04 RHSA-2002:105 Updated bind packages fix denial of
        service attack

        http://rhn.redhat.com/errata/RHSA-2002-105.html

        To install the security bulletin RPMs, use the following sequence
        of commands:

        1. If you use the tripwire product, we recommend that you run a
           a consistency check and fix any violations before installing
           the security bulletin RPM.

               tripwire --check --interactive

        2. Install the bulletin RPM from the root account.

               rpm -F <bulletin RPM name>

        3. Update the tripwire database

               tripwire --check --interactive

        NOTE:
        The rpm -q <package name> command can be used to determine if the
        package is installed. Hewlett-Packard Company recommends applying the
        Security Bulletin fixes to installed packages only. The -F option
        to the RPM installer will only apply the fix if the package is
        currently installed on the system. Dependent RPMs can be found by
        using the "Find Latest RPMs" search facility at
        http://www.redhat.com/apps/download. To find the latest dependent
        RPM enter the RPM's name in the "By Keyword" box.
        

     C. To subscribe to automatically receive future HP Security
        Bulletins from the HP IT Resource Center via electronic
        mail, do the following:

        Use your browser to access the HP IT Resource Center page
        at:

           http://itrc.hp.com

        Use the 'Login' tab at the left side of the screen to login
        using your ID and password. Use your existing login or the
        "Register" button at the left to create a login. Remember to
        save the User ID assigned to you, and your password. This
        login provides access to many useful areas of the ITRC.

        In the left most frame select "Maintenance and Support".

        Under the "Notifications" section (near the bottom of
        the page), select "Support Information Digests".

        To -subscribe- to future HP Security Bulletins or other
        Technical Digests, click the check box (in the left column)
        for the appropriate digest and then click the "Update
        Subscriptions" button at the bottom of the page.

        or

        To -review- bulletins already released, select the link
        (in the middle column) for the appropriate digest.

     D. To report new security vulnerabilities, send email to

        security-alerthp.com

        Please encrypt any exploit information using the
        security-alert PGP key, available from your local key
        server. You may also get the security-alert PGP key by
        sending a message with a -subject- (not body) of
        'get key' (no quotes) to security-alerthp.com.

        Permission is granted for copying and circulating this bulletin to
        Hewlett-Packard Company (HP) customers (or the Internet community)
        for the purpose of alerting them to problems, if and only if, the
        bulletin is not edited or changed in any way, is attributed to HP,
        and provided such reproduction and/or distribution is performed
        for non-commercial purposes.

        Any other use of this information is prohibited. HP is not
        liable for any misuse of this information by any third party.
     ---------------------------------------------------------------
    -----End of Document ID: HPSBTL0206-045--------------------------------------


    Document ID: HPSBTL0602-047
    Date Loaded: 20020605
          Title: Security vulnerability in ghostscript

    TEXT

                            

                                    
    ---------------------------------------------------------------
        HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #047
        Originally issued: 05 June '02
    ---------------------------------------------------------------

    The information in the following Security Bulletin should be acted
    upon as soon as possible. Hewlett-Packard Company will not be
    liable for any consequences to any customer resulting from the
    customer's failure to fully implement instructions in this Security
    Bulletin as soon as possible.

    Because the vulnerability does not require a HP Secure OS
    1.0 patch or re-packaging of the RPM affected by the bulletin, the
    RPMs have not been produced or tested by Hewlett-Packard Company.

    ---------------------------------------------------------------
    PROBLEM: Security vulnerability in ghostscript during Postscript
              interpretation.

    PLATFORM: Any system running HP Secure OS software for Linux Release 1.0

    DAMAGE: Potential execution of arbitrary commands

    SOLUTION: Apply the appropriate RPMs (see section B below)

    MANUAL ACTIONS: None

    AVAILABILITY: The RPMs are available now.
     ---------------------------------------------------------------
     A. Background

        Updated packages are available for GNU Ghostscript which fix a
        vulnerability found during Postscript interpretation.

        Ghostscript is a program for displaying PostScript files or
        printing them to non-PostScript printers.
        
     B. Fixing the problem

        Hewlett-Packard Company recommends that customers who have installed
        ghostscript download the RPMs listed in the following Red Hat
        Security Advisory under the Red Hat Linux 7.1 section.

        2002-06-03 RHSA-2002:083 Ghostscript command execution vulnerability

        http://rhn.redhat.com/errata/RHSA-2002-083.html

        To install the security bulletin RPMs, use the following sequence
        of commands:

        1. If you use the tripwire product, we recommend that you run a
           a consistency check and fix any violations before installing
           the security bulletin RPM.

               tripwire --check --interactive

        2. Install the bulletin RPM from the root account.

               rpm -F <bulletin RPM name>

        3. Update the tripwire database

               tripwire --check --interactive

        NOTE:
        The rpm -q <package name> command can be used to determine if the
        package is installed. Hewlett-Packard Company recommends applying the
        Security Bulletin fixes to installed packages only. The -F option
        to the RPM installer will only apply the fix if the package is
        currently installed on the system. Dependent RPMs can be found by
        using the "Find Latest RPMs" search facility at
        http://www.redhat.com/apps/download. To find the latest dependent
        RPM enter the RPM's name in the "By Keyword" box.
        

     C. To subscribe to automatically receive future HP Security
        Bulletins from the HP IT Resource Center via electronic
        mail, do the following:

        Use your browser to access the HP IT Resource Center page
        at:

           http://itrc.hp.com

        Use the 'Login' tab at the left side of the screen to login
        using your ID and password. Use your existing login or the
        "Register" button at the left to create a login. Remember to
        save the User ID assigned to you, and your password. This
        login provides access to many useful areas of the ITRC.

        In the left most frame select "Maintenance and Support".

        Under the "Notifications" section (near the bottom of
        the page), select "Support Information Digests".

        To -subscribe- to future HP Security Bulletins or other
        Technical Digests, click the check box (in the left column)
        for the appropriate digest and then click the "Update
        Subscriptions" button at the bottom of the page.

        or

        To -review- bulletins already released, select the link
        (in the middle column) for the appropriate digest.

     D. To report new security vulnerabilities, send email to

        security-alerthp.com

        Please encrypt any exploit information using the
        security-alert PGP key, available from your local key
        server. You may also get the security-alert PGP key by
        sending a message with a -subject- (not body) of
        'get key' (no quotes) to security-alerthp.com.

        Permission is granted for copying and circulating this bulletin to
        Hewlett-Packard Company (HP) customers (or the Internet community)
        for the purpose of alerting them to problems, if and only if, the
        bulletin is not edited or changed in any way, is attributed to HP,
        and provided such reproduction and/or distribution is performed
        for non-commercial purposes.

        Any other use of this information is prohibited. HP is not
        liable for any misuse of this information by any third party.
     ---------------------------------------------------------------
    -----End of Document ID: HPSBTL0602-047--------------------------------------