Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Security Bulletin SSRT3498 (updated)
From: Webb, Nigel (SSRT) (nigelwebbhp.com)
Date: Wed Aug 13 2003 - 09:59:17 CDT
-----BEGIN PGP SIGNED MESSAGE-----
SSRT3498 - HP Tru64 UNIX screend Potential Security
NOTICE: There are no restrictions for distribution of this
Bulletin provided that it remains complete and intact.
RELEASE DATE: August 2003
SOURCE: HEWLETT-PACKARD COMPANY
Software Security Response Team
This bulletin has been updated to provide the location of
the Early Release Patch (ERP) kit that is now availabel for
Tru64 UNIX V5.1b PK2 (BL22)
This bulletin will be posted to the support website within
24 hours of release to -
Use the SEARCH IN feature box, enter SSRT3498 in the search
SSRT3498 screend (Severity High)
A potential security vulnerability has been reported in the
HP Tru64 UNIX operating system that may result in
undetected network traffic or a Denial of Service (DoS).
This potential vulnerability may be in the form of local
and remote security domain risks.
HP Tru64 UNIX V5.1B
HP Tru64 UNIX V5.1A
HP Tru64 UNIX V5.1
HP Tru64 UNIX V5.0A
HP Tru64 UNIX V4.0G
HP Tru64 UNIX V4.0F
HP NonStop Servers
Early Release Patches (ERPs) are now available for all
supported versions of HP Tru64 UNIX/TruCluster Server that
provide a solution to this potential vulnerability. The ERP
kits use dupatch to install and will not install over any
Customer Specific Patches (CSPs) which have file
intersections with the ERPs. Contact your normal support
channel and request HP Tru64 services elevate a case to
Support Engineering if a CSP must be merged with one of
the ERPs. Please review the README file for each patch
prior to installation.
The fixes contained in the ERP kits will be available in
the following mainstream patch kits:
HP Tru64 UNIX 5.1B PK3
HP Tru64 UNIX 5.1A PK5
The following ERP kits are applicable to any system
running HP Tru64 UNIX.
HP TruCluster Server Software: the ERPs are designed for
clustered and non-clustered systems.
HP Tru64UNIX 5.1B
PREREQUISITE:HP Tru64 UNIX with 5.1B with PK2 (BL22) installed
ERP Kit Name:T64KIT0019576-V51BB22-ES-20030806.tar
HP Tru64 UNIX 5.1B
PREREQUISITE:HP Tru64 UNIX with PK1 (BL1) installed
ERP Kit Name:T64V51BB1-C0008100-17827-ES-20030404.tar
HP Tru64UNIX 5.1A
PREREQUISITE:HP Tru64 UNIX with PK4 (BL21) installed
ERP Kit Name:T64V51AB21-C0113300-17831-ES-20030404.tar
HP Tru64UNIX 5.1
PREREQUISITE:HP Tru64 UNIX with PK6 (BL20) installed
ERP Kit Name:T64V51B20-C0176800-17832-ES-20030404.tar
HP Tru64UNIX 5.0A
Customers requiring a 5.0A kit should file a level 2 IPMT
case to request one.
HP Tru64 UNIX 4.0G
PREREQUISITE:HP Tru64 UNIX with PK3 (BL17) installed
ERP Kit Name:T64V40GB17-C0029300-17837-ES-20030404.tar
PREREQUISITE:HP Tru64 UNIX with PK7 (BL18) installed
ERP Kit Name:DUV40FB18-C0093500-17836-ES-20030404.tar
Patch Kits for Sierra Clusters (SC) can be obtained by
contacting your normal HP Sierra Cluster Support channel.
MD5 and SHA1 checksums are available in the public patch
notice for the ERP kits. You can find information on how
to verify MD5 and SHA1 checksums available at:
After completing the update, HP strongly recommends that you
perform an immediate backup of the system disk so that any
subsequent restore operations begin with updated software.
Otherwise, the updates must be re-applied after a future
restore operation. Also, if at some future time the system
is upgraded to a later patch release or version release,
reinstall the appropriate ERP.
SUPPORT: For further information, contact HP Services.
SUBSCRIBE: To subscribe to automatically receive future
Security Advisories from the Software Security Response
Team via electronic mail:
REPORT: To report a potential security vulnerability with
any HP supported product, send email to: security-alerthp.com
As always, HP urges you to periodically review your system
management and security procedures. HP will continue to
review and enhance the security features of its products
and work with our customers to maintain and improve the
security and integrity of their systems.
"HP is broadly distributing this Security Bulletin in order
to bring to the attention of users of the affected HP
products the important security information contained in
this Bulletin. HP recommends that all users determine the
applicability of this information to their individual
situations and take appropriate action. HP does not warrant
that this information is necessarily accurate or complete
for all user situations and, consequently, HP will not be
responsible for any damages resulting from user's use or
disregard of the information provided in this Bulletin."
(c)Copyright 2001, 2003 Hewlett-Packard Development Company,
L.P. Hewlett-Packard Company shall not be liable for
technical or editorial errors or omissions contained herein.
The information in this document is subject to change
without notice. Hewlett-Packard Company and the names of
Hewlett-Packard products referenced herein are trademarks
of Hewlett-Packard Company in the United States and other
countries. Other product and company names mentioned
herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Security 7.0.3
-----END PGP SIGNATURE-----