===============================================================================
o HP Electronic Support Center World Wide Web Service
---------------------------------------------------
If you subscribed through the HP Electronic Support Center and would
like to be REMOVED from this mailing list, access the
HP Electronic Support Center on the World Wide Web at:
http://us-support.external.hp.com
Enter the Support Information Digests service as a registered user,
using your HP Electronic Support Center User ID and Password to login.
You may then unsubscribe from the appropriate digest.
===============================================================================
Digest Name: Daily Security Bulletins Digest
Created: Tue Sep 9 4:30:08 PDT 1997
Table of Contents:
Document ID Title
--------------- -----------
HPSBUX9704-058 Security Vulnerability in libXt for HP-UX 9.X & 10.X
HPSBUX9707-067 Buffer overflows in X11/Motif libraries
HPSBUX9709-069 Security Advisory in vuefile, vuepad, et. al. in HP-UX
The documents are listed below.
-------------------------------------------------------------------------------
Document ID: HPSBUX9704-058
Date Loaded: 970909
Title: Security Vulnerability in libXt for HP-UX 9.X & 10.X
------------------------------------------------------------------------
**REVISED 02**HEWLETT-PACKARD SECURITY BULLETIN: #00058, 28 April 1997
Last Revised: 08 September 1997
-------------------------------------------------------------------------
The information in the following Security Bulletin should be acted upon
as soon as possible. Hewlett Packard will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Bulletin as soon as possible.
-------------------------------------------------------------------------
PROBLEM: Buffer overflow condition in libXt/Error.c
PLATFORM: HP 9000 series 700/800 systems running version 9.X or 10.X
DAMAGE: Users could increase privileges.
SOLUTION: Apply the patches listed below and relink any suid/sgid
programs that use libXt.a. Programs that use the shared
library libXt.sl require no action other than loading
the patches.
AVAILABILITY: All patches are available now.
CHANGE SUMMARY: Added patches for HP-UX 10.24.
-------------------------------------------------------------------------
I.
A. Background
A buffer overflow condition has been identified in the Xt
library. This can be exploited using suid/sgid programs
to increase privileges.
B. Fixing the problem
Apply the library patches and relink any suid/sgid programs
that are linked with the archived version of libXt.
C. Recommended solution
**REVISED 02**
Install the applicable patches:
PHSS_10167 9.X X11R5/Motif1.2 Runtime
PHSS_10168 9.X X11R5/Motif1.2 Development
PHSS_9809 10.0X X11R5/Motif1.2 Runtime (also for 10.10)
PHSS_9810 10.0X X11R5/Motif1.2 Development
PHSS_9809 10.10 X11R5/Motif1.2 Runtime (also for 10.0X)
PHSS_9811 10.10 X11R5/Motif1.2 Development
PHSS_10688 10.20 X11R5/Motif1.2 Runtime
PHSS_9813 10.20 X11R5/Motif1.2 Development
PHSS_10789 10.20 X11R6/Motif1.2 Runtime
PHSS_9815 10.20 X11R6/Motif1.2 Development
-->>PHSS_11021 10.24 VVOS X/Motif Runtime July97 Periodic patch
Then relink as indicated above.
D. Impact of the patch
Installs new versions of X11R5 or X11R6 and Motif1.2.
E. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP Electronic Support Center via electronic
mail, do the following:
User your browser to get to the HP Electronic Support Center
page at:
http://us-support.external.hp.com
(for US, Canada, Asia-Pacific, & Latin-America)
http://europe-support.external.hp.com
(for Europe)
Click on the Technical Knowledge Database, register as a user
(remember to save the User ID assigned to you, and your password),
and it will connect to a HP Search Technical Knowledge DB page.
Near the bottom is a hyperlink to our Security Bulletin archive.
Once in the archive there is another link to our current
security patch matrix. Updated daily, this matrix is categorized
by platform/OS release, and by bulletin topic.
F. To report new security vulnerabilities, send email to
security-alert@hp.com
Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.
Permission is granted for copying and circulating this Bulletin to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Bulletin
is not edited or changed in any way, is attributed to HP, and
provided such reproduction and/or distribution is performed for
non-commercial purposes.
Any other use of this information is prohibited. HP is not liable
for any misuse of this information by any third party.
________________________________________________________________________
-----End of Document ID: HPSBUX9704-058--------------------------------------
Document ID: HPSBUX9707-067
Date Loaded: 970909
Title: Buffer overflows in X11/Motif libraries
-------------------------------------------------------------------------
**REVISED 01** HEWLETT-PACKARD SECURITY BULLETIN: #00067, 30 July 1997
Last Revised: 08 September 1997
-------------------------------------------------------------------------
The information in the following Security Bulletin should be acted upon
as soon as possible. Hewlett Packard will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Bulletin as soon as possible.
-------------------------------------------------------------------------
PROBLEM: Buffer overflows in X11/Motif libraries.
PLATFORM: HP9000 Series 700/800 running releases 9.X and 10.X
DAMAGE: Suid/sgid programs linked with X11/Motif libraries can
be exploited to increase privileges.
SOLUTION: Install the patches listed below. Any programs that are
linked archived with any previous versions of the X11/Motif
libraries must be relinked with the libraries in the patches.
AVAILABILITY: The patches are available now.
CHANGE SUMMARY: Added patches for HP-UX 10.24.
-------------------------------------------------------------------------
I.
A. Background - Several buffer overflow conditions have been
identified. These have been present in all
previous versions of the X11/Motif libraries.
B. Fixing the problem - Install the applicable patches:
**REVISED 01**
PHSS_11626 9.X X11R5/Motif1.2 Runtime
PHSS_11627 9.X X11R5/Motif1.2 Development
PHSS_11043 10.0X X11R5/Motif1.2 Runtime (also for 10.10)
PHSS_11044 10.0X X11R5/Motif1.2 Development
PHSS_11043 10.10 X11R5/Motif1.2 Runtime (also for 10.0X)
PHSS_11045 10.10 X11R5/Motif1.2 Development
PHSS_11628 10.20 X11R5/Motif1.2 Runtime
PHSS_11629 10.20 X11R5/Motif1.2 Development
PHSS_11628 10.20 X11R6/Motif1.2 Runtime
PHSS_11630 10.20 X11R6/Motif1.2 Development
-->>PHSS_11021 10.24 VVOS X/Motif Runtime July97 Periodic patch
PHSS_9858 9.X VUE 3.0
PHSS_9804 10.01 VUE 3.0
PHSS_9805 10.10/10.20 VUE 3.0
PHSS_11373 9.X JSE A.B9.40
Then relink any suid/sgid programs that use X11 or Motif archived
libraries.
C. Recommended solution - Install the applicable patches and
relink archived suid/sgid programs.
D. Impact of the patch - The fixes are in the X11/Motif patches.
The VUE and JSE patches make use of the libraries in the
X11/Motif patches.
E. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP Electronic Support Center via electronic
mail, do the following:
User your browser to get to the HP Electronic Support Center page
at:
http://us-support.external.hp.com
(for US, Canada, Asia-Pacific, & Latin-America)
http://europe-support.external.hp.com
(for Europe)
Click on the Technical Knowledge Database, register as a user
(remember to save the User ID assigned to you, and your password),
and it will connect to a HP Search Technical Knowledge DB page.
Near the bottom is a hyperlink to our Security Bulletin archive.
Once in the archive there is another link to our current
security patch matrix. Updated daily, this matrix is categorized
by platform/OS release, and by bulletin topic.
F. To report new security vulnerabilities, send email to
security-alert@hp.com
Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.
Permission is granted for copying and circulating this Bulletin to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Bulletin
is not edited or changed in any way, is attributed to HP, and
provided such reproduction and/or distribution is performed for
non-commercial purposes.
Any other use of this information is prohibited. HP is not liable
for any misuse of this information by any third party.
________________________________________________________________________
-----End of Document ID: HPSBUX9707-067--------------------------------------
Document ID: HPSBUX9709-069
Date Loaded: 970909
Title: Security Advisory in vuefile, vuepad, et. al. in HP-UX
-------------------------------------------------------------------------
HEWLETT-PACKARD SECURITY ADVISORY: #00069, 08 September 1997
-------------------------------------------------------------------------
The information in the following Security Advisory should be acted upon
as soon as possible. Hewlett Packard will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Advisory as soon as possible.
-------------------------------------------------------------------------
PROBLEM: Users can inadvertently allow access to their accounts
by running vuefile, vuepad, dtfile, or dtpad to displays
they do not control.
PLATFORM: HP9000 Series 700/800s running HP-UX releases 9.X and 10.X
DAMAGE: Users can gain privileges.
SOLUTION: Do not run vuefile, vuepad, dtfile, or dtpad while su'd to
another account. Also do not run them with the display set
to another Xserver, unless the same account is logged in at
each Xserver.
AVAILABILITY: Not applicable
-------------------------------------------------------------------------
I.
A. Background
Vuefile, vuepad, dtfile, and dtpad do not authenticate users.
Care must be taken to insure that only one user per Xserver runs
these programs.
B. Fixing the problem
The current and perhaps only solution is to avoid the situation.
This advisory will be updated if patches become available.
C. Recommended solution
Inform users so that they can avoid the situation. They should
never run vuefile, vuepad, dtfile, or dtpad while su'd to another
account.
They also should never run these programs with the display directed
to another Xserver unless they are logged into that Xserver in the
same account.
One way to make it more difficult for a user to su and run these
programs is to enable per user authorization. This eliminates
the potential for a user to run the programs on the wrong display
by accidentally mistyping the display name.
Per-user authorization is the default in CDE. In Vue, it can be
enabled in /usr/vue/config/Xconfig:
# To enable R4 MIT-MAGIC-COOKIE-1 per-user authorization.
#
Vuelogin*authorize: True
Note that if per-user authorization is not enabled many
security breaches are possible. For example, it is possible
for a program to capture keystrokes typed on the Xserver.
The root user can circumvent the per-user authorization and
non-root users can give the Xauthority away. So all users
still must be aware not to run vuefile, vuepad, dtfile, or
dtpad as described above.
D. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP Electronic Support Center via electronic
mail, do the following:
Use your browser to get to the HP Electronic Support Center page at:
http://us-support.external.hp.com
(for US, Canada, Asia-Pacific, & Latin-America)
http://europe-support.external.hp.com (for Europe)
Click on the Technical Knowledge Database, register as a user
(remember to save the User ID assigned to you, and your password),
and it will connect to a HP Search Technical Knowledge DB page.
Near the bottom is a hyperlink to our Security Bulletin archive.
Once in the archive there is another link to our current
security patch matrix. Updated daily, this matrix is categorized
by platform/OS release, and by bulletin topic.
E. To report new security vulnerabilities, send email to
security-alert@hp.com
Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.
Permission is granted for copying and circulating this Bulletin to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Bulletin is
not edited or changed in any way, is attributed to HP, and provided
such reproduction and/or distribution is performed for non-commercial
purposes.
Any other use of this information is prohibited. HP is not liable
for any misuse of this information by any third party.
________________________________________________________________________
-----End of Document ID: HPSBUX9709-069--------------------------------------