kermit buffer overflow on hp-ux

From: John Morris (jrm_at_atl.hp.com)
Date: 05/05/03

  • Next message: Joel Palmius: "Mod_Survey SYSBASE vulnerability"
    To: bugtraq@securityfocus.com
    Date: Mon, 05 May 2003 07:23:26 -0400
    
    

    -----BEGIN PGP SIGNED MESSAGE-----

    Re: buffer overflow in kermit

    We were unable to duplicate the buffer overflow reported by
    bt@delfi.lt when the patches recommended in the following
    security bulletin are installed.

     
    - ----------------------------------------------------------------------
    **REVISED 02**
     Source: HEWLETT-PACKARD COMPANY
     SECURITY BULLETIN: HPSBUX0012-135
     Originally issued: 18 December 2000
     Last Revised: 26 December 2002

     
    - ----------------------------------------------------------------------
        The information in the following Security Bulletin should be
        acted upon as soon as possible. Hewlett-Packard Company will
        not be liable for any consequences to any customer resulting
        from customer's failure to fully implement instructions in
        this Security Bulletin as soon as possible.
     
    - ----------------------------------------------------------------------
    ISSUE: Kermit communications software contains a buffer overflow.

    PLATFORM: HP9000 Series 700 and 800 running HP-UX releases 11.00,
               10.20, 10.10 and 10.01.

    POSSIBLE RESULT: Users could compromise system availability.

    SOLUTION: *REVISED01*
               Apply patches for HP-UX releases as follows:
                     for 11.00: PHCO_22665 ,
       --->>> 10.20: PHCO_23319 ,
       --->>> 10.10: PHCO_23320 ,
       --->>> 10.01: PHCO_23321.

    AVAILABILITY: The patches are available now.

    **REVISED 02**
    MANUAL ACTIONS: No

    CHANGE SUMMARY: Revision 01 Patches for 10.X are
                                built on current code base.
                    Revision 02 add MANUAL ACTIONS field
     
    - ----------------------------------------------------------------------
    I.
        A. Background
           Hewlett-Packard Company has become aware of a defect in the
           Kermit communications software supplied with its operating
           system in various releases.

        B. Fixing the problem *REVISED01*
           The problem can be fully resolved by applying the appropriate
           patches to the system. For HP-UX releases
                         11.00: PHCO_22665 ,
       --->>> 10.20: PHCO_23319 ,
       --->>> 10.10: PHCO_23320 ,
       --->>> 10.01: PHCO_23321.

           While this patch does not require a reboot, appropriately
           terminating any instances of Kermit before installation of the
           patch will assure that continued operation with Kermit is now
           with the patched binaries.

        C. To subscribe to automatically receive future NEW HP Security
           Bulletins from the HP IT Resource Center via electronic mail,
           do the following:

           Use your browser to get to the HP IT Resource Center page
           at:

            http://itrc.hp.com

           Under the Maintenance and Support Menu (Electronic Support
           Center): click on the "more..." link. Then -

           Use the 'Login' tab at the left side of the screen to login
           using your ID and password. Check with your system
           administrator to see if you have an existing login or use
           the "Register" button at the left to create a login. You
           will need to login in order to gain access to many areas of
           the ITRC. Remember to save the User ID assigned to you, and
           your password.

           Under the Maintenance and Support Menu, click on the "more..."
           link. Under the "Notifications" section (near the bottom of
           the page), select "Support Information Digests".

           To -subscribe- to future HP Security Bulletins or other
           Technical Digests, click the check box (in the left column)
           for the appropriate digest and then click the "Update
           Subscriptions" button at the bottom of the page.

           or

           To -review- bulletins already released, select the link
           (in the middle column) for the appropriate digest.

           To -gain access- to the Security Patch Matrix, select
           the link for "hp security bulletins archive" near the bottom.
           Once in the archive the top link is to our current Security
           Patch Matrix. Updated daily, this matrix categorizes security
           patches by platform/OS release, and by bulletin topic.

           The security patch matrix is also available via anonymous ftp:

           ftp.itrc.hp.com
           ~ftp/export/patches/hp-ux_patch_matrix"

           On the "Support Information Digest Main" page:
           click on the "HP Security Bulletin Archive".

        D. To report new security vulnerabilities, send email to

           security-alert@hp.com

           Please encrypt any exploit information using the
           security-alert PGP key, available from your local key server,
           or by sending a message with a -subject- (not body) of
          'get key' (no quotes) to security-alert@hp.com.

           Permission is granted for copying and circulating this
           Bulletin to Hewlett-Packard (HP) customers (or the Internet
           community) for the purpose of alerting them to problems,
           if and only if, the Bulletin is not edited or changed in
           any way, is attributed to HP, and provided such reproduction
           and/or distribution is performed for non-commercial purposes.

           Any other use of this information is prohibited. HP is not
           liable for any misuse of this information by any third party.
    ______________________________________________________________________

    Yours truly,
     SOFTWARE SECURITY RESPONSE TEAM (SSRT)
     Hewlett-Packard Company
     HP Services

    -----BEGIN PGP SIGNATURE-----
    Version: PGP Personal Security 7.0.3

    iQCVAwUBPrZJE0b+N2sIuD1FAQEcNQP/eDmpMB+aMsbCPI8AlanIE5N1IezD1oh0
    kB4FxHfwCdB+q+MfrlZOy9JZ5DD7vVBSdNEOydP2+wKg+yRKuUqKC6BBYSi/yJkz
    GPhRxSA1KfQSq4o792X+5VQYvZMJB/n59aPK04u4/YwmMcB+HvsgArQHq/yyniqY
    Sgvs8j0R84U=
    =AYGs
    -----END PGP SIGNATURE-----


  • Next message: Joel Palmius: "Mod_Survey SYSBASE vulnerability"