[security bulletin] HPSBGN03617 rev.2 - HPE IceWall Federation Agent and IceWall File Manager using libXML2 library, Remote Denial of Service (DoS)

2016-06-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05157239

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05157239
Version: 2

HPSBGN03617 rev.2 - HPE IceWall Federation Agent and IceWall File Manager
using libXML2 library, Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-09
Last Updated: 2016-06-09

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in the libXML2 library could potentially impact HPE
IceWall Federation Agent and IceWall File Manager resulting in Remote Denial
of Service (DoS).

References:

  - CVE-2016-3627
  - CVE-2016-3705
  - PSRT110132

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - IceWall Federation Agent 3.0 using libXML2
  - IceWall File Manager 3.0 using libXML2

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-3627(AV:N/AC:L/Au:N/C:N/I:N/A:P)   5.0
CVE-2016-3705(AV:N/AC:L/Au:N/C:N/I:N/A:P)   5.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE recommends applying the latest OS vendor security patches for libXML2 to
resolve the vulnerabilities in the libXML2 library.

HISTORY
Version:1 (rev.1) - 9 June 2016 Initial release
Version:2 (rev.2) - 9 June 2016 Corrected content

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXWggfAAoJEGIGBBYqRO9/0JwIAM82/ev9SnVBJprHLNY4fZAJ
Jrha+4BhuYZJ/Sf2hgoaZVKcveW0Q5fWzrB59Pz5CoZiEeJk4qbmezF0E+iGOV17
W3huowscmTzd/0lM6B85lwH36oSc183VhBd+YrCrFPSwGP9h0xOUQkXpnEWWa9+f
L9MTPh++T266mukkGthtbpSK9l4b7GIXDQHIk9xphi6V9HQWbSaWKlWII9tcP45H
iLEZ1awphMRqY6WLA8WPCIWvH3LkPEizNP3UMBPt1lNS3g/zvAbPft96x0RMoP2A
RCe0eRzcyDMlkGnW8vJRZscwK649RlRdNZCAQGXsJdsV/cO/xhZO5a1HqLRPPwA=
=MiD+
-END PGP SIGNATURE-


[SECURITY] [DSA 3600-1] iceweasel/firefox-esr security update

2016-06-09 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

- -
Debian Security Advisory DSA-3600-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
June 09, 2016 https://www.debian.org/security/faq
- -

Package: firefox-esr
CVE ID : CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822 
 CVE-2016-2828 CVE-2016-2831

Multiple security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, buffer overflows and other
implementation errors may lead to the execution of arbitrary code or
spoofing.

Wait, Firefox? No more references to Iceweasel? That's right, Debian no
longer applies a custom branding. Please see these links for further
information:
 https://glandium.org/blog/?p=3622
 https://en.wikipedia.org/wiki/Mozilla_software_rebranded_by_Debian

Debian follows the extended support releases (ESR) of Firefox. Support
for the 38.x series has ended, so starting with this update we're now
following the 45.x releases and this update to the next ESR is also the
point where we reapply the original branding.

Transition packages for the iceweasel packages are provided which
automatically upgrade to the new version. Since new binary packages need
to be installed, make sure to allow that in your upgrade procedure (e.g.
by using "apt-get dist-upgrade" instead of "apt-get upgrade").

For the stable distribution (jessie), these problems have been fixed in
version 45.2.0esr-1~deb8u1.

For the unstable distribution (sid), these problems have been fixed in
version 45.2.0esr-1.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=RYDx
-END PGP SIGNATURE-



SimpleSAMLphp Link Injection

2016-06-09 Thread hyp3rlinx
[+] Credits: John Page aka hyp3rlinx 

[+] Website: hyp3rlinx.altervista.org

[+] Source:  
http://hyp3rlinx.altervista.org/advisories/SIMPLESAML-PHP-LINK-INJECTION.txt

[+] ISR: apparitionsec



Vendor:
=
simplesamlphp.org



Product:
==
simplesamlphp < 1.14.4



Vulnerability Type:
===
Link Injection



CVE Reference:
==
N/A



Vulnerability Details:
=

Several scripts part of SimpleSAMLphp display a web page with links obtained 
from the request parameters. This is supposed to enhance
usability, as the users are presented with links they can follow after 
completing a certain action, like logging out.

The following scripts do not check the URLs obtained via the HTTP request 
before displaying them as the target of links that the user
may click on:

www/logout.php
modules/core/www/no_cookie.php

The issue allowed attackers to display links targeting a malicious website 
inside a trusted site running SimpleSAMLphp, due to the lack
of security checks involving the link_href and retryURL HTTP parameters, 
respectively. The issue was resolved by including a verification
of the URLs received in the request against a white list of websites specified 
in the trusted.url.domains configuration option.


References:
https://simplesamlphp.org/security/201606-01

Affected versions:
All SimpleSAMLphp versions prior to 1.14.4.

Impact:
A remote attacker could craft a link or pop up webpage pointing to a trusted 
website running SimpleSAMLphp, including a parameter pointing
to a malicious website, to fool the victim into visiting that website by 
clicking on a link in the page presented by the "trusted" SimpleSAMLphp
application.


Vulnerable Codes:


"no_cookie.php" ...
==


if (isset($_REQUEST['retryURL'])) {
$retryURL = (string)$_REQUEST['retryURL'];
$retryURL = \SimpleSAML\Utils\HTTP::normalizeURL($retryURL);
} else {
$retryURL = NULL;
}

$globalConfig = SimpleSAML_Configuration::getInstance();
$t = new SimpleSAML_XHTML_Template($globalConfig, 'core:no_cookie.tpl.php');
$t->data['retryURL'] = $retryURL;
$t->show();


"logout.php" ... 



if (array_key_exists('link_href', $_REQUEST)) {
$link = (string) $_REQUEST['link_href'];
$link = \SimpleSAML\Utils\HTTP::normalizeURL($link);
} else {
$link = 'index.php';
}

if (array_key_exists('link_text', $_REQUEST)) {
$text = $_REQUEST['link_text'];
} else {
$text = '{logout:default_link_text}';
}

$t = new SimpleSAML_XHTML_Template($config, 'logout.php');
$t->data['link'] = $link;
$t->data['text'] = $text;
$t->show();



Exploit code(s):
===


1) 
https://victim-server/simplesaml/module.php/core/no_cookie.php?retryURL=https://attacker-server


2) 
https://victim-server/simplesaml/logout.php?link_href=http://attacker-server/Evil.php_text=PLEASE%20DOWNLOAD%20THIS%20IMPORTANT%20UPDATE



Disclosure Timeline:
===
Vendor Notification:  May 31, 2016
June 9, 2016  : Public Disclosure




Exploitation Technique:
===
Remote



Severity Level:

Low



[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no 
warranties or guarantees of fitness of use or otherwise.
Permission is hereby granted for the redistribution of this advisory, provided 
that it is not altered except by reformatting it, and
that due credit is given. Permission is explicitly given for insertion in 
vulnerability databases and similar, provided that due credit
is given to the author. The author is not responsible for any misuse of the 
information contained herein and accepts no responsibility
for any damage caused by the use or misuse of this information. The author 
prohibits any malicious use of security related information
or exploits by the author or elsewhere.

hyp3rlinx


[SECURITY] [DSA 3599-1] p7zip security update

2016-06-09 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3599-1   secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 09, 2016 https://www.debian.org/security/faq
- -

Package: p7zip
CVE ID : CVE-2016-2335
Debian Bug : 824160

Marcin 'Icewall' Noga of Cisco Talos discovered an out-of-bound read
vulnerability in the CInArchive::ReadFileItem method in p7zip, a 7zr
file archiver with high compression ratio. A remote attacker can take
advantage of this flaw to cause a denial-of-service or, potentially the
execution of arbitrary code with the privileges of the user running
p7zip, if a specially crafted UDF file is processed.

For the stable distribution (jessie), this problem has been fixed in
version 9.20.1~dfsg.1-4.1+deb8u2.

For the testing distribution (stretch), this problem has been fixed
in version 15.14.1+dfsg-2.

For the unstable distribution (sid), this problem has been fixed in
version 15.14.1+dfsg-2.

We recommend that you upgrade your p7zip packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=ASUx
-END PGP SIGNATURE-



CVE-2016-3085: Apache CloudStack Authentication Bypass Vulnerability

2016-06-09 Thread John Kinsella
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

CVE-2016-3085: Apache CloudStack Authentication Bypass Vulnerability

CVSS v2:
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Vendors:
The Apache Software Foundation
Accelerite, Inc

Versions affected:
CloudStack versions 4.5.0 and newer

Description:
Apache CloudStack contains an authentication module providing “single
sign-on” functionality via the SAML data format. Under certain
conditions, a user could manage to access the user interface without
providing proper credentials. As the SAML plugin is disabled by
default, this issue only affects installations that have enabled
and use SAML-based authentication.

Mitigation:
Users of Apache CloudStack using the SAML plugin should upgrade to
one of the following versions, based on which release they are
currently using: 4.5.2.1, 4.6.2.1, 4.7.1.1, or 4.8.0.1. These
versions contain only security updates, and no other functionality
change.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: GPGTools - http://gpgtools.org
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=+Tpv
-END PGP SIGNATURE-


ESA-2016-064: EMC Data Domain Information Disclosure Vulnerability

2016-06-09 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2016-064: EMC Data Domain Information Disclosure Vulnerability

EMC Identifier: ESA-2016-064

CVE Identifier: CVE-2016-0910

Severity Rating: CVSS v3 Base Score: 8.2 (AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
Affected products:  
EMC Data Domain OS 5.5: version 5.5.3.3 and below
EMC Data Domain OS 5.6: version 5.6.1.0 and below
EMC Data Domain OS 5.7: version 5.7.1.0 and below

Summary:  
EMC Data Domain is affected by an information disclosure vulnerability that 
could potentially be exploited by malicious users to compromise the affected 
system.

Details:  
Data Domain logs the session identifier of a user logged in via the GUI in a 
file that is accessible to all users. A malicious user could use the disclosed 
session identifier to take over the account of the victim, a GUI user whose 
session identifier was disclosed. 

Resolution:  
The following EMC Data Domain releases contain resolutions to these 
vulnerabilities:
•   EMC Data Domain OS 5.5: version 5.5.4.0
•   EMC Data Domain OS 5.6: hotfix version 5.6.1.004. Contact EMC Customer 
Support for access.
•   EMC Data Domain OS 5.7: version 5.7.2.0  
EMC strongly recommends all customers upgrade at the earliest opportunity. 

Link to remedies:

Registered EMC Online Support customers can download patches and software from 
support.emc.com at
https://support.emc.com/downloads/32697_DD-OS

If you have any questions, contact EMC support.

Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC recommends that all users determine the applicability of this information 
to their individual situations and take appropriate action. The information set 
forth herein is provided "as is" without warranty of any kind. EMC disclaims 
all warranties, either express or implied, including the warranties of 
merchantability, fitness for a particular purpose, title and non-infringement. 
In no event, shall EMC or its suppliers, be liable for any damages whatsoever 
including direct, indirect, incidental, consequential, loss of business profits 
or special damages, even if EMC or its suppliers have been advised of the 
possibility of such damages. Some states do not allow the exclusion or 
limitation of liability for consequential or incidental damages, so the 
foregoing limitation may not apply.

EMC Product Security Response Center
security_al...@emc.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAldYcLUACgkQtjd2rKp+ALy/vACgxyoNSugQqR4fu5yv0z8Ny4pj
34QAnRkLeIvgR7D4jGM5s3pbePKUpw1K
=erAR
-END PGP SIGNATURE-


ESA-2016-072: EMC NetWorker Remote Code Execution Vulnerability

2016-06-09 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2016-072: EMC NetWorker Remote Code Execution Vulnerability

EMC Identifier: ESA-2016-072
CVE Identifier: CVE-2016-0916
Severity Rating: CVSS v3 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 


Affected products:  
EMC NetWorker 8.2.1.0 and all versions after  

Summary:  
EMC NetWorker contains a fix for a remote code execution vulnerability that 
could potentially be exploited by malicious users to compromise NetWorker 
systems. 
Details: 
A remote attacker from a NetWorker instance may execute commands, 
unauthenticated, on another NetWorker instance due to an unsafe authentication 
mechanism. 

Resolution:  
The following EMC NetWorker release contains resolutions to these 
vulnerabilities:
•   EMC NetWorker version 8.2.2.6
•   EMC NetWorker version 8.2.3
•   EMC Networker version  9.0.0.6

EMC recommends all customers upgrade to one of the versions mentioned above at 
the earliest opportunity. 

Link to remedies:

Customers can download software from two different locations:
https://support.emc.com/downloads/1095_NetWorker



Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC recommends that all users determine the applicability of this information 
to their individual situations and take appropriate action. The information set 
forth herein is provided "as is" without warranty of any kind. EMC disclaims 
all warranties, either express or implied, including the warranties of 
merchantability, fitness for a particular purpose, title and non-infringement. 
In no event, shall EMC or its suppliers, be liable for any damages whatsoever 
including direct, indirect, incidental, consequential, loss of business profits 
or special damages, even if EMC or its suppliers have been advised of the 
possibility of such damages. Some states do not allow the exclusion or 
limitation of liability for consequential or incidental damages, so the 
foregoing limitation may not apply.


EMC Product Security Response Center
security_al...@emc.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAldYb98ACgkQtjd2rKp+ALx6VQCggMcR90kvL5XH3aDe/AoEwO0w
lwsAoMSzbQwZE4Z8oxp+7tOkk5IlqC2n
=d6dG
-END PGP SIGNATURE-


[security bulletin] HPSBMU03614 rev.1 - HPE Systems Insight Manager using Samba, Multiple Remote Vulnerabilities

2016-06-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05166182

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05166182
Version: 1

HPSBMU03614 rev.1 - HPE Systems Insight Manager using Samba, Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-07
Last Updated: 2016-06-07

Potential Security Impact: Remote Unauthorized Identification of Valid Users,
Unqualified Configuration Change

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in Samba could potentially impact HPE Systems
Insight Manager. These vulnerabilities could be remotely exploited using
man-in-the-middle (MITM) attacks resulting in unauthorized identification of
valid users and unqualified configuration changes.

References:

CVE-2016-2118
PSRT110143

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Systems Insight Manager (HP SIM), All versions

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2118(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE Systems Insight Manager uses Samba from the system library on the system
on which it is installed. Please update the Samba package on the operating
system to mitigate this vulnerability.

HISTORY
Version:1 (rev.1) - 7 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXVyGaAAoJEGIGBBYqRO9/NDEIAIP5fD+T4HobPyRcRGzisXaJ
551ix4Ka4zemy+1YPz6MSPShS/8u2/ACOtB5VS7oooJTwiZd8Ja03tohHh5J+Kr1
zV2YOssbQIq0/ZWqOYekeN4w5cThLfcGYSWsPE1zOos+YbR0GHQZBejTKHI3+gg6
TiIfygp0npIuNnOxMplES1QpxOwyeECWtzwLH8/PgIiCCwvGPIZFLZhV+0+O3F2p
gzS9NSa9MWjdmPgO5AHaksrzx+uKoOm2Wj67NSr0pzQiRn5nkz58iZu0oslT3WXa
LQaik8DBGvBjKLnenzigZdNSRQMVfg9Tfl9LhlQVheDzxtv/96kU2J2AdQcDNnQ=
=wyxy
-END PGP SIGNATURE-


[security bulletin] HPSBMU03584 rev.2 - HPE Network Node Manager I (NNMi), Multiple Remote Vulnerabilities

2016-06-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05103564

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05103564
Version: 2

HPSBMU03584 rev.2 - HPE Network Node Manager I (NNMi), Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-03
Last Updated: 2016-06-08

Potential Security Impact: Remote Authentication Bypass, Cross-Site Scripting
(XSS), Disclosure of Information, Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential vulnerabilities have been addressed by HPE Network Node
Manager I (NNMi). These vulnerabilities could be remotely exploited resulting
in authentication bypass, Cross-Site Scripting (XSS), disclosure of
information, or unauthorized access.

References:

  - CVE-2016-2010 - Cross-Site Scripting (XSS)
  - CVE-2016-2011 - Cross-Site Scripting (XSS)
  - CVE-2016-2012 - Remote Authentication Bypass
  - CVE-2016-2013 - Remote Disclosure of Information
  - CVE-2016-2014 - Remote Unauthorized Data Access
  - CVE-2012-6153 - Remote Disclosure of Information, Apache Commons HTTP
Client
  - CVE-2014-3577 - Remote Disclosure of Information, Apache Commons HTTP
Client
  - PSRT110087

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Network Node Manager I (NNMi) Software versions 9.20, 9.20, 9.20, 9.23,
9.24, 9.25; 10.00, and 10.01

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2010(AV:N/AC:M/Au:S/C:N/I:P/A:P)   4.9
CVE-2016-2011(AV:N/AC:M/Au:S/C:N/I:P/A:P)   4.9
CVE-2012-6153(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2014-3577(AV:N/AC:M/Au:N/C:P/I:P/A:N)   5.8
CVE-2016-2012(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
CVE-2016-2013(AV:N/AC:M/Au:S/C:P/I:N/A:N)   3.5
CVE-2016-2014(AV:N/AC:M/Au:S/C:N/I:C/A:C)   7.9
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerabilities for HPE Network Node Manager i (NNMi).

+ NNMi version 9.2x

**Note:** Requires 9.2x series patch 5 is installed.

  - Windows

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM02020463

  - Linux

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/LID/NNM920L_00022

  - HP-UX

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/LID/NNM920H_00022

  - Solaris

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM02020460

+ NNMi version 10.0x

  - Windows

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM01865498

  - Linux

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM01865484

HISTORY
Version:1 (rev.1) - 3 May 2016 Initial release
Version:2 (rev.2) - 8 June 2016 Removed Apache Commons Collections (ACC) for
handling Java object deserialization vulnerability since it has not been
addressed in this bulletin

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent