[security bulletin] HPSBHF03682 rev.1 - HPE Comware 7 Network Products using SSL/TLS, Local Gain Privileged Access

2016-11-30 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05341463

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05341463
Version: 1

HPSBHF03682 rev.1 - HPE Comware 7 Network Products using SSL/TLS, Local Gain
Privileged Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-23
Last Updated: 2016-11-23

Potential Security Impact: Local: Gain Privileged Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in the Linux kernel could potentially impact HPE
Comware 7 network products. The vulnerability could be exploited locally to
gain privileged access.

References:

  - CVE-2016-5195 - Local Gain Privileged Access, aka "Dirty COW"

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware 7 (CW7) Products All Versions - Please refer to the RESOLUTION
below for a list of impacted products.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-5195
  7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following mitigation information from H3C to resolve the
vulnerability for all Comware 7 products.

**Mitigation Information:**

Comware v7 products are potentially vulnerable because Comware v7 uses an
affected version of the Linux kernel.  However, the risk is mitigated because
Comware v7 does not provide an interface that allows access to memory. 
Customers should always ensure that only software images provided directly
from HPE are loaded on the switch.

**Notes:**

  - Comware v5 is not vulnerable to this issue.
  - HPE plans to resolve this vulnerability completely in future software
releases for Comware V7.


**COMWARE 7 Products**

  + **12500 (Comware 7) - Version: See Mitigation**
* HP Network Products
  - JC072B HP 12500 Main Processing Unit
  - JC085A HP A12518 Switch Chassis
  - JC086A HP A12508 Switch Chassis
  - JC652A HP 12508 DC Switch Chassis
  - JC653A HP 12518 DC Switch Chassis
  - JC654A HP 12504 AC Switch Chassis
  - JC655A HP 12504 DC Switch Chassis
  - JF430A HP A12518 Switch Chassis
  - JF430B HP 12518 Switch Chassis
  - JF430C HP 12518 AC Switch Chassis
  - JF431A HP A12508 Switch Chassis
  - JF431B HP 12508 Switch Chassis
  - JF431C HP 12508 AC Switch Chassis
  - JG497A HP 12500 MPU w/Comware V7 OS
  - JG782A HP FF 12508E AC Switch Chassis
  - JG783A HP FF 12508E DC Switch Chassis
  - JG784A HP FF 12518E AC Switch Chassis
  - JG785A HP FF 12518E DC Switch Chassis
  - JG802A HP FF 12500E MPU
  + **10500 (Comware 7) - Version: See Mitigation**
* HP Network Products
  - JC611A HP 10508-V Switch Chassis
  - JC612A HP 10508 Switch Chassis
  - JC613A HP 10504 Switch Chassis
  - JC748A HP 10512 Switch Chassis
  - JG608A HP FlexFabric 11908-V Switch Chassis
  - JG609A HP FlexFabric 11900 Main Processing Unit
  - JG820A HP 10504 TAA Switch Chassis
  - JG821A HP 10508 TAA Switch Chassis
  - JG822A HP 10508-V TAA Switch Chassis
  - JG823A HP 10512 TAA Switch Chassis
  - JG496A HP 10500 Type A MPU w/Comware v7 OS
  - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating
System
  - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System
Main Processing Unit
  + **12900 (Comware 7) - Version: See Mitigation**
* HP Network Products
  - JG619A HP FlexFabric 12910 Switch AC Chassis
  - JG621A HP FlexFabric 12910 Main Processing Unit
  - JG632A HP FlexFabric 12916 Switch AC Chassis
  - JG634A HP FlexFabric 12916 Main Processing Unit
  - JH104A HP FlexFabric 12900E Main Processing Unit
  - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
  - JH263A HP FlexFabric 12904E Main Processing Unit
  - JH255A HP FlexFabric 12908E Switch Chassis
  - JH262A HP FlexFabric 12904E Switch Chassis
  - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
  - JH103A HP FlexFabric 12916E Switch Chassis
  + **5900 (Comware 7) - Version: See Mitigation**
* HP Network Products
  - JC772A HP 5900AF-48XG-4QSFP+ Switch
  - JG296A HP 5920AF-24XG Switch
  - JG336A HP 5900AF-48XGT-4QSFP+ Switch
  - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
  - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
  - JG555A HP 5920AF-24XG TAA Switch
  - JG838A HP FF 5900CP-48XG-4QSFP+ Switch
  - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
  - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
  

[security bulletin] HPSBHF03673 rev.1 - HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Multiple Remote Vulnerabilities

2016-11-23 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05336888

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05336888
Version: 1

HPSBHF03673 rev.1 - HPE Comware 5 and Comware 7 Network Products using
SSL/TLS, Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-18
Last Updated: 2016-11-18

Potential Security Impact: Remote: Multiple Vulnerabilities

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in MD5 message digest algorithm and RC4 ciphersuite
could potentially impact HPE Comware 5 and Comware 7 network products using
SSL/TLS. These vulnerabilities could be exploited remotely to conduct
spoofing attacks and plaintext recovery attacks resulting in disclosure of
information.

References:

  - CVE-2004-2761 - MD5 Hash Collision Vulnerability
  - CVE-2013-2566 - SSL/TLS RC4 algorithm vulnerability
  - CVE-2015-2808 - SSL/TLS RC4 stream vulnerability known as "Bar Mitzvah"

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware 5 (CW5) Products All versions
  - Comware 7 (CW7) Products All versions

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2004-2761
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVE-2013-2566
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2015-2808
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has released the following mitigation information to resolve the
vulnerabilities in HPE Comware 5 and Comware 7 network products.

  *Note:* Please contact HPE Technical Support for any assistance configuring
the recommended settings.

**Mitigation for the hash collision vulnerability in the MD5 Algorithm:**

  + For Comware V7, this issue only exists when the key-type is RSA and the
public key length less than 1024 bits.
Since the default length of the RSA key is 1024 bits, the length should
only have to be set manually if necessary.

  Example command to set the RSA key length to 1024 bits:
  
  public-key rsa general name xxx length 1024

  + For Comware V5, this issue only exists when the key-type is RSA.
HPE recommends using DSA and ECDSA keys and not an RSA key.

**Mitigation for the RC4 vulnerabilities:**
  
  HPE recommends disabling RC2 and RC4 ciphers.
  
  + For Comware V7, remove the RC2/RC4 ciphers:

- exp_rsa_rc2_md5
- exp_rsa_rc4_md5
- rsa_rc4_128_md5
- rsa_rc4_128_sha

  Example using the *ssl server-policy “name” ciphersuite* command to
omit the RC2/RC4 ciphers:

ssl server-policy “name” ciphersuite { dhe_rsa_aes_128_cbc_sha |
dhe_rsa_aes_256_cbc_sha | exp_rsa_des_cbc_sha | rsa_3des_ede_cbc_sha |
rsa_aes_128_cbc_sha | rsa_aes_256_cbc_sha | rsa_des_cbc_sha }

  Example using the *ssl client-policy “name” prefer-cipher* command
to omit the RC2/RC4 ciphers:  

ssl client-policy “name” prefer-cipher { dhe_rsa_aes_128_cbc_sha
| dhe_rsa_aes_256_cbc_sha | exp_rsa_des_cbc_sha | rsa_3des_ede_cbc_sha |
rsa_aes_128_cbc_sha | rsa_aes_256_cbc_sha | rsa_des_cbc_sha }


  + For Comware V5, remove the following RC4 ciphers:

- rsa_rc4_128_md5
- rsa_rc4_128_sha

  Example using the *ssl server-policy “name” ciphersuite* command to
omit the RC4 ciphers:

ssl server-policy “name” ciphersuite { rsa_3des_ede_cbc_sha |
rsa_aes_128_cbc_sha | rsa_aes_256_cbc_sha| rsa_des_cbc_sha }

  Example using the *ssl client-policy “name” prefer-cipher* command
to omit the RC4 ciphers:  

ssl client-policy “name” prefer-cipher { rsa_3des_ede_cbc_sha |
rsa_aes_128_cbc_sha |rsa_aes_256_cbc_sha | rsa_des_cbc_sha }


**COMWARE 5 Products**

  + **HSR6602 (Comware 5) - Version: See Mitigation**
* HP Network Products
  - JC176A HP 6602 Router Chassis
  - JG353A HP HSR6602-G Router
  - JG354A HP HSR6602-XG Router
  - JG355A HP 6600 MCP-X1 Router Main Processing Unit
  - JG356A HP 6600 MCP-X2 Router Main Processing Unit
  - JG776A HP HSR6602-G TAA-compliant Router
  - JG777A HP HSR6602-XG TAA-compliant Router
  - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
  + **HSR6800 (Comware 5) - Version: See Mitigation**
* HP Network Products
  - JG361A HP HSR6802 Router Chassis
  - JG361B HP HSR6802 Router Chassis
  - JG362A HP HSR6804 Router Chassis
  - JG362B HP HSR6804 

[security bulletin] HPSBHF03675 rev.1 - HPE Integrated Lights-Out 3 and 4 (iLO 3, iLO 4), Cross-Site Scripting (XSS)

2016-11-21 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05337025

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05337025
Version: 1

HPSBHF03675 rev.1 - HPE Integrated Lights-Out 3 and 4 (iLO 3, iLO 4),
Cross-Site Scripting (XSS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-18
Last Updated: 2016-11-18

Potential Security Impact: Remote: Cross-Site Scripting (XSS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability was addressed by HPE Integrated Lights-Out
3 and 4. The vulnerability could be remotely exploited to allow Cross-Site
Scripting (XSS).

References:

  - CVE-2016-4406 - Cross-Site Scripting (XSS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Integrated Lights-Out 3 (iLO 3) all version prior to v1.88
  - HPE Integrated Lights-Out 4 (iLO 4) all versions prior to v2.44

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4406
  6.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Nicodemo @nijagaw Gawronski of Sec-1 Ltd.
for reporting this vulnerability to security-al...@hpe.com

RESOLUTION

HPE has made the following firmware updates available to resolve the
vulnerability in iLO 3 and iLO 4: 

* For iLO3, please upgrade to firmware v1.88  
* For iLO4, please upgrade to firmware v2.44

The firmware updates are available at the following location:


HISTORY
Version:1 (rev.1) - 18 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYL3bfAAoJELXhAxt7SZai1aoIAL92bSUY9rAquo/xSzM8cy0P
dwZuK8ibyor4yVDVhViA6UAvhsjhDpOSlN+akkpod+8uTZ7q8n4saUbmkwxPU1HP
h8GD9OwrMqlP4FM0xjL2Fp5B/yNX3k4LzPFUUhuqUxENm75ZdnXebY0rmb2psk51
y3J8Svy+XwObtduuY/GZaQyvp7Hj6X6e1etkbKD6omRTQL5GmEiW73lXnNTYfIHI
4RMjPt9SvsyTfNPTQIWPv/6G6yJrYtpvBbfml+ljnCpbEK2GQQxzo7PzNszJFhfk
QNnZA/P7qX2aMWtfh2PRVsk/3YWtdnZQtWazXXz/yywDzN/N0IIUhRtd/ETqaAQ=
=Oh1l
-END PGP SIGNATURE-


[security bulletin] HPSBGN03676 rev.1 - HPE Helion OpenStack Glance Image Service, Remote Denial of Service (DoS)

2016-11-17 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c0584

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c0584
Version: 1

HPSBGN03676 rev.1 - HPE Helion OpenStack Glance Image Service, Remote Denial
of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-15
Last Updated: 2016-11-15

Potential Security Impact: Remote: Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HPE Helion
OpenStack Glance image service. This vulnerability could be exploited
remotely to allow a Denial of Service (DoS).

References:

  - CVE-2016-8611 - OpenStack Glance image service, Remote Denial of Service
(DoS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Helion OpenStack all
  - HPE Helion OpenStack all

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-8611
  4.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following mitigations to resolve this issue: 
 
 * Deploy rate-limiting proxies or web application firewalls

   + For all versions of Glance which expose either the v1 or the v2 /images
API, operators are recommended to deploy external rate-limiting proxies or
web application firewalls. This will provide a front-end layer of protection
to Glance. The Glance database should be monitored for abnormal growth.
Although rate-limiting does not eliminate this vulnerability, it will slow it
to the point where operators can react prior to a Denial of Service
occurring. 
 
 
 * Restrict image creation to the admin role
  
  + Another possible mitigation is to restrict image creation to the admin
role. This should only be done when there are Glance nodes dedicated to
end-user access only. 
 
   + For further recommendations on external rate limiting and restricting
image creation, please refer to the Open Stack Security Notice OSSN-0076 -


HISTORY
Version:1 (rev.1) - 15 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYK4WuAAoJELXhAxt7SZailGsH/ju9sm2EXCgblsZ7nD2gqTPO
jubEcgiJa3oh6zTYMFHmpm0/+/7mwHC4URnpPO0WvfGIkCToBJ3sLuep5OtWTCPN
jzBypV5dXHPEeoEbXaZe2YFsa2pSB8eY47c6twCXxXNMfN82bBv8/Z81eSrVkKuy

[security bulletin] HPSBST03671 rev.1 - HPE StoreEver MSL6480 Tape Library, Remote Unauthorized Disclosure of Information

2016-11-15 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05333297

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05333297
Version: 1

HPSBST03671 rev.1 - HPE StoreEver MSL6480 Tape Library, Remote Unauthorized
Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-15
Last Updated: 2016-11-15

Potential Security Impact: Remote: Unauthorized Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in PHP was addressed by the HPE StoreEver MSL6480
Tape Library firmware version 5.10. The vulnerability could be exploited
remotely to allow Unauthorized Disclosure of Information.

References:

  - CVE-2016-5385 - PHP, HTTPoxy

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP StoreEver MSL6480 Tape Library prior to 5.10

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-5385
  8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided resolution of this vulnerability in the HPE StoreEver
MSL6480 Tape Library firmware version 5.10:

 *


HISTORY
Version:1 (rev.1) - 15 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYKzneAAoJELXhAxt7SZaieTYH/i1ECx7sLaQ47GplWgEw12ZR
6BE9X1qtsEXmhUmCE4SEBAsiU4BeReK5oWZQe9lQvk/gb37bZND9JaZRP98fJQjH
T5s3uIT185Aojd6NFBrZob8kl0aRVy4w1RZKmt/4khsWp8zF/LQoogoROxlRGDS4
2gl7r81Hy4Fh8FeM5lDFF6QitxpZlGlE8pFwxPf1VDVGCLSDLc9/bDCwYCLlRZvP
VWPmsUtj/L8QId1aURIPiYvo99bxiQfZq1QZqHz6J+k0Csr55wt6TyVBF681vQfy
tcPpUVgqAK2QF6+dYIWwPtyKvGwLMd+SK8tfYsu/RQIzlEcODW5FxmQGuLOF96w=
=W5yx
-END PGP SIGNATURE-


[security bulletin] HPSBUX03665 rev.2 - HP-UX Tomcat-based Servlet Engine, Remote Denial of Service (DoS) and URL Redirection

2016-11-14 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05324759

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05324759
Version: 2

HPSBUX03665 rev.2 - HP-UX Tomcat-based Servlet Engine, Remote Denial of
Service (DoS) and URL Redirection

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-09
Last Updated: 2016-11-08

Potential Security Impact: Remote: Denial of Service (DoS), URL Redirection

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in the HP-UX
Tomcat-based Servlet Engine. These vulnerabilities could be exploited
remotely to create a Denial of Service (DoS) and URL Redirection.

References:

  - PSRT110272
  - CVE-2016-3092 - Remote denial of Service (DoS)
  - CVE-2016-5388 - Remote URL Redirection
  - PSRT110255

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP-UX Tomcat-based Servlet v.7.x Engine B.11.31 - Tomcat 7 prior to
D.7.0.70.01

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-3092
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVE-2016-5388
  8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software update to resolve the vulnerabilities
in HP-UX Apache Tomcat 7 Servlet Engine:

 * Tomcat 7.0.70.01 for HP-UX Release B.11.31 (IPF and PA-RISC)

+ 64 bit Depot: HP_UX_11.31_HPUXWS24ATW-B501-11-31-64.depot
+ 32 bit Depot: HP_UX_11.31_HPUXWS24ATW-B501-11-31-32.depot

* **Note:** The depot file can be found here:

+


**MANUAL ACTIONS: Yes - Update**

Download and install the software update

**PRODUCT SPECIFIC INFORMATION**

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HPE and lists recommended actions that may apply to a specific
HP-UX system. It can also download patches and create a depot automatically.
For more information see:
 
  *


The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31 IA/PA
===  
hpuxws22TOMCAT.TOMCAT
hpuxws22TOMCAT.TOMCAT2
action: install revision D.7.0.70.01 or subsequent

END AFFECTED VERSIONS

HISTORY

Version:1 (rev.1) - 4 November 2016 Initial release

Version:2 (rev.2) - 8 November 2016 Removed extraneous text from background
section


Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without 

[security bulletin] HPSBGN03669 rev.1 - HPE SiteScope, Local Elevation of Privilege, Remote Denial of Service, Arbitrary Code Execution and Cross-Site Request Forgery

2016-11-14 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05324755

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05324755
Version: 1

HPSBGN03669 rev.1 - HPE SiteScope, Local Elevation of Privilege, Remote
Denial of Service, Arbitrary Code Execution and Cross-Site Request Forgery

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-04
Last Updated: 2016-11-04

Potential Security Impact: Local: Elevation of Privilege; Remote: Arbitrary
Code Execution, Cross-Site Request Forgery (CSRF), Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential vulnerabilities have been identified in HPE SiteScope. The
vulnerabilities could be exploited to allow local elevation of privilege and
exploited remotely to allow denial of service, arbitrary code execution,
cross-site request forgery.

References:

  - CVE-2014-0114 - Apache Struts, execution of arbitrary code
  - CVE-2016-0763 - Apache Tomcat, denial of service (DoS)
  - CVE-2014-0107 - Apache XML Xalan, bypass expected restrictions 
  - CVE-2015-3253 - Apache Groovy, execution of arbitrary code 
  - CVE-2015-5652 - Python, elevation of privilege
  - CVE-2013-6429 - Spring Framework, cross-site request forgery
  - CVE-2014-0050 - Apache Commons FileUpload, denial of service (DoS)
  - PSRT110264

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP SiteScope Monitors Software Series 11.2x−11.32IP1

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2013-6429
  6.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2014-0050
  8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2014-0107
  8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2014-0114
  6.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2015-3253
  7.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2015-5652
  8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVE-2016-0763
  6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
  6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided a resolution via an update to HPE SiteScope. Details on the
update and each vulnerability are in the KM articles below.

  **Note:** The resolution for each vulnerability listed is to upgrade to
SiteScope 11.32IP2 or an even more recent version of SiteScope if available.
The SiteScope update can be can found in the personal zone in "my updates" in
HPE Software Support Online: .


  * Apache Commons FileUpload: KM02550251 (CVE-2014-0050): 

+



  * Apache Struts: KM02553983 (CVE-2014-0114):

+



  * Apache Tomcat: KM02553990 (CVE-2016-0763):

+


  * Apache XML Xalan: KM02553991 (CVE-2014-0107):

+


  * Apache Groovy: KM02553992 (CVE-2015-3253):

+


  * Python: KM02553997 (CVE-2015-5652):

*


  * Spring Framework: KM02553998 (CVE-2013-6429):

+


HISTORY
Version:1 (rev.1) - 4 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com


[security bulletin] HPSBGN03670 rev.1 - HPE Business Service Management (BSM) using Java Deserialization, Remote Code Execution

2016-11-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05327447

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05327447
Version: 1

HPSBGN03670 rev.1 - HPE Business Service Management (BSM) using Java
Deserialization, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-08
Last Updated: 2016-11-08

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in the Apache Commons Collections library for handling Java
object deserialization was addressed by HPE Business Service Management
(BSM). The vulnerability could be exploited remotely to allow remote code
execution.

References:

  - CVE-2016-4405 - Apache Commons Collections, VU#576313
  - PSRT110265

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Business Service Management Software v9.20-v9.26

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4405
  6.4 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L
  7.5 (AV:N/AC:M/Au:S/C:P/I:C/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following updates available to resolve the vulnerability for
the impacted versions of HPE Business Service Management (BSM):


 * Upgrade to BSM v9.26IP1 or a more recent version -


HISTORY
Version:1 (rev.1) - 8 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYIf/KAAoJELXhAxt7SZaiAFgH/0BSIc1kIf+i7/H+hGoMADnp
YERbimLYMuwg8CIoDGfuG7UdrcXnwaTmlQXJPkLL2GZngNT901h2kcgN2ZLD8oK6
7tERdkdV4zYzY7wF1K4fPMGVewXaOJ/tOziBoQRuI0/iZqfbaC/QwNsr37vruuRB
Lt4neOYU4TARgCltK6F04iBWY/faBrpiGj0ugMbwhZUzldbTookLUt+DQCelrbGw
EduMzM3pFPKHCu1pwrxAugUBCzWJjAw9A6JhbnHOWq4ZR7UKeA5+WeNRtPe0/3a8
7I5d05qtD3q/T4j8iiTnIIWoFAnf/PDGdCHUVDBOz1Z/aUO8QLIXAuXhPCeSNV8=
=IulN
-END PGP SIGNATURE-


[security bulletin] HPSBGN03643 rev.1 - HPE KeyView using Filter SDK, Remote Code Execution

2016-11-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05325836

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05325836
Version: 1

HPSBGN03643 rev.1 -  HPE KeyView using Filter SDK, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-04
Last Updated: 2016-11-04

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in the Filter SDK
component of HPE KeyView. These vulnerabilities could be exploited remotely
to allow code execution.

References:

  - CVE-2016-4402 - Buffer Overflow
  - CVE-2016-4403 - Memory Corruption
  - CVE-2016-4404 - Memory Allocation issue
  - PSRT110140

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE KeyView v10.25 and earlier  - Keyview Filter SDK

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4402
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-4403
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-4404
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Andrew Brooks of Imanage.com for reporting
these vulnerabilities to security-al...@hpe.com

RESOLUTION

HPE has made the following updates available to resolve the vulnerabilities
in the impacted versions of HPE KeyView.

Please install HPE KeyView v11.2 from the following location:


HISTORY
Version:1 (rev.1) - 4 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYHO7wAAoJELXhAxt7SZai+EIIAL1g5NIsNtmRdeYoCJtrOylt
FUvo4toRNpUE8LNw6zhRxkucYlaW91nOQjTBudUUxY44TAOSzieW4dtn4B897CHQ
1cJHplKSqerRbE4Q+K5fiPCF7l3jq1Hz9Fp+QIaqUiYqoojgyR3IBYt5pXZYJuI/
QLSPeD3QK7nMLjxoX5OCjsNauNxz+QQmkSuTXXLVh9ajVZ2nOu3esnLpqZbqEpkh
sDULiVLUHwBOAxhUX/WEuyYAkwwK9Qi8MjTktIlQx2m6k8kNJmk99qnYaE88bQb7
YPQLWx6rJoGD+9YmoGtcOsstDU6Qomd7kbT8Rkb/rxfsY8+TNhZzrcIve7CH9uQ=
=uHsu
-END PGP SIGNATURE-


[security bulletin] HPSBGN03656 rev.1 - HPE Network Node Manager i (NNMi) Software using Java Deserialization, Remote Arbitrary Code Execution and Cross-Site Scripting

2016-11-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05325823

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05325823
Version: 1

HPSBGN03656 rev.1 - HPE Network Node Manager i (NNMi) Software using Java
Deserialization, Remote Arbitrary Code Execution and Cross-Site Scripting

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-04
Last Updated: 2016-11-04

Potential Security Impact: Remote: Arbitrary Code Execution, Cross-Site
Scripting (XSS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Several vulnerabilities are addressed in this security bulletin: 
 
  * Potential security vulnerabilities were identified in HPE Network Node
Manager i (NNMi) Software. The vulnerability could result in cross-site
scripting (XSS).

  * A vulnerability in Apache Commons Collections for handling Java object
deserialization was addressed by HPE Network Node Manager i (NNMi) Software.
The vulnerability could be remotely exploited to allow remote code execution.

References:

  - CVE-2016-4398 - Remote Code Execution, VU#576313
  - CVE-2016-4399 - XSS
  - CVE-2016-4400 - XSS
  - PSRT110235

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Network Node Manager I (NNMi) Software 10.00, 10.01 (patch1), 10.01
(patch 2), 10.10

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4398
  8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVE-2016-4399
  4.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
  6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVE-2016-4400
  4.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
  6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following product updates to resolve the vulnerabilities
HPE Network Node Manager i (NNMi) Software:

 * Network Node Manager i 10.00:
 
  + Linux:

  + Windows:


* Network Node Manager i 10.10:
 
  + Linux:

  + Windows:


HISTORY
Version:1 (rev.1) - 4 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be 

[security bulletin] HPSBGN03657 rev.1 - HPE Network Node Manager i (NNMi) Software, Local Code Execution

2016-11-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05325811

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05325811
Version: 1

HPSBGN03657 rev.1 - HPE Network Node Manager i (NNMi) Software, Local Code
Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-04
Last Updated: 2016-11-04

Potential Security Impact: Local: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability was identified in HPE Network Node Manager
i (NNMi) Software. The vulnerability could result in local code execution.

References:

  - CVE-2016-4397 - local execution of code
  - PSRT110236

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Network Node Manager I (NNMi) Software 10.00, 10.10, 10.20

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4397
  4.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
  4.3 (AV:L/AC:L/Au:S/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following product updates to resolve the vulnerability
in HPE Network Node Manager i (NNMi) Software:

* Network Node Manager i 10.00:

  + Windows:


* Network Node Manager i 10.10:

  +


* Network Node Manager i 10.20:
 
  +


  *NOTE:* Users should run changeUser.ovpl after the patches have been
applied.

HISTORY
Version:1 (rev.1) - 4 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYHMlSAAoJELXhAxt7SZaimVQIAJ3vJ6aeUZpEaxWt8ttj/1p6
roI+0giZQgRi5d9II3+Ma+rHk9mnCXp+wQEoMXNF7Fn7GJxS2SRe95znBC1zJ5tM
/oKlhhMZKRlKNiHEty30C71QVbxvVOm/R+VeW+qDuMl5HVBne0+TxeOr3adwXjYg
OFw5W3v1a6K4D4evQQ62ysPlJ35+e8rIXZwTreBgW57Fn8EG/lUqigg+zHWZM/vA
eni7AzYe15OeN3H2/znTiZPQ8yi6DcQ1rrqDN3wYGn6kLEEWM960bJ02jdPHArcl
t/cGZa43xui0yEFtYDJY5e3HHZry6ZTLYaZKbh7bX+ysTNWt4pGZLInZi9k51TA=
=XiVl
-END PGP SIGNATURE-


[security bulletin] HPSBUX03665 rev.1 - HP-UX Tomcat-based Servlet Engine, Remote Denial of Service (DoS) and URL Redirection

2016-11-07 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05324759

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05324759
Version: 1

HPSBUX03665 rev.1 - HP-UX Tomcat-based Servlet Engine, Remote Denial of
Service (DoS) and URL Redirection

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-04
Last Updated: 2016-11-04

Potential Security Impact: Remote: Denial of Service (DoS), URL Redirection

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in the HP-UX
Tomcat-based Servlet Engine. These vulnerabilities could be exploited
remotely to create a Denial of Service (DoS) and URL Redirection.

References:

  - CVE-2016-3092 - Remote denial of Service (DoS)
  - CVE-2016-5388 - Remote URL Redirection
  - PSRT110255

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP-UX Tomcat-based Servlet v.7.x Engine B.11.31 - Tomcat 7 prior to
D.7.0.70.01

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-3092
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVE-2016-5388
  8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Working on publishing today.

RESOLUTION

HPE has provided the following software update to resolve the vulnerabilities
in HP-UX Apache Tomcat 7 Servlet Engine:

 * Tomcat 7.0.70.01 for HP-UX Release B.11.31 (IPF and PA-RISC)

+ 64 bit Depot: HP_UX_11.31_HPUXWS24ATW-B501-11-31-64.depot
+ 32 bit Depot: HP_UX_11.31_HPUXWS24ATW-B501-11-31-32.depot

* **Note:** The depot file can be found here:

+


**MANUAL ACTIONS: Yes - Update**

Download and install the software update

**PRODUCT SPECIFIC INFORMATION**

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HPE and lists recommended actions that may apply to a specific
HP-UX system. It can also download patches and create a depot automatically.
For more information see:
 
  *


The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31 IA/PA
===  
hpuxws22TOMCAT.TOMCAT
hpuxws22TOMCAT.TOMCAT2
action: install revision D.7.0.70.01 or subsequent

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 4 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard 

[security bulletin] HPSBUX03664 SSRT110248 rev.1 - HP-UX BIND Service running named, Remote Denial of Service (DoS)

2016-11-03 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05321107

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05321107
Version: 1

HPSBUX03664 SSRT110248 rev.1 - HP-UX BIND Service running named, Remote
Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-10-28
Last Updated: 2016-10-28

Potential Security Impact: Remote: Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in the HP-UX BIND
service running named. These vulnerabilities could be exploited remotely to
create a Denial of Service (DoS).

References:

  - CVE-2016-2775 - BIND, Denial of Service, PSRT110248 
  - CVE-2016-2776 - BIND, Denial of Service

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP-UX BIND B.11.31 - BIND 9.9.4 prior to C.9.9.4.8.0

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-2775
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2016-2776
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software updates to resolve the vulnerability
in the HP-UX BIND service running named:  

   * BIND 9.9.4 for HP-UX Release B.11.31 (PA and IA)
   + Depot: HP_UX_11.31_HPUX-NameServer_C.9.9.4.8.0_HP-UX_B.11.31_IA_PA.depot
   
**Note:** The depot files can be found here: 

  *


**MANUAL ACTIONS:** Yes - Update 

Download and install the software update 

**PRODUCT SPECIFIC INFORMATION** 

**HP-UX Software Assistant:** HP-UX Software Assistant is an enhanced
application 
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins 
issued by HPE and lists recommended actions that may apply to a specific
HP-UX 
system. It can also download patches and create a depot automatically. For
more information see: 



The following text is for use by the HP-UX Software Assistant. 

AFFECTED VERSIONS

HP-UX B.11.31 IA/PA 
===
NameService.BIND-AUX 
NameService.BIND-RUN
action: install C.9.9.4.8.0 or subsequent

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 29 October 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of 

[security bulletin] HPSBMU03653 rev.1 - HPE System Management Homepage (SMH), Remote Arbitrary Code Execution, Cross-Site Scripting (XSS), Denial of Service (DoS), Unauthorized Disclosure of Informat

2016-10-28 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05320149

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05320149
Version: 1

HPSBMU03653 rev.1 -  HPE System Management Homepage (SMH), Remote Arbitrary
Code Execution, Cross-Site Scripting (XSS), Denial of Service (DoS),
Unauthorized Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-10-26
Last Updated: 2016-10-26

Potential Security Impact: Remote: Arbitrary Code Execution, Cross-Site
Scripting (XSS), Denial of Service (DoS), Unauthorized Disclosure of
Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
System Management Homepage (SMH) on Windows and Linux. The vulnerabilities
could be remotely exploited using man-in-the-middle (MITM) attacks resulting
in cross-site scripting (XSS), arbitrary code execution, Denial of Service
(DoS), and/or unauthorized disclosure of information.

References:

  - CVE-2016-2107 - OpenSSL, Unauthorized disclosure of information
  - CVE-2016-2106 - OpenSSL, Denial of Service (DoS)
  - CVE-2016-2109 - OpenSSL, Denial of Service (DoS)
  - CVE-2016-2105 - OpenSSL, Denial of Service (DoS)
  - CVE-2016-3739 - cURL and libcurl, Remote code execution
  - CVE-2016-5388 - "HTTPoxy", Apache Tomcat
  - CVE-2016-5387 - "HTTPoxy", Apache HTTP Server
  - CVE-2016-5385 - "HTTPoxy", PHP 
  - CVE-2016-4543 - PHP, multiple impact
  - CVE-2016-4071 - PHP, multiple impact
  - CVE-2016-4072 - PHP, multiple impact
  - CVE-2016-4542 - PHP, multiple impact
  - CVE-2016-4541 - PHP, multiple impact
  - CVE-2016-4540 - PHP, multiple impact
  - CVE-2016-4539 - PHP, multiple impact
  - CVE-2016-4538 - PHP, multiple impact
  - CVE-2016-4537 - PHP, multiple impact
  - CVE-2016-4343 - PHP, multiple impact
  - CVE-2016-4342 - PHP, multiple impact
  - CVE-2016-4070 - PHP, Denial of Service (DoS)
  - CVE-2016-4393 - PSRT110263, XSS vulnerability
  - CVE-2016-4394 - PSRT110263, HSTS vulnerability
  - CVE-2016-4395 - ZDI-CAN-3722, PSRT110115, Buffer Overflow
  - CVE-2016-4396 - ZDI-CAN-3730, PSRT110116, Buffer Overflow
  - PSRT110145
  - PSRT110263
  - PSRT110115
  - PSRT110116

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE System Management Homepage - all versions prior to v7.6

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-2105
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-2106
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-2107
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVE-2016-2109
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVE-2016-3739
  5.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
  2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)

CVE-2016-4070
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-4071
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-4072
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-4342
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  8.3 (AV:N/AC:M/Au:N/C:P/I:P/A:C)

CVE-2016-4343
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2016-4393
  4.2 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
  4.9 (AV:N/AC:M/Au:S/C:P/I:P/A:N)

CVE-2016-4394
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)

CVE-2016-4395
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)

CVE-2016-4396
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)

CVE-2016-4537
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-4538
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-4539
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-4540
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-4541
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-4542
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-4543
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  

[security bulletin] HPSBHF3549 ThinkPwn UEFI BIOS SmmRuntime Escalation of Privilege

2016-10-28 Thread HP Security Alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05239646

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05239646
Version: 1

HPSBHF3549 ThinkPwn UEFI BIOS SmmRuntime Escalation of Privilege

NOTICE: The information in this Security Bulletin should be acted upon as soon
as possible.

Release Date: 2016-08-17
Last Updated: 2016-08-25

Potential Security Impact: System downtime, or privilege escalation.

Source: HP, HP Product Security Response Team (PSRT)

VULNERABILITY SUMMARY

A security vulnerability identified with UEFI firmware, dubbed ThinkPwn, has
been addressed in certain HP commercial notebook PCs and HP consumer notebook
PCs. The vulnerability could be exploited to run arbitrary code in System
Management Mode, resulting in elevation of privilege or denial of service.

References: CVE TBD PSR-2016-0068

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

See impacted products listed in the Resolution section of this document.

BACKGROUND

For a PGP signed version of this security bulletin please write to:
hp-security-al...@hp.com

CVSS 2.0 Base Metrics

  Reference  Base Vector  Base Score

CVE-TBD  Temp (AV:N/AC:H/Au:S/C:C/I:C/A:C)Temp 7.1

Information on CVSS is documented in HP Customer Notice: HPSN2008002.

RESOLUTION

HP has provided firmware updates to address the vulnerability for HP PCs with
UEFI Firmware.

To acquire the firmware updates, go to hp.com and complete the following steps:

 1. On hp.com, select Support and then select Download Drivers.

 2. Enter your product name or number in the Find my product field.

 3. Choose the product from the returned search results.

 4. Choose the operating system.

 5. Under the Download Index, select BIOS, and download the BIOS version as
listed in the table below.

 6. Follow the installation instructions to install the firmware update.

HP Commercial Notebook PC, Mobile Thin Client and  BIOS   HP SoftPaq
   Tablet Model  VersionNumber

HP EliteBook 725 G2 Notebook PC 01.42   sp76950

HP EliteBook 745 G2 Notebook PC 01.42   sp76950

HP EliteBook 755 G2 Notebook PC 01.42   sp76950

HP mt41 Mobile Thin Client  01.41   sp76955

HP ProBook 4435s Notebook PCF.63sp76954

HP ProBook 4436s Notebook PCF.63sp76954

HP ProBook 4445s Notebook PCF.64sp76961

HP ProBook 4446s Notebook PCF.64sp76961

HP ProBook 445 G1 Notebook PC   F.64sp76956

HP ProBook 445 G2 Notebook PC   01.41   sp76953

HP ProBook 4535s Notebook PCF.63sp76954

HP ProBook 4545s Notebook PCF.64sp76961

HP ProBook 455 G1 Notebook PC   F.64sp76956

HP ProBook 455 G2 Notebook PC   01.41   sp76953

HP ProBook 645 G1 Notebook PC   01.41   sp76945

HP ProBook 6465b Notebook PCF.63sp76967

HP ProBook 6475b Notebook PCF.65sp76962

HP ProBook 655 G1 Notebook PC   01.41   sp76945

HP ProBook 6565b Notebook PCF.63sp76967

  HP Consumer and SMB Notebooks   BIOS   HP SoftPaq
VersionNumber

HP Pavilion 13-p100 thru 13-p199 x2 (AMD)  F.0Asp76822

HP Pavilion 13z-p100 x2 (AMD)  F.0Asp76822

HP Pavilion 14-a000 thru 14-a099 (Intel)   F.27sp76846

HP Pavilion 14-e000 thru 14-e199 (Intel)   F.27sp76846

HP Pavilion 14-f000 thru 14-f099 Sleekbook (AMD)   F.0Bsp76823

HP Pavilion 14-n000 thru 199 (Intel)   F.70sp76803

HP Pavilion 14-n200 thru 299 (Intel)   F.70sp76803

HP Pavilion 14t-a000 (Intel)   F.27sp76846

HP Pavilion 14t-e100 (Intel)   F.27sp76846

HP Pavilion 14t-n100 (Intel)   F.70sp76803

HP Pavilion 14t-n200 (Intel)   F.70sp76803

HP Pavilion 14z-f000 Sleekbook (AMD)   F.0Bsp76823

HP Pavilion 15-e000 thru 15-e099 (Intel)   F.27sp76846

HP Pavilion 15-e100 thru 15-e199 (Intel)   F.27sp76846

HP Pavilion 15-n000 thru 199 (Intel)   F.70sp76803

HP Pavilion 15-n200 thru 299 (Intel)   F.70sp76803

HP Pavilion 15t-e000 (Intel)   F.27sp76846

HP Pavilion 15t-e100 

[security bulletin] HPSBGN03663 rev.1 - HPE ArcSight WINC Connector, Remote Code Execution

2016-10-20 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05313743

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05313743
Version: 1

HPSBGN03663 rev.1 - HPE ArcSight WINC Connector, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-10-19
Last Updated: 2016-10-19

Potential Security Impact: Remote Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerability has been identified in ArcSight WINC
Connector. The vulnerability could be exploited remotely to allow code
execution.

References:

CVE-2016-4391
PSRT110232

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
ArcSight WINC Connector - all versions prior to v7.3.0

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4391
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett-Packard Enterprise thanks Lukasz Plonka for reporting this issue to
security-al...@hpe.com

RESOLUTION

HPE recommends upgrading to the version listed below to resolve the
vulnerabilities in impacted versions of ArcSight WINC Connector:

ArcSight WINC Connector v7.3.0

The update can be downloaded from: https://softwaresupport.hpe.com/

HISTORY
Version:1 (rev.1) - 19 October 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJYB5fVAAoJEGIGBBYqRO9/W0IH/0QYWDk2B7BOzL3n+D5rVX0b
hnGinAjrctKX40Z9H/uxdkv3ahotWotGkZMeZJS5yZx5npQ3mgY3MBEV6MMrRQEr
EiE6UgSWL3vD9AoEwFCbskN0sh34TrO8gYpITPd5gAzbX3gNm/uaAeUB96Go8QDo
k7eciCPrL6djyc5j+HyI0ZxPlU/CVgbOrC3yg9qOeN3jLnwcR/YnBTxEaUzxxBHR
U9He9vzOEoHDmHWJaNwyGZiYhxho+vWGkT4vFSAfgIVdDwWG1/YP3Gr8AG6JntYy
MiG9zmByu8DW6fdgJZ1IfZPH2/izkIjnVwrE4lkx5oFWrhTFvXQk6gvhmE0Lj5A=
=Yncn
-END PGP SIGNATURE-


[security bulletin] HPSBNS03661 rev.1 - NonStop Backbox, Remote Disclosure of Information

2016-10-13 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05307589

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05307589
Version: 1

HPSBNS03661 rev.1 - NonStop Backbox, Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-10-12
Last Updated: 2016-10-12

Potential Security Impact: Remote Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in OpenSSL was addressed by NonStop Backbox. The
vulnerability could be exploited resulting in remote disclosure of
information.

References:

CVE-2016-0800
PSRT110241

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
NonStop BackBox (BackPak/VTC) T0954V04, T0954V04^AAA, T0954V04^AAB

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-0800
  3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following mitigation instructions to address this
vulnerability:

For instructions on best practices and disabling SSLv2 on BackpPak or VTC,
see NonStop Hotstuff HS03328.

Do not use SSLv2 or share private keys with systems that use SSLv2.

Confirm that SSLv2 is disabled in the Nonstop-based BackPak component.

Disable SSLv2 if not already disabled on the Windows-based VTC server (SSLv2
is enabled by default in the versions listed above)

HISTORY
Version:1 (rev.1) - 12 October 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJX/oUyAAoJEGIGBBYqRO9/JLcH+wQL/KDhMvOVrWcSGI5/7Guk
IyEHxmm+Q7XWi5KQy8vnpIgwmUbmnvvnUhihiywL82zlwnho+KVel+NV+Eo9MP9y
0ThO1vxu8qhKYaXyOOAoM01a6UN89aMKeeET3OaeorNJ5K0yDadj3Pemz8GImyQJ
QxGDJBX/zjx4RczTT4Ly0mFN01yzp+wvX8jnahkwjrGUPkmwrC2TDUwByKEwq/g9
5EbZRPD0EvuE3O3bhbFosi3Iq1If63ABlZNGoH3WjSVpYF9IShqcHqO/NWFqr51F
+p3OqR7dGu/ywVvwSin0Zv0opuMygxUlelGw5IEfKnhNGAG81cTntuqwGxHYeuo=
=lx5X
-END PGP SIGNATURE-


[security bulletin] HPSBPV03516 rev.2 - HP VAN SDN Controller, Multiple Vulnerabilities

2016-10-11 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04819635

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04819635
Version: 2

HPSBPV03516 rev.2 - HP VAN SDN Controller, Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2015-09-29
Last Updated: 2016-10-10

Potential Security Impact: Disclosure of Privileged Information, Remote
Disclosure of Privileged Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with the HP VAN SDN
Controller running SSLv3. This is the SSLv3 vulnerability known as "Padding
Oracle on Downgraded Legacy Encryption" also known as "Poodle", which could
be exploited remotely resulting in disclosure of privileged information.

References:

CVE-2014-3566
SSRT102263
PSRT110240

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP VAN SDN Controller Software 2.5.21, 2.6.11, 2.7.10, 2.7.16, 2.7.18

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2014-3566
  4.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HP recommends disabling TLS v1.0 by deleting its entry in sslEnabledProtocols
in the client Auth properties of the
/opt/sdn/virgo/configuration/tomcat-server.xml file.

Open the /opt/sdn/virgo/configuration/tomcat-server.xml file for editing
Change the following line from this: clientAuth="false"
sslEnabledProtocols="TLSv1.0, TLSv1.1,TLSv1.2" to this: clientAuth="false"
sslEnabledProtocols=" TLSv1.1,TLSv1.2"
Restart the controller.

HISTORY

Version:1 (rev.1) - 29 September 2015 Initial release
Version:2 (rev.2) - 10 October 2016 Change CVE number from CVE-2014-8730 to
CVE-2014-3566

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJX+/nbAAoJEGIGBBYqRO9/1LgH/1RDjnXl8GV1zIaLJCGPVjll
1kPa/qlHSSLpuQpnyewRcNFsdx+H98Zca2AJefgsV9AtMjKKHcX26aIJ6daL+WxE
zMJu0+BqjQdRI47KmUWgdqjDwt8kKnhlQAtpFcEM45PpF7kEygASw8JKVSCARB5t
Ot5BT5QQtkbKEPKimbreOCzmcoXje4bT/LARi8F8GzIx/d6HC91fgh8QxsJHu+m3
BRGaEH/RkvdaMOhEkgieNhBFJYndNr9gaqUQ+uNgwOacPaDaoNw1y3N9scXziTzy
wh9l44C3v9Tlmn9y4l+P0ItAJSjrU6T9yZZnF0xOypWpnscUA8i5ooJhTYH2D3A=
=zvru
-END PGP SIGNATURE-


[security bulletin] HPSBGN03639 rev.1 - HPE KeyView, Remote Code Execution

2016-10-05 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05297477

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05297477
Version: 1

HPSBGN03639 rev.1 - HPE KeyView, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-09-29
Last Updated: 2016-09-29

Potential Security Impact: Remote Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE KeyView. The
vulnerability could be exploited remotely to allow code execution.

References:

CVE-2016-4387
CVE-2016-4388
CVE-2016-4389
CVE-2016-4390
PSRT110055

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE KeyView 10.18-10.24 Filter SDK

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4387
  4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
  5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVE-2016-4388
  4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
  5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVE-2016-4389
  4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
  5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVE-2016-4390
  4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
  5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett-Packard Enterprise thanks Aleksandar Nikolic of Cisco Talos for
reporting these issues to security-al...@hpe.com.

RESOLUTION

HPE has made the following software updates to resolve the vulnerabilities in
KeyView.

The vulnerabilities are resolved in the most recent versions of KeyView.
Download the updated software from the following location:

https://downloads.autonomy.com :

For the 10.x platform, upgrade to v10.25 or subsequent
For the 11.x platform, upgrade to v11.1 or subsequent

HISTORY
Version:1 (rev.1) - 29 September 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJX7XGOAAoJEGIGBBYqRO9/MFQH/R/Q2l3Kz6568YWOjpL2GPxV
TsKPq0nJPfTvxQIwR6nrWmsQokXFJiHWKV4fAQnRYVl3uVB0QhaHw7RFStkte0GB
8jbgK197X7GQa4NbkQWX8HXJcNUZ/iYzZwfkhCwrIs3cwjZP0l5HCfe2WTFysxtc
GU/5nYFa3Rq+PgseGUymhoS8aEVU1pDnEMTQR8vo1VJS6ZH9758eRgvr6j7+cmzc
+WlSSEBVyEn3HkSRqO1bVvSBvu92OlJj+uLN025Q2lHesRxaIgSIbRqetXgylBhm
kzjVQ9fLTXbcuTME4Y9YtYZL5tz5e7UaHQffEJJmauGJaHT1sdESl0FE6DoHmv0=
=GZ2E
-END PGP SIGNATURE-


[security bulletin] HPSBGN03650 rev.1 - HPE Network Automation Software, Local Arbitrary File Modification

2016-09-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05281739

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05281739
Version: 1

HPSBGN03650 rev.1 - HPE Network Automation Software, Local Arbitrary File
Modification

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-09-28
Last Updated: 2016-09-28

Potential Security Impact: Arbitrary File Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential vulnerability has been identified in HPE Network Automation
Software. The vulnerability could be locally exploited to allow arbitrary
file modification.

References:

CVE-2016-4386
PSRT110063

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Network Automation Software v10.10

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4386
  7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
  6.6 (AV:L/AC:L/Au:N/C:C/I:C/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE Network Automation Software:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM02413825?lang=en=us=202392_SSO_PRO_HPE

HISTORY
Version:1 (rev.1) - 28 September 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJX7BdgAAoJEGIGBBYqRO9/HOIIAIelNeLzbEVyRx9KLp6MJ+9f
oBfrEiEJzZ1lvR8RhD60q4UMuZK17TZWDLDQTd+j386SSBqau9frsXjhnrcfOaoY
MXjbP0K3VtJ5szcS0Kprj3KeZmyKNrJmXg1pBFcSulzsJvO8/f/FLccLrYzgcTsy
jMhIe/rLmSUGNpNeVN+SmllOWhyvODXoGO9Adh5sMZzRkqlfiXE19vic6W6L9i4e
0gK3nzj8XTB5qsjSsSfddvScrRDUH4zWCKRfLaZM9xGcQLTFaTFhUAeiW73cJnK1
+8LKRA5y5cDiLsa57rg4vAOkOjb7+dtkgKxAYGWiGihwy7zmLg8yIhITHqSwDik=
=+wEG
-END PGP SIGNATURE-


[security bulletin] HPSBHF03652 rev.1 - HPE iMC PLAT Network Products running Apache Commons FileUpload, Remote Denial of Service (DoS)

2016-09-26 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05289840

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05289840
Version: 1

HPSBHF03652 rev.1 - HPE iMC PLAT Network Products running Apache Commons
FileUpload, Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-09-26
Last Updated: 2016-09-26

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential vulnerability in Apache Commons FileUpload was addressed by HPE
iMC PLAT network products. The vulnerability could be exploited remotely
resulting in a Denial of Service (DoS).

References:

  - CVE-2016-3092
  - PSRT110190

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
  - HPE iMC PLAT - Please refer to the RESOLUTION
 below for a list of impacted products. All product versions are impacted
prior to the fixed version listed.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-3092
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION
HPE has made the following software update available to resolve the
vulnerability in the iMC PLAT network products listed.

 + **iMC PLAT - Version: IMC PLAT 7.2, E0403P10**

  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU

**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 26 September 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its 

[security bulletin] HPSBHF03654 rev.1 - HPE iMC PLAT Network Products using SSL/TLS, Multiple Remote Vulnerabilities

2016-09-26 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05289935

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05289935
Version: 1

HPSBHF03654 rev.1 - HPE iMC PLAT Network Products using SSL/TLS, Multiple
Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-09-26
Last Updated: 2016-09-26

Potential Security Impact: Multiple Remote Vulnerabilities

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HPE iMC PLAT
network products using SSL/TLS. These vulnerabilities could be exploited
remotely resulting in disclosure of information and other impacts including:

  - The MD5 Message-Digest Algorithm is not collision resistant, which makes
it easier for context-dependent attackers to conduct spoofing attacks, as
demonstrated by attacks on the use of MD5 in the signature algorithm of an
X.509 certificate.
  - The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many
single-byte biases, which makes it easier for remote attackers to conduct
plaintext-recovery attacks via statistical analysis of ciphertext in a large
number of sessions that use the same plaintext.
  - The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah"
could be exploited remotely to allow disclosure of information.

References:

  - CVE-2004-2761 - SSL/TLS MD5 Algorithm is not collision resistant
  - CVE-2013-2566 - SSL/TLS RC4 algorithm vulnerability
  - CVE-2015-2808 - SSL/TLS RC4 stream vulnerability known as "Bar Mitzvah"
  - PSRT110210

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
  - HPE iMC PLAT - Please refer to the RESOLUTION
 below for a list of impacted products. All product versions are impacted
prior to the fixed version listed.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2004-2761
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVE-2013-2566
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2015-2808
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION
HPE has made the following software available to resolve the vulnerabilities
in the iMC PLAT network products listed.

  + **iMC PLAT - Version: IMC PLAT 7.2, E0403P10**

  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU

**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 26 September 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.


[security bulletin] HPSBHF03655 rev.1 - HPE iMC PLAT Network Products running Apache Axis2, Multiple Remote Vulnerabilities

2016-09-26 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05289984

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05289984
Version: 1

HPSBHF03655 rev.1 - HPE iMC PLAT Network Products running Apache Axis2,
Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-09-26
Last Updated: 2016-09-26

Potential Security Impact: Multiple Remote Vulnerabilities

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HPE iMC PLAT
network products running Apache Axis2. These vulnerabilities could be
exploited remotely resulting in Denial of Service (DoS), disclosure of
information, and other impacts.

References:

  - CVE-2010-1632
  - PSRT110216

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
  - HPE iMC PLAT - Please refer to the RESOLUTION
 below for a list of impacted products. All product versions are impacted
prior to the fixed version listed.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2010-1632
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION
HPE has made the following software update available to resolve the
vulnerability in the iMC PLAT network products listed.

 + **iMC PLAT - Version: IMC PLAT 7.2, E0403P10**

  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU

**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 26 September 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent 

[security bulletin] HPSBGN03648 rev.1 - HPE LoadRunner and Performance Center, Remote Denial of Service (DoS)

2016-09-26 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05278882

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05278882
Version: 1

HPSBGN03648 rev.1 - HPE LoadRunner and Performance Center, Remote Denial of
Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-09-20
Last Updated: 2016-09-20

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerability have been identified in HPE LoadRunner and
Performance Center. This vulnerability could be exploited remotely to allow
Denial of Service (DoS).

References:

CVE-2016-4384
PSRT110230

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HPE Performance Center - all versions prior to v12.50
HPE LoadRunner - all versions prior to v12.50

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4384
  8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
  8.3 (AV:N/AC:M/Au:N/C:P/I:P/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Tenable Network Security for reporting this
issue to security-al...@hpe.com

RESOLUTION

HPE has released following updates to resolve the vulnerabilities in the
impacted versions of LoadRunner and Performance Center:

Performance Center v12.53 - https://softwaresupport.hp.com/group/softwaresupp
ort/search-result/-/facetsearch/document/KM02354255

LoadRunner v12.53 - https://softwaresupport.hp.com/group/softwaresupport/sear
ch-result/-/facetsearch/document/KM02320462

LoadRunner v12.50 patch 3 - https://softwaresupport.hp.com/group/softwaresupp
ort/search-result/-/facetsearch/document/KM02040111

HISTORY
Version:1 (rev.1) - 20 September 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJX6VBSAAoJEGIGBBYqRO9/kV8IANtX4baDp0m/0Dnqfi0hlxga
TQnS1TL9d38NDzvYLSzhbKIYLEoM4ymM/W376q+SD8bOjkiCZ7kmHAlZw/PHp0ny
KewKknH/FPTjqoBCspHMxN8Cgos18/B4v8QPfnJE/xsFQcEmsPUnghB8ENR6m9ST
rfPom6nDEg1zzMB5VdTuwQEx729/EQzSCEOm2yOLxMD9YPEhX/JMlf8UnQQW1skE
MGr13WD89wBxM+tNMhQJDNLTMLd8lWfB9PTwxwOr4TE+mq+Pfiw1E9SvjUuZ/ikZ
GBq4x7RHD3ZE37CR9aSxq55l1UwVaCMmBzyq8l20XjRvfQkyBggYYM3IV8ChmbM=
=PGVh
-END PGP SIGNATURE-


[security bulletin] HPSBHF03646 rev.1 - HPE Comware 7 (CW7) Network Products running NTP, Multiple Remote Vulnerabilities

2016-09-22 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05270839

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05270839
Version: 1

HPSBHF03646 rev.1 - HPE Comware 7 (CW7) Network Products running NTP,
Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-09-21
Last Updated: 2016-09-21

Potential Security Impact: Multiple Remote Vulnerabilities

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities in NTP have been addressed with HPE
Comware 7 (CW7) network products. The vulnerabilities could be exploited
remotely resulting in Denial of Service (DoS) or other impacts affecting
integrity.

References:

  - CVE-2015-7704
  - CVE-2015-7705
  - CVE-2015-7855
  - CVE-2015-7871
  - PSRT110228
  - SSRT102943

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
  - Comware 7 (CW7) Products - Please refer to the RESOLUTION
 below for a list of impacted products. All product versions are impacted
prior to the fixed versions listed.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-7704
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)

CVE-2015-7705
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)

CVE-2015-7855
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)

CVE-2015-7871
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION
HPE has released the following software updates to resolve the
vulnerabilities in HPE Comware 7 network products.

**COMWARE 7 Products**

  + **12500 (Comware 7) - Version: R7377**
* HP Network Products
  - JC072B HP 12500 Main Processing Unit
  - JC085A HP A12518 Switch Chassis
  - JC086A HP A12508 Switch Chassis
  - JC652A HP 12508 DC Switch Chassis
  - JC653A HP 12518 DC Switch Chassis
  - JC654A HP 12504 AC Switch Chassis
  - JC655A HP 12504 DC Switch Chassis
  - JF430A HP A12518 Switch Chassis
  - JF430B HP 12518 Switch Chassis
  - JF430C HP 12518 AC Switch Chassis
  - JF431A HP A12508 Switch Chassis
  - JF431B HP 12508 Switch Chassis
  - JF431C HP 12508 AC Switch Chassis
  - JG497A HP 12500 MPU w/Comware V7 OS
  - JG782A HP FF 12508E AC Switch Chassis
  - JG783A HP FF 12508E DC Switch Chassis
  - JG784A HP FF 12518E AC Switch Chassis
  - JG785A HP FF 12518E DC Switch Chassis
  - JG802A HP FF 12500E MPU
  + **10500 (Comware 7) - Version: R7178**
* HP Network Products
  - JC611A HP 10508-V Switch Chassis
  - JC612A HP 10508 Switch Chassis
  - JC613A HP 10504 Switch Chassis
  - JC748A HP 10512 Switch Chassis
  - JG608A HP FlexFabric 11908-V Switch Chassis
  - JG609A HP FlexFabric 11900 Main Processing Unit
  - JG820A HP 10504 TAA Switch Chassis
  - JG821A HP 10508 TAA Switch Chassis
  - JG822A HP 10508-V TAA Switch Chassis
  - JG823A HP 10512 TAA Switch Chassis
  - JG496A HP 10500 Type A MPU w/Comware v7 OS
  - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating
System
  - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System
Main Processing Unit
  + **12900 (Comware 7) - Version: R1138P03**
* HP Network Products
  - JG619A HP FlexFabric 12910 Switch AC Chassis
  - JG621A HP FlexFabric 12910 Main Processing Unit
  - JG632A HP FlexFabric 12916 Switch AC Chassis
  - JG634A HP FlexFabric 12916 Main Processing Unit
  - JH104A HP FlexFabric 12900E Main Processing Unit
  - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
  - JH263A HP FlexFabric 12904E Main Processing Unit
  - JH255A HP FlexFabric 12908E Switch Chassis
  - JH262A HP FlexFabric 12904E Switch Chassis
  - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
  - JH103A HP FlexFabric 12916E Switch Chassis
  + **5900 (Comware 7) - Version: R2422P02**
* HP Network Products
  - JC772A HP 5900AF-48XG-4QSFP+ Switch
  - JG296A HP 5920AF-24XG Switch
  - JG336A HP 5900AF-48XGT-4QSFP+ Switch
  - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
  - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
  - JG555A HP 5920AF-24XG TAA Switch
  - JG838A HP FF 5900CP-48XG-4QSFP+ Switch
  - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
  - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
  - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
  + **MSR1000 

[security bulletin] HPSBGN03645 rev.2 - HPE Helion OpenStack Glance, Remote Access Restriction Bypass, Unauthorized Access

2016-09-22 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05273584

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05273584
Version: 2

HPSBGN03645 rev.2 - HPE Helion OpenStack Glance, Remote Access Restriction
Bypass, Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-09-15
Last Updated: 2016-09-15

Potential Security Impact: Remote Access Restriction Bypass, Unauthorized
Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential vulnerabilities have been identified in HPE Helion OpenStack
Glance. The vulnerabilities can be remotely exploited to allow access
restriction bypass and unauthorized access.

Note:
A malicious tenant is able to reuse deleted Glance image IDs to share
malicious images with other tenants in a manner that is undetectable to the
victim tenant if the Helion OpenStack administrators have both:

  1. Edited the policy.json file to allow non-admin tenants to share images
with other tenants or edited policy.json to allow non-admin tenants to create
public images.
  2. Deleted image IDs from the Glance database, either manually or using the
purge tool ("glance-manage db purge").

Further details are available in OSSN-0075 here:
https://wiki.openstack.org/wiki/OSSN/OSSN-0075.

References:

  - CVE-2016-4383
  - OSSN-0075
  - PSRT110227, PSRT110231

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HPE Helion CloudSystem all
HPE Helion OpenStack all

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4383
  7.6 CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following mitigation instructions for HPE Helion
OpenStack Glance:

 * This procedure ensures that images shared between two tenants who trust
each other are not maliciously replaced by a malicious tenant reusing a
deleted image ID. Perform the following action:

  1. The admin should update the policy.json file so that only admins can
deactivate/reactivate images:
"deactivate": "role:admin",
"reactivate": "role:admin",
  2. All public or shared images should be quarantined by marking them as
deactivated using the Glance API.
  3. The admin should inspect all public/shared images to see if they have
been replaced by malicious images.
  4. Any images which cannot be confirmed to be non-malicious should be left
deactivated.
  5. Images which can be confirmed to be non-malicious images can be
reactivated using the Glance API.

* **Note:** Images can be confirmed to be non-malicious for example by
examining the Glance logs or backup Glance databases to show that the image
ID has not been recycled.

HISTORY

Version:1 (rev.1) - 16 September 2016 Initial release
Version:2 (rev.2) - 15 September 2016 Corrected URL

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or 

[security bulletin] HPSBST03640 rev.1 - HP XP7 Command View Advance Edition Suite (CVAE) using Replication Manager (RepMgr) and Device Manager (DevMgr), Local Access Restriction Bypass

2016-09-13 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05257711

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05257711
Version: 1

HPSBST03640 rev.1 - HP XP7 Command View Advance Edition Suite (CVAE) using
Replication Manager (RepMgr) and Device Manager (DevMgr), Local Access
Restriction Bypass

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-09-01
Last Updated: 2016-09-01

Potential Security Impact: Local Access Restriction Bypass

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HP XP7 Command View
Advance Edition Suite (CVAE) using Replication Manager (RepMgr) and Device
Manager (DevMgr). This vulnerability could be locally exploited to allow
access restriction bypass.

References:

  - CVE-2016-4381
  - PSRT110214

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP XP7 Command View Advanced Edition Suite RepMgr and DevMgr version 6.2.0-00
to versions prior to 8.4.1-02

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4381
  5.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
  4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has released the following software updates to resolve the vulnerability
in HP XP7 Command View Advance Edition Suite.

  - Device Manager (DevMgr) version 8.4.1-02
  - Replication Manager (RepMgr) version 8.4.1-02

The updates are available from the following locations.

  - Full installer updates:

https://h20575.www2.hp.com/usbportal/softwareupdate.do

  - Patches:

https://h20575.www2.hpe.com/tsusbportal/index.do?lc=EN_US=HPSC

 **Note:** A valid HPE Passport account is needed to download the patches.
Please contact HPE Technical Support for assistance.

HISTORY
Version:1 (rev.1) - 1 September 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXyJX9AAoJEGIGBBYqRO9/M/wH/26FtoAFFJZ2vb9Y3nF3rIzu
lS0Vd+kOf45OVntpJ3e5MLISEBWMxdibNTG49iXsqS0H/BsEV9j09oAHHjCpwylk
OwPB0v0xVzCuI3mUgQ8ANBj4oIkYzRv0vfwbAwpMrrAA2goLxijhxxUR9sE4Zrz3
93FwNW2H/IUq7ma5LCUDzudNgDfXR6iTH7zKJKLYDz/mPBwD/IJGtv8Si6O5oZ03
hUOqNl6irkP+415K358PU927CcQcFkLY+Wv3OsitG+w1AILRE5IV4aqIPVJCPwUl
U9vTn5jyVkHz0FHr45eK6V+ts2xaGbKYcW4fYIzfAoYUO/YBULiZ8Zwlr/TNM+g=
=Dh4J
-END PGP SIGNATURE-


[security bulletin] HPSBGN03572 rev.1 - HPE Performance Center, Remote User Validation Failure

2016-09-13 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05269356

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05269356
Version: 1

HPSBGN03572 rev.1 - HPE Performance Center, Remote User Validation Failure

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-09-12
Last Updated: 2016-09-12

Potential Security Impact: Remote User Validation Failure

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential vulnerability has been identified in HPE Performance Center. The
vulnerability could cause remote user validation failure.

References:

CVE-2016-4382
PSRT110072

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Performance Center 11.52, 12.00, 12.01, 12.20, 12.50

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4382
  8.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE Performance Center:

https://softwaresupport.hpe.com/km/KM02540472

HISTORY
Version:1 (rev.1) - 12 September 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJX1v/7AAoJEGIGBBYqRO9/dNwIAMzKAgW7+n8Ppr/X2c6DWlE4
Zc2nQ/EV/zP3SxiY4QxRu8IymKf7e0fanREXwEWXA+s1ILFo/Eb+jEQmbDmGZ1SY
V/aOvKU+RAxLfPDZyo08gTPmr2a7baU1QnrNtXRGN3hBHcZ6WrQMCyG0Oo8IJ884
SPDF5rKgHmouCNIRC/xdVEV4F/aWkf1U2mD0Ym7ACFPwqYoaPNEb8yUIAR/+hTNo
GjQf9shnm+4uvNO4SjVaYs5eJydA+sNIlS1wIj6bf2pRzQPyGvmzlDXwl1dTe6eU
V0iKxIiiy+ti6ty0einGm/aXF5pr/6DHuLL1GNVltPrRj1rEMPww5aeBifeWvHk=
=DMdg
-END PGP SIGNATURE-


[security bulletin] HPSBGN03637 rev.1 - HP Operations Manager for Unix, Solaris, and Linux, Remote Cross-Site Scripting (XSS)

2016-08-31 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05249833

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05249833
Version: 1

HPSBGN03637 rev.1 - HP Operations Manager for Unix, Solaris, and Linux,
Remote Cross-Site Scripting (XSS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-08-30
Last Updated: 2016-08-30

Potential Security Impact: Remote Cross-Site Scripting (XSS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential vulnerability has been identified in the AdminUI of the HP
Operations Manager for Unix, Solaris, and Linux. The vulnerability could be
exploited remotely resulting in Cross-Site Scripting (XSS).

References:

CVE-2016-4380
PSRT110209

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP Operations Manager for Unix - v9.21.x and versions prior to v9.21.130
HP Operations Manager for Solaris - v9.21.x and versions prior to v9.21.130
HP Operations Manager for Linux - v9.21.x and versions prior to v9.21.130

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4380
  3.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
  3.5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following update available to resolve the vulnerability in
the impacted versions of HP Operations Manager (OM) for Unix/Solaris/Linux.

Please download the patch HP OM v9.21.130 from following location:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM322544?lang=en=us=202392_SSO_PRO_HPE

HISTORY
Version:1 (rev.1) - 30 August 2016 - Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXxhXjAAoJEGIGBBYqRO9/XKAIAMdqprpOGRtWyJ5sERZdPK7o
yBgSZbVPSBV1erOdH31Tz7ynx9hrLAotnnMq4+Yain2W3OSINHadC6wFXVeK5wZa
xm2NQ81z/KM4AStGwaon2e2gEBUrTFwH01IzMBoaLh4bCjoqgcP5CwJhzgxmqGMB
dSlOE3y1pSDpvnN5WFjSD0w2UBsuw7kTcKFvF6IEoWQPhOb98FiJU2MhLHZYWkrg
zEF+9/cK1R2s2j9VU6877XczceTT+Az4JZnWfDKkE0Dg2Kj+IFDN9aGt+HhM7VJy
0xB37ZEfaccaKziVRr8QtsytR9GDwMAyorh9W0PrSP5Zt0JTP7bZNUz626DEUvo=
=kZIT
-END PGP SIGNATURE-


[security bulletin] HPSBHF03641 rev.1 - HPE Integrated Lights-Out 3 (iLO 3), Remote Disclosure of Information

2016-08-30 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05249760

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05249760
Version: 1

HPSBHF03641 rev.1 - HPE Integrated Lights-Out 3 (iLO 3), Remote Disclosure of
Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-08-30
Last Updated: 2016-08-30

Potential Security Impact: Remote Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with certain versions
of HPE Integrated Lights-Out 3 (iLO 3). This vulnerability, also known as the
"Vaudenay vulnerability",  could be remotely exploited using TLS CBC Padding
and MAC Errors resulting in disclosure of information.

References:

  - CVE-2016-4379
  - PSRT102936

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Integrated Lights-Out 3 (iLO 3) all firmware versions prior to 1.88

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4379
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Hanno Boeck for reporting this
vulnerability to security-al...@hpe.com.

RESOLUTION

HPE has made the following firmware updates available to resolve the
vulnerability in iLO 3.

iLO3 firmware version 1.88 is available from the following locations:

+ Online ROM Flash Component for Windows x86



+ Online ROM Flash Component for Windows x64



+ Online ROM Flash Component for Linux



+ Online ROM Flash Component for VMware ESXi



HISTORY
Version:1 (rev.1) - 30 August 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXxdRmAAoJEGIGBBYqRO9/wScH/jNuTs7zS27dp4ElK5vjie7y
/kb0J5c58SJhihEzeTvV/JiydKtoyEf1HAW9AzRD/qYgWRN7gUaj2TN4syp8HyEx
Ee0wvXvw3y8tZIWNOZIz5LNoTgf0hEPKRABFfMn5iI84OdtSPxgCXTkF1qm/fAHw
S1wmyYv55qzQMR2gdxqLTpUjAQI/dU9X1kKAp46Ws6ZfnglLY88DAm6gfHLABTLi
7xt39WFgJ0mTn0VIKwhA3O78Q0MZlszNfcYX5p/6kfpngPcgrkNSsOxuvENtJKp6
RPZnas7rCVRdxfxrZjDYWWYmmYiPvfwkz8mTuapVWumjtvccNzwkFuIvDgjRvdo=
=1ETs
-END PGP SIGNATURE-


[security bulletin] HPSBGN03638 rev.1 - HPE Remote Device Access: Virtual Customer Access System (vCAS) using lighttpd and OpenSSH, Unauthorized Modification of Information, Remote Denial of Service (

2016-08-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05247375

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05247375
Version: 1

HPSBGN03638 rev.1 - HPE Remote Device Access: Virtual Customer Access System
(vCAS) using lighttpd and OpenSSH, Unauthorized Modification of Information,
Remote Denial of Service (DoS), Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-08-29
Last Updated: 2016-08-29

Potential Security Impact: Remote Denial of Service (DoS), Disclosure of
Information, Unauthorized Modification Of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential vulnerabilities have been identified in the lighttpd and OpenSSH
version used in HPE Remote Device Access: Virtual Customer Access System
(vCAS). These vulnerabilities could be exploited remotely resulting in
unauthorized modification of information, denial of service (DoS), and
disclosure of information.

References:

CVE-2015-3200
CVE-2016-0777
CVE-2016-0778
PSRT110211

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Remote Device Access: Virtual Customer Access System (vCAS) - v15.07 (RDA
8.1) and earlier.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-3200
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVE-2016-0777
  6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)

CVE-2016-0778
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following updates available to resolve the vulnerabilities
in Remote Device Access: Virtual Customer Access System (vCAS)

vCAS 16.05 (RDA 8.7) kits - hp-rdacas-16.05-10482-vbox.ova and
hp-rdacas-16.05-10482.ova.

The Oracle VirtualBox kit is available at:
https://h20529.www2.hpe.com/apt/hp-rdacas-16.05-10482-vbox.ova

The VMware ESX(i) and VMware Player kit is available at:
https://h20529.www2.hpe.com/apt/hp-rdacas-16.05-10482.ova

HISTORY
Version:1 (rev.1) - 29 August 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXxJSeAAoJEGIGBBYqRO9/rIUIAM9m3rc+Q++ZUVYwjSXCfHgL
791nY3p71QBEOXDVOzboYY14YQ3U+8jUKiIRUf/ZlGO0zA2Rrf+vd4KaTpoEG5qd
llI1cKwyEAYGn+yUmuyMjAOFDZccg4SiTwfz+7E2YVAoHjZNjiNInB2DJ7lJGUfn

[security bulletin] HPSBNS03635 rev.1 - HPE NonStop Servers OSS Script Languages running Perl and PHP, Multiple Local and Remote Vulnerabilities

2016-08-22 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05240731

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05240731
Version: 1

HPSBNS03635 rev.1 - HPE NonStop Servers OSS Script Languages running Perl and
PHP, Multiple Local and Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-08-19
Last Updated: 2016-08-19

Potential Security Impact: Local Denial of Service (DoS), Elevation of
Privilege, Remote Denial of Service (DoS), Execution of Arbitrary Code,
Unauthorized Disclosure of Information, Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential remote and local vulnerabilities impacting Perl and PHP
have been addressed by HPE NonStop Servers OSS Script Languages. The
vulnerabilities include Perl's opportunistic loading of optional modules
which might allow local users to gain elevation of privilege via a Trojan
horse library under the current working directory.

References:

- CVE-2016-1238 - Perl Local Elevation of Privilege
- CVE-2016-2381 - Perl Remote Unauthorized Modification
- CVE-2014-4330 - Perl Local Denial of Service (DoS)

**Note:** applies only for the H/J-series SPR. Fix was already
provided in a previous L-series SPR.

- CVE-2015-8383 - Perl Remote Denial of Service (DoS)
- CVE-2015-8386 - Perl Remote Denial of Service (DoS)
- CVE-2015-8387 - Perl Remote Denial of Service (DoS)
- CVE-2015-8389 - Perl Remote Denial of Service (DoS)
- CVE-2015-8390 - Perl Remote Denial of Service (DoS)
- CVE-2015-8391 - Perl Remote Denial of Service (DoS)
- CVE-2015-8393 - Perl Remote Unauthorized Disclosure of Information
- CVE-2015-8394 - Perl Remote Denial of Service (DoS)
- CVE-2015-8607 - Perl Remote Unauthorized Disclosure of Information,
Unauthorized Modification, Denial of Service (DoS)
- CVE-2015-8853 - Perl Remote Denial of Service (DoS)
- CVE-2015-8865 - Perl Remote Denial of Service (Dos), Execute Arbitrary
Code
- CVE-2013-7456 - PHP Remote Denial of Service (DoS)
- CVE-2015-8874 - PHP Remote Denial of Service (DoS)
- CVE-2016-1903 - PHP Remote Unauthorized Disclosure of Information,
Denial of Service (DoS)
- CVE-2016-2554 - PHP Remote Denial of Service (DoS)
- CVE-2016-3074 - PHP using GD Graphics Library 2.1.1 (aka libgd or
libgd2) Remote Denial of Service (Dos), Execute Arbitrary Code
- CVE-2016-4070 - PHP Remote Denial of Service (DoS)
- CVE-2016-4071 - PHP Remote Execute Arbitrary Code
- CVE-2016-4072 - PHP Remote Execute Arbitrary Code
- CVE-2016-4073 - PHP Remote Denial of Service (Dos), Execute Arbitrary
Code
- CVE-2016-4342 - PHP Remote Denial of Service (DoS)
- CVE-2016-4343 - PHP Remote Denial of Service (DoS)
- CVE-2016-4537 - PHP Remote Denial of Service (DoS)
- CVE-2016-4538 - PHP Remote Denial of Service (DoS)
- CVE-2016-4539 - PHP Remote Denial of Service (DoS)
- CVE-2016-4540 - PHP Remote Denial of Service (DoS)
- CVE-2016-4541 - PHP Remote Denial of Service (DoS)
- CVE-2016-4542 - PHP Remote Denial of Service (DoS)
- CVE-2016-4543 - PHP Remote Denial of Service (DoS)
- CVE-2016-4544 - PHP Remote Denial of Service (DoS)
- CVE-2016-5093 - PHP Remote Denial of Service (DoS)
- CVE-2016-5094 - PHP Remote Denial of Service (DoS)
- CVE-2016-5096 - PHP Remote Denial of Service (DoS)
- CVE-2016-5114 - PHP Remote Unauthorized Disclosure of Information,
Denial of Service (DoS)
- CVE-2016-5766 - PHP Remote Denial of Service (DoS)
- CVE-2016-5767 - PHP Remote Denial of Service (DoS)
- CVE-2016-5768 - PHP Remote Denial of Service (Dos), Execute Arbitrary
Code
- CVE-2016-5769 - PHP Remote Denial of Service (DoS)
- CVE-2016-5770 - PHP Remote Denial of Service (DoS)
- CVE-2016-5771 - PHP Remote Denial of Service (Dos), Execute Arbitrary
Code
- CVE-2016-5772 - PHP Remote Denial of Service (Dos), Execute Arbitrary
Code
- CVE-2016-5773 - PHP Remote Denial of Service (Dos), Execute Arbitrary
Code
- NonStop Hotstuff HS0
- PSRT110206

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
OSS Script Languages (T1203) T1203H01 through T1203H01^AAD, T1203L01 and
T1203L01^AAC

*Impacted releases:*

- L15.02
- L15.08.00, L15.08.01
- L16.05.00

- J06.14 through J06.16.02
- J06.17.00, J06.17.01
- J06.18.00, J06.18.01
- J06.19.00, J06.19.01, J06.19.02
- J06.20.00

- H06.25 through H06.26.01
- H06.27.00, H06.27.01
- H06.28.00, H06.28.01
- H06.29.00, H06.29.01

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2013-7456
  7.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
  6.8 

[security bulletin] HPSBHF03441 rev.1 - HPE ilO 3 and iLO 4 and iLO 4 mRCA, Remote Multiple Vulnerabilities

2016-08-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05236950

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05236950
Version: 1

HPSBHF03441 rev.1 - HPE ilO 3 and iLO 4 and iLO 4 mRCA, Remote Multiple
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-08-12
Last Updated: 2016-08-12

Potential Security Impact: Remote Multiple Vulnerabilities

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HPE Integrated
Lights Out 3 and HPE Integrated Lights Out 4, and Integrated Lights Out 4
mRCA. The vulnerabilities could lead to multiple remote vulnerabilities.

References:

CVE-2016-4375
PSRT110038

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HPE Integrated Lights-Out 3 (iLO 3), Firmware for ProLiant G7 Servers prior
to v1.88
HPE Integrated Lights-Out 4 (iLO 4), prior to v2.44
HPE iLO 4 mRCA prior to v2.32

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4375
  5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has provided firmware updates to resolve this vulnerability.

iLO 3 version v1.88 or subsequent
iLO 4 version v2.44 or subsequent
iLO 4 version v2.32 for mRCA Moonshot cartridge or subsequent

The updates are available at the following locations.

The updates for iLO 3 (v1.88) are available at the following locations:

Online ROM Flash Component for Windows x86

ftp://ftp.hp.com/pub/softlib2/software1/sc-windows-fw-ilo/p1539977532/v116232

https://www.hpe.com/global/swpublishing/MTX-3ef65d13406a41de97e6a75a3c

Online ROM Flash Component for Windows x64

ftp://ftp.hp.com/pub/softlib2/software1/sc-windows-fw-ilo/p1015659653/v116234

https://www.hpe.com/global/swpublishing/MTX-bb45e0682dd04f098ad89e189c

Online ROM Flash Component for Linux

ftp://ftp.hp.com/pub/softlib2/software1/sc-linux-fw-ilo/p1573561412/v116231

https://www.hpe.com/global/swpublishing/MTX-4882dccaaa0d4fbcbd353033e6

Online ROM Flash Component for VMware ESXi

ftp://ftp.hp.com/pub/softlib2/software1/sc-linux-fw-ilo/p986822869/v116230

https://www.hpe.com/global/swpublishing/MTX-04b05621285145119cbaa69982

The updates for iLO 4 (v2.44) are available at the following locations:

Online ROM Flash Component for Windows x64

ftp://ftp.hp.com/pub/softlib2/software1/sc-windows-fw-ilo/p1382755333/v119759

Online ROM Flash Component for Windows x86

ftp://ftp.hp.com/pub/softlib2/software1/sc-windows-fw-ilo/p1012384589/v119761

Online ROM Flash Component for Linux

ftp://ftp.hp.com/pub/softlib2/software1/sc-linux-fw-ilo/p192122427/v119757

Online ROM Flash Component for VMware ESXi

ftp://ftp.hp.com/pub/softlib2/software1/sc-linux-fw-ilo/p1892756734/v119758

The mRCA firmware is available in the Moonshot Component Pack 2016.07.0. The
service pack is available at the following location:

ftp://ftp.hp.com/pub/softlib2/software1/component-fw/p1800397686/v113113

HISTORY
Version:1 (rev.1) - 12 August 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the 

[security bulletin] HPSBGN03634 rev.1 - HPE Enterprise Solution Sizers and Storage Sizer running Smart Update, Remote Arbitrary Code Execution

2016-08-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05237578

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05237578
Version: 1

HPSBGN03634 rev.1 - HPE Enterprise Solution Sizers and Storage Sizer running
Smart Update, Remote Arbitrary Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-08-15
Last Updated: 2016-08-15

Potential Security Impact: Remote Arbitrary Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Enterprise
Solution Sizers and Storage Sizer running Smart Update. The vulnerability
could be exploited remotely to allow arbitrary code execution.

References:

  - CVE-2016-4377
  - PSRT110203, PSRT102939

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Storage Sizing Tool prior to v13.0
  - Converged Infrastructure Solution Sizer Suite (CISSS) prior to v2.13.1
  - HPE Power Advisor prior to v7.8.2
  - HPE Insight Management Sizer prior to v16.12.1
  - HPE Synergy Planning Tool prior to v3.3
  - HPE SAP Sizing Tool prior to v16.12.1
  - HPE Sizing Tool for SAP Business Suite powered By HANA prior to 16.11.1
  - HPE Sizer for ConvergedSystems Virtualization prior to v16.7.1
  - HPE Sizer for Microsoft Exchange Server 2016 prior to v16.12.1
  - HPE Sizer for Microsoft Exchange Server 2013 prior to v16.12.1
  - HPE Sizer for Microsoft Exchange Server 2010 prior to v16.12.1
  - HPE Sizer for Microsoft Lync Server 2013 prior to v16.12.1
  - HPE Sizer for Microsoft SharePoint 2013 prior to 16.13.1
  - HPE Sizer for Microsoft SharePoint 2010 prior to 16.11.1
  - HPE Sizer for Microsoft Skype for Business Server 2015 prior to 16.5.1

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4377
  8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has provided the following software updates to resolve the vulnerability
in HPE Enterprise Solution Sizers and Storage Sizer.

  - HPE Storage Sizer v13.0 or later



  - Converged Infrastructure Solution Sizer Suite (CISSS) v2.13.1 or later



  - HPE Insight Management Sizer v16.12.1 or later



  - HPE Power Advisor pv7.8.2 or later



  - HPE Synergy Planning Tool v3.3 or later



  - HPE SAP Sizing Tool v16.12.1 or later



  - HPE Sizing Tool for SAP Business Suite powered By HANA v16.11.1 or later



  - HPE Sizer for ConvergedSystems Virtualization v16.7.1 or later



  - HPE Sizer for Microsoft Exchange Server 2016 v16.12.1 or later



  - HPE Sizer for Microsoft Exchange Server 2013 v16.12.1 or later



  - HPE Sizer for Microsoft Exchange Server 2010 v16.12.1 or later



  - HPE Sizer for Microsoft Lync Server 2013 v16.12.1 or later



  - HPE Sizer for Microsoft SharePoint 2013 v16.13.1 or later



  - HPE Sizer for Microsoft SharePoint 2010 v16.11.1 or later



  - HPE Sizer for Microsoft Skype for Business Server 2015 v16.5.1 or later



**Note:** Previous versions of *HPE Enterprise Solution Sizers* and *Storage
Sizer* must be manually deleted and the current versions installed.

HISTORY
Version:1 (rev.1) - 15 August 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security

[security bulletin] HPSBST03629 rev.1 - HP StoreFabric B-series Switches, Remote Disclosure of Privileged Information

2016-08-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05236212

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05236212
Version: 1

HPSBST03629 rev.1 - HP StoreFabric B-series Switches, Remote Disclosure of
Privileged Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-08-12
Last Updated: 2016-08-12

Potential Security Impact: Remote Disclosure of Privileged Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP StoreFabric
B-series switches. The vulnerability could be remotely exploited resulting in
disclosure of privileged information.

References:

CVE-2016-4376
PSRT110173

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
StoreFabric B-series Switches FOS 7.x

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4376
  5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
  7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

Hewlett Packard Enterprise thanks Daniel Compton of Info-Assure Ltd. for
reporting this vulnerability to security-al...@hpe.com.

RESOLUTION

HPE has made the following firmware patch available to resolve the
vulnerability in Store Fabric B-series switches.

The fix is available in HPE B-series FOS v7.4.1d and v8.0.1

To download the patch go to http://www.hpe.com/support

Select "HPE Servers, Storage and Networking" under Product Support.
Search for your HPE StoreFabric B-series switch model.
Select "Get drivers, software & firmware"
Click "Firmware" under OS Independent Downloads.
To read the Brocade Release Notes , click the "Manuals" link under the
Knowledge Base tab.
To read the HPE Release Notes , click the "Release Notes" tab in the firmware
download page.
Also, in the "Manuals" section, see the Fabric OS Administrators Guide for a
description of the process to verify the firmware download is complete.

HISTORY
Version:1 (rev.1) - 12 August 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXrioLAAoJEGIGBBYqRO9/nBUIAKU+sWfFiB36FGJeHwySMxMO
WOfrRMclhGtqQrD4KrZVLKXY03DusX+cCuKEQD6DrGPq5MiPPOG/Wf/Tbx15L5k1
IsxKaCR69Wexu4/hNtiqc7VVqBJjEhLl95ULBiFFXFCRmkKAp8K1cBPym7/27aJd
b/nffNX3zL6K9vihBAdbOLr/XtxccjUMKKCSIx+juGCPONkh9XTfJZIxipM4BNWF
aeycrY4RXOSMNMu27XCi5FiHbuTysvbyYDM7bCghwiXatW8Hi6DYJE6ffTuIYsx9

[security bulletin] HPSBGN03630 rev.2 - HP Operations Manager for Unix, Solaris, and Linux using Apache Commons Collections (ACC), Remote Code Execution

2016-08-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05206507

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05206507
Version: 2

HPSBGN03630 rev.2 - HP Operations Manager for Unix, Solaris, and Linux using
Apache Commons Collections (ACC), Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-07-25
Last Updated: 2016-08-11

Potential Security Impact: Remote Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in Apache Commons Collections (ACC) for handling Java object
deserialization was addressed in the AdminUI of HP Operations Manager for
Unix, Solaris and Linux. The vulnerability could be exploited remotely to
allow remote code execution.

References:

CVE-2016-4373
CERT-VU#576313
PSRT110183

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP Operations Manager for Linux - v9.1x, v9.20.x/9.21.x and versions prior to
v9.21.130
HP Operations Manager for Solaris - v9.1x, v9.20.x/9.21.x and versions prior
to 9.21.130
HP Operations Manager for Unix - v9.1x, 9.20.x/9.21.x and versions prior to
9.21.130

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4373
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HP Operations Manager for
Unix/Solaris/Linux.

For v9.1x  Upgrade to HP OM v9.2 and then apply 9.21.130 patch.

For v9.2x - Apply 9.21.130 patch.

Please download the HP OM 9.21.130 patch from the following location:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM322544?lang=en=us=202392_SSO_PRO_HPE

HISTORY
Version:1 (rev.1) - 25 July 2016 - Initial release
Version:2 (rev.2) - 11 August 2016 - Changed the product version and
resolution section

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXrN/RAAoJEGIGBBYqRO9/vX0IALlLr2BX+GrXIveSNOo40l3/
r8MeCf6rgVrF0vpFy5AjFwAaw2VMZBqL9fZ72vxJfLBE8dvZ9qxBnq83sBRCIR6L
qHAQYU3qdopSnNuH8qTEX1ZGVcqbCsiYZjIxdYIEUFEku/iykvKHpCwDcGiSQQeO
UtmnEcRHmKe5RfmycQGFNgreUou+haC2YvpC7a3MPG2jMXwegzfFTQ3mdYQLRDy4
6MraSWyI8nffbsvHoW8BIP7wvA8NGD7uJXQyleWvyz4PbKgz4aagjnf3H+tU8gW7
oAyD4avvlfVJFzeAT9pVFUVrDtbHChLswzv3vlYJ0/9lc0wtc9jKuqgE1sCEWb8=
=tXqg
-END PGP 

[security bulletin] HPSBHF03440 rev.1 - HPE iLO 3 using JQuery, Remote Cross-Site Scripting (XSS)

2016-08-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05232730

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05232730
Version: 1

HPSBHF03440 rev.1 - HPE iLO 3 using JQuery, Remote Cross-Site Scripting (XSS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-08-11
Last Updated: 2016-08-11

Potential Security Impact: Remote Cross-Site Scripting (XSS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability in JQuery was addressed by HPE Integrated
Lights-Out 3. The vulnerability could be remotely exploited to allow
Cross-Site Scripting (XSS).

References:

CVE-2011-4969
PSRT110031

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Integrated Lights-Out 3 (iLO 3), Firmware for ProLiant G7 Servers prior
to v1.88

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2011-4969
  5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has made the following product updates available to resolve the
vulnerability in iLO 3.

Update iLO 3 firmware version to v1.88 or subsequent version.

Online ROM Flash Component for Windows x86

ftp://ftp.hp.com/pub/softlib2/software1/sc-windows-fw-ilo/p1539977532/v116232

https://www.hpe.com/global/swpublishing/MTX-3ef65d13406a41de97e6a75a3c

Online ROM Flash Component for Windows x64

ftp://ftp.hp.com/pub/softlib2/software1/sc-windows-fw-ilo/p1015659653/v116234

https://www.hpe.com/global/swpublishing/MTX-bb45e0682dd04f098ad89e189c

Online ROM Flash Component for Linux

ftp://ftp.hp.com/pub/softlib2/software1/sc-linux-fw-ilo/p1573561412/v116231

https://www.hpe.com/global/swpublishing/MTX-4882dccaaa0d4fbcbd353033e6

Online ROM Flash Component for VMware ESXi

ftp://ftp.hp.com/pub/softlib2/software1/sc-linux-fw-ilo/p986822869/v116230

https://www.hpe.com/global/swpublishing/MTX-04b05621285145119cbaa69982

HISTORY
Version:1 (rev.1) - 11 August 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXrJdkAAoJEGIGBBYqRO9/shEH/2STgTELXUL/qPfpTp/8RggS
kDZn/nqMN4nZFG2+HMym7YYB8m8iFVPVud/azNCEQwGPsS6XkVfjuH3WSfPlz1Sa
Ex0awOQfuJmQggyW9M88I7SbiPiqNSR5gdkYqYX6Gq1W63fevAqt0aDMVR7DTkKS
nmLB/JksszcOXs0yBk0n3BGOpXtRkyuOeoDzstNZFBw64e/543N5IycoN95LZqK2
p+5Ic9jjJtv0mw4O53AY/seWuY3ZtI+j0zofyTdNVfNjVPUbf4lb7MnuTHb31VlA

ESA-2016-070: RSA® Authentication Manager Prime SelfService Insecure Direct Object Reference Vulnerability

2016-08-08 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2016-070: RSA® Authentication Manager Prime SelfService Insecure Direct 
Object Reference Vulnerability

EMC Identifier: ESA-2016-070

CVE Identifier: CVE-2016-0915

Severity Rating: CVSS v3 Base Score: 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)

Affected Products:
· RSA Authentication Manager (AM) Prime Self-Service 3.0 and 3.1 
versions prior to build version 1915
Summary: 
RSA AM Prime Self-Service Portal contains a fix for an insecure direct object 
reference vulnerability that could potentially be exploited by malicious users 
to compromise the affected system.
Details: 
RSA AM Prime Self-Service Portal could allow a malicious authenticated user 
(attacker) to replace his/her token serial number in a PIN change request with 
the token serial number of a victim user, which may change the PIN of the 
victim user to the PIN value specified by the attacker in the PIN change 
request. This may also deny victim’s access to the system.
Recommendation:
The following RSA Authentication Manager Prime Self-Service release contains a 
fix for this vulnerability:
· RSA Authentication Manager Prime Self-Service version 3.1 1915.42871
 RSA recommends all customers upgrade to the version listed above at the 
earliest opportunity.
Credit
RSA would like to thank Frank Gifford of Praetorian (https://praetorian.com/) 
for reporting this vulnerability.
Severity Rating:
For an explanation of Severity Ratings, refer to the Knowledge Base Article, 
“Security Advisories Severity Rating” at 
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604. RSA 
recommends all customers take into account both the base score and any relevant 
temporal and environmental scores which may impact the potential severity 
associated
Obtaining Download Instructions:
Contact RSA Customer Service to open a ticket to obtain the fixed version.  

RSA Link:  For product information, access to downloads, support and 
documentation, join RSA Link at support.rsa.com Each product has  its own space 
that is your one stop for product support.

Note:  In order to provide the best online support experience possible, we are 
moving all product support to RSA Link.  To continue receiving product 
notifications, access to product downloads and documentation, please log into 
RSA Link with the same user name and password you use today for SecurCare 
Online (SCOL) and you will be added to RSA Link product advisories. 

EOPS Policy:
RSA has a defined End of Primary Support policy associated with all major 
versions. Please refer to the link below for additional details. 
https://community.rsa.com/docs/DOC-40387

About RSA SecurCare Notes & Security Advisories Subscription
RSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA 
sends you based on the RSA product family you currently use. If you’d like to 
stop receiving RSA SecurCare Notes & Security Advisories, log on to RSA 
SecurCare Online at 
https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the 
instructions on the page, remove the check mark next to the applicable RSA 
product family . Click the Submit button to save your selection. Please note: 
by discontinuing these emails, you will not receive notifications of upgrades, 
outages, or fixes..

Sincerely,
RSA Customer Support
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iQEcBAEBAgAGBQJXqM98AAoJEHbcu+fsE81ZP4kH/3c6nNKNaW9DMOg1289duOAC
nvTunsamo4kynkp+4D79XDFXAAjFSTbNFS1o7LAq4tkXX2g1qWbokeeeLTybNc08
mQvxl/FavOv0IU8IILMu/SmSgbzpf1TVizVC+3GjufrtXLYidMvWJx5ofbQPZukI
oB++mECwQ1cfGNM31rrABkLQl9q2/wOqUbpLYZYNOo2jOL9vPDqlzWR9n8gYbu2N
eq6ceDkJ0/aWF/ZUQLxmYUfPe2VZBA7tpwo2P+ZqocfH7SApmfnWX0vhMVA4Zelv
5FgEPcdpAiHWQ1PunV79I9vLcczCaOCpVLB+YH8KgqhbZutRg8fKZp3dJNpC8PE=
=p1pU
-END PGP SIGNATURE-


[security bulletin] HPSBGN03633 rev.1 - HPE Release Control, Remote Denial of Service (DoS), Disclosure of Information, Unauthorized Access to Files or Server-Side Request Forgery(SSRF)

2016-08-03 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05219560

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05219560
Version: 1

HPSBGN03633 rev.1 - HPE Release Control, Remote Denial of Service (DoS),
Disclosure of Information, Unauthorized Access to Files or Server-Side
Request Forgery(SSRF)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-08-03
Last Updated: 2016-08-03

Potential Security Impact: Remote Denial of Service (DoS), Disclosure of
Information, Unauthorized Access to Files, Server-Side Request Forgery (SSRF)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential vulnerabilities have been identified in HPE Release Control. The
vulnerabilities could be exploited remotely to allow denial of service (DoS),
disclosure of information, unauthorized access to files or server-side
request forgery (SSRF).

References:

CVE-2016-4374
PSRT110198

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Release Control Software 9.13, 9.20, 9.21 Server

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4374
  4.7 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
  4.9 (AV:N/AC:M/Au:S/C:P/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerabilities in the impacted versions of HPE Release Control:

For versions 9.13, 9.20, 9.21:

Upgrade to RC 9.21.P4

RC 9.21 P4 package,

RC 9.21.0005 p4 (Windows)

https://softwaresupport.hpe.com/km/KM02224038

RC 9.21.0005 p4 (Linux)

https://softwaresupport.hpe.com/km/KM02224048

HISTORY
Version:1 (rev.1) - 3 August 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXohxOAAoJEGIGBBYqRO9/tbsH/A98rssKZgASrMN07J0Qk6PU
lLqoybATLOFqTv7lCyVSWPHrfo8CFX0EZcRF1KX7nu1zI0uMca87wXAc/rPjORSx
xQpaoJiEbxAotj0UviMxQBoKxOEIIrkXZywKcEOjIXpKVt5VhgUwWDilIG86MIOs
5lJfgIQGIuBOBYxI11p34h8MlMkDJRx0cYvojo46bVJOzYGoipSa91APPr2N+EJ6
EV1TooKh3gRgoDBQc+Pam+19H8Gy/SN3JO8gGvxGxez3xGUcYL19ROR1dop2pYuA
EIITMf1gH9qhFk2Ty7Jcr7yESTNF2PoKd6dqqGXqKfVROvL1TqilS8ijVgTZRqU=
=2ao0
-END PGP SIGNATURE-


[security bulletin] HPSBGN03564 rev.2 - HPE Release Control using Java Deserialization, Remote Code Execution

2016-08-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05063986

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05063986
Version: 2

HPSBGN03564 rev.2 - HPE Release Control using Java Deserialization, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-03-29
Last Updated: 2016-08-01

Potential Security Impact: Remote Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in Apache Commons Collections for handling Java object
deserialization was addressed by HPE Release Control. The vulnerability could
be exploited remotely to allow code execution.

References:

CVE-2016-1999
PSRT110197

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Release Control Software 9.13, 9.20, 9.21 Server

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-1999
  8.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE Release Control:

For versions 9.13, 9.20, 9.21:

Upgrade to RC 9.21 P4

RC 9.21 P4 package,

RC 9.21.0005 p4 (Windows)

https://softwaresupport.hpe.com/km/KM02224038

RC 9.21.0005 p4 (Linux)

https://softwaresupport.hpe.com/km/KM02224048

HISTORY
Version:1 (rev.1) - 28 March 2016 Initial release
Version:2 (rev.2) - 1 August 2016 Updated mitigation

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXn6NKAAoJEGIGBBYqRO9/94EH/3cyGPwdoIUiz9JYBtu1oa6h
qNpE/KYss/sIjnbIZ/4oEMyV1ltFgXwG0NqiIchTNBtS8DERfRZ+4n3e7PiTrXcp
KDtTXPnwTTY4nctBHYLKTD9qGPacGndpE28ZRRUadm5a9FO8t4e7cKhX9pjoXgEg
eaGOtJ9yVZrU4HG4OkwDCDZVeq05XmlPgwQoYpMRzo4braMzyd0MzY5vmMZEJ/AC
vLiP+js9Rgvq/Wo/IgFrJm60J1OwArmWbEpUNOmeoeJzEURSSIhvmMCRMIx+mfvx
mx7CX4jp9tFjlJYunjeuCRU3bXKMyhnpNhiS6MIAgGYjI1uSO8uXDrZlaH9VuNE=
=cTP7
-END PGP SIGNATURE-


[security bulletin] HPSBUX03632 SSRT110194 rev.1 - HP-UX Mail Server running Sendmail, Local Unauthorized Disclosure of Information

2016-08-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05216368

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05216368
Version: 1

HPSBUX03632 SSRT110194 rev.1 - HP-UX Mail Server running Sendmail, Local
Unauthorized Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-08-01
Last Updated: 2016-08-01

Potential Security Impact: Unauthorized Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in the HP-UX Mail
Server running Sendmail. This vulnerability could be locally exploited to
allow unauthorized disclosure of information.

References:

CVE-2014-3956
PSRT110194

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPUX-MailServer B.11.31 prior to C.8.15.2.1

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2014-3956
  2.9 CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has provided the following software updates to resolve the vulnerability
in the HPUX-MailServer.

HPUX-MailServer C.8.15.2.1 for HP-UX Release B.11.31 (PA and IA)

Depot: HP_UX_11.31_HPUX-MailServer_C.8.15.2.1_HP-UX_B.11.31_IA_PA.depot

Note: The depot files can be found here:

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber
=SMAIL815

MANUAL ACTIONS: Yes - Update

Download and install the software update

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HPE and lists recommended actions that may apply to a specific
HP-UX system. It can also download patches and create a depot automatically.
For more information see: https://h20392.www2.hpe.com/portal/swdepot/displayP
roductInfo.do?productNumber=B6834AA

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31 IA/PA
===
Sendmail.SENDMAIL-RUN

action: install revision C.8.15.2.1 or subsequent

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 1 August 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXn4vLAAoJEGIGBBYqRO9/vnsH/3tZI3RXQS6uvZaJcg8w+PSD
mXxJImwWvpGsoltTJe3X3h0swS37yFGZl0hQuB2PrSyN609dwFTUXPsapT6jTSNn

[security bulletin] HPSBST03603 rev.1 - HPE StoreVirtual Products running LeftHand OS using glibc, Remote Arbitrary Code Execution, Denial of Service (DoS)

2016-07-26 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05212266

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05212266
Version: 1

HPSBST03603 rev.1 - HPE StoreVirtual Products running LeftHand OS using
glibc, Remote Arbitrary Code Execution, Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-07-26
Last Updated: 2016-07-26

Potential Security Impact: Remote Arbitrary Code Execution, Denial of Service
(DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HPE StoreVirtual products running LeftHand OS has addressed stack based
buffer overflows in glibc's implementation of getaddrinfo(). This
vulnerability could be remotely exploited to cause Denial of Service (DoS) or
allow execution of arbitrary code on the host with the permissions of a user
running glibc library.

References:

  - CVE-2015-7547
  - PSRT110117

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP StoreVirtual VSA Software 12.6
  - HP StoreVirtual 4130 600GB SAS Storage 12.6
  - HP StoreVirtual 4130 600GB China SAS Storage 12.6
  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6
  - HP StoreVirtual 4330 450GB SAS Storage 12.6
  - HP StoreVirtual 4330 900GB SAS Storage 12.6
  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6
  - HP StoreVirtual 4330 450GB China SAS Storage 12.6
  - HP StoreVirtual 4330 900GB China SAS Storage 12.6
  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6
  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6
  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6
  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6
  - HP StoreVirtual 4530 450GB SAS Storage 12.6
  - HP StoreVirtual 4530 600GB SAS Storage 12.6
  - HP StoreVirtual 4630 900GB SAS Storage 12.6
  - HP StoreVirtual 4730 600GB SAS Storage 12.6
  - HP StoreVirtual 4730 900GB SAS Storage 12.6
  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6
  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4335 China Hybrid Storage 12.6
  - HP StoreVirtual 4335 Hybrid Storage 12.6
  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6
  - HP StoreVirtual 4130 600GB China SAS Storage 12.6
  - HP StoreVirtual 4130 600GB SAS Storage 12.6
  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6
  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6
  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4330 450GB China SAS Storage 12.6
  - HP StoreVirtual 4330 450GB SAS Storage 12.6
  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4330 900GB China SAS Storage 12.6
  - HP StoreVirtual 4330 900GB SAS Storage 12.6
  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6
  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6
  - HP StoreVirtual 4335 China Hybrid SAN Solution 12.6
  - HP StoreVirtual 4335 China Hybrid Storage 12.6
  - HP StoreVirtual 4335 Hybrid SAN Solution 12.6
  - HP StoreVirtual 4335 Hybrid Storage 12.6
  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6
  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6
  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4530 450GB SAS Storage 12.6
  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6
  - HP StoreVirtual 4530 600GB SAS Storage 12.6
  - HP StoreVirtual 4530 600GB SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4630 900GB SAS Storage 12.6
  - HP StoreVirtual 4730 600GB SAS Storage 12.6
  - HP StoreVirtual 4730 600GB SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4730 900GB SAS Storage 12.6
  - HP StoreVirtual 4730 900GB SAS Storage/S-Buy 12.6
  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-7547
  5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has made the following software updates available to resolve the
vulnerability with glibc for all of the impacted HPE StoreVirtual products.

  - LeftHand OS 12.6 - patch 56001
  - LeftHand OS 12.5 - patch 55015

  **Notes:**

  - These patches will upgrade glibc to 2.12-1.166 to resolve this issue.
  - Patches are available through StoreVirtual Online Upgrades and at the
following location:


[security bulletin] HPSBGN03630 rev.1 - HP Operations Manager for Unix, Solaris, and Linux using Apache Commons Collections (ACC), Remote Code Execution

2016-07-25 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05206507

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05206507
Version: 1

HPSBGN03630 rev.1 - HP Operations Manager for Unix, Solaris, and Linux using
Apache Commons Collections (ACC), Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-07-25
Last Updated: 2016-07-25

Potential Security Impact: Remote Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in Apache Commons Collections (ACC) for handling Java object
deserialization was addressed in the AdminUI of HP Operations Manager for
Unix, Solaris and Linux. The vulnerability could be exploited remotely to
allow remote code execution.

References:

CVE-2016-4373
CERT-VU#576313
PSRT110183

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP Operations Manager for Unix - v9.20.x, v9.21.x and versions prior to
v9.21.130
HP Operations Manager for Solaris - v9.20.x, v9.21.x and versions prior to
v9.21.130
HP Operations Manager for Linux - v9.20.x, v9.21.x and versions prior to
v9.21.130

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4373
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HP Operations Manager for
Unix/Solaris/Linux.

Please download the HP OM 9.21.130 patch from the following location:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM322544?lang=en=us=202392_SSO_PRO_HPE

HISTORY
Version:1 (rev.1) - 25 July 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXll8sAAoJEGIGBBYqRO9//BkIAIJdQNzOivSL9Fwg9A7c7fJV
r8urZxgde0P+ytbeR06MTHDyQRw4laDVQSD1X8Tfc7cZem9e/ZEdIikvP0TJba0c
K1dawYL5pkORfr2Rh4xGfspCmsKx8ScIWg2cLxHjlIzShS5MZ4Gs0IHCGeaRQ5hU
sUffI68XmDtCMmU7ROyNn9UiluJ52A3a+OzlwQSd2FmaofPnYQAWBGef7LbddCkh
Amq35vttAA+QVg2MC60eXiAT5Udd3vb22aHTiyyqTPocQI4sTq0q6VMOLxJjRjT1
RXjJbW7VZeoHuG6o3S27BxCO1dwEzmc9lIJXAdZXfs+VUD0OhiLmXEuPXUD9J/c=
=emi1
-END PGP SIGNATURE-


[security bulletin] HPSBGN03631 rev.1 - HPE IceWall Identity Manager and HPE IceWall SSO Password Reset Option running Apache Commons FileUpload, Remote Denial of Service (DoS)

2016-07-21 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05204371

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05204371
Version: 1

HPSBGN03631 rev.1 - HPE IceWall Identity Manager and HPE IceWall SSO Password
Reset Option running Apache Commons FileUpload, Remote Denial of Service
(DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-07-21
Last Updated: 2016-07-21

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HPE IceWall
Identity Manager and HPE IceWall SSO Password Reset Option running Apache
Commons FileUpload. The vulnerability could be exploited remotely resulting
in a Denial of Service (DoS).

References:

  - CVE-2016-3092
  - PSRT110185

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

IceWall Identity Manager 5.0 using Apache Commons FileUpload
IceWall SSO Password Reset Option 10.0 using Apache Commons FileUpload

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-3092
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE recommends updating the latest version of Apache Commons FileUpload to
resolve this vulnerability.

HPE IceWall product customers can download a procedure to update Apache
Commons FileUpload from the following location:

  http://www.hpe.com/jp/icewall_patchaccess

HISTORY
Version:1 (rev.1) - 21 July 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXkUK8AAoJEGIGBBYqRO9/IMMIAKthDBqjv9WjIJhcUn0eHSQG
V2j8A7IcSrV2FkPXYM0sTrQe9FheE5PKAxN5wC0fx0jbfKEwHQRoqwvmMwNqqyQG
PiS2F5SqsfIsVPY7zGg21App+sy8yMaLUajlWLWzA8Tu2cZGRuJgvZkvGT8t5RPA
HjJFiz0bVmU0v5JrnJyaHBo+4Jtoiy/hFMsS1JguN0edhoPmpYNisSVlBtFkIoSX
eOceeH3s4yZzpbJdnk4bTJOozh0FHzZZ4cU0VijpEHPSFZl6u6S7Br8Bhyq3OX6m
d6FCm/OKIhrEfcMc3z/ksh8tPrjEw4T9iRlGXjjGYLdm6TOCRuUtDRzxHsqLZcI=
=9TEP
-END PGP SIGNATURE-


[security bulletin] HPSBMU03562 rev.3 - HPE Service Manager using Java Deserialization, Remote Arbitrary Code Execution

2016-07-15 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05054565

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05054565
Version: 3

HPSBMU03562 rev.3 - HPE Service Manager using Java Deserialization, Remote
Arbitrary Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-03-21
Last Updated: 2016-07-14

Potential Security Impact: Remote Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in Apache Commons Collections for handling Java object
deserialization was addressed by HPE Service Manager. The vulnerability could
be exploited remotely to allow remote code execution.

References:

CVE-2016-1998
PSRT110060

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Service Manager Software 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41
Server, Web-Tier, Windows Client, Service Request Catalog

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-1998
  7.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

Acknowledgement: The Hewlett-Packard Company thanks Markus Wulftange of Code
White GmbH for reporting this vulnerability to security-al...@hp.com.

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE Service Manager:

For versions 9.30, 9.31, 9.32, 9.33, 9.34:

Upgrade to SM 9.35.P4 (recommended) or SM 9.34.P5

SM9.35 P4 package,

SM 9.35 ServiceRequestCatalog 9.35.0015 p4

https://softwaresupport.hpe.com/km/KM02143502

SM 9.35 AIX Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143332

SM 9.35 HP Itanium Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143206

SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143388

SM 9.35 Linux Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143530

SM 9.35 Solaris Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143276

SM 9.35 Windows Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143589

SM 9.35 Webtier 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143447

SM 9.35 Windows Client 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143645

SM 9.34.P5 package, AIX Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310304

HP Itanium Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02311066

Linux Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310566

Solaris Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02311656

Windows Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310486

Webtier 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310375

Windows Client 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310620

ServiceRequestCatalog 9.34.0011 p5

https://softwaresupport.hpe.com/km/KM02310439

For version 9.35:

Upgrade to SM 9.35.P4

SM9.35 P4 package, SM 9.35 ServiceRequestCatalog 9.35.0015 p4

https://softwaresupport.hpe.com/km/KM02143502

SM 9.35 AIX Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143332

SM 9.35 HP Itanium Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143206

SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143388

SM 9.35 Linux Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143530

SM 9.35 Solaris Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143276

SM 9.35 Windows Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143589

SM 9.35 Webtier 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143447

SM 9.35 Windows Client 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143645

For versions 9.40, 9.41:

Upgrade to SM 9.41.P3

SM9.41.P3 package, Service Manager 9.41.3016 p3 - Server for AIX

https://softwaresupport.hpe.com/km/KM02236813

Service Manager 9.41.3016 p3 - Server for HP-UX/IA

https://softwaresupport.hpe.com/km/KM02236897

Service Manager 9.41.3016 p3 - Server for Linux

https://softwaresupport.hpe.com/km/KM02236827

Service Manager 9.41.3016 p3 - Server for Solaris

https://softwaresupport.hpe.com/km/KM02236843

Service Manager 9.41.3016 p3 - Server for Windows

https://softwaresupport.hpe.com/km/KM02236929

Service Manager 9.41.3016 p3 - Web Tier

https://softwaresupport.hpe.com/km/KM02236883

Service Manager 9.41.0039 p3  ServiceRequestCatalog

https://softwaresupport.hpe.com/km/KM02236911

Service Manager 9.41.3016 p3 - Windows Client

https://softwaresupport.hpe.com/km/KM02236857


[security bulletin] HPSBHF03608 rev.1 - HPE iMC PLAT and other Network Products using Apache Java Commons Collection (ACC), Remote Execution of Arbitrary Code

2016-07-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05200601

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05200601
Version: 1

HPSBHF03608 rev.1 - HPE iMC PLAT and other Network Products using Apache Java
Commons Collection (ACC), Remote Execution of Arbitrary Code

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-07-11
Last Updated: 2016-07-11

Potential Security Impact: Remote Execution of Arbitrary Code

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in Apache Commons Collections (ACC) for handling Java object
deserialization was addressed by HPE iMC PLAT and other network products. The
vulnerability could be exploited remotely to allow execution of arbitrary
code.

References:

  - CVE-2016-4372
  - CERT-VU#576313
  - PSRT110005, PSRT110121

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE iMC PLAT - all versions prior to 7.2 E0403P04
  - HPE IMC EAD - all versions prior to 7.2 E0405P05
  - HPE IMC APM - all versions prior to 7.2 E0401P04
  - HPE IMC NTA - all versions prior to 7.2 E0401P01
  - HPE IMC BIMS - all versions prior to 7.2 E0402P02
  - HPE IMC UAM_TAM - all versions prior to 7.2 E0405P05

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4372
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has released the following software updates to resolve the vulnerability
in iMC PLAT and other network products.

  + **iMC PLAT - Version: Fix in version iMC PLAT 7.2 E0403P04 or later**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU

  + **iMC UAM_TAM - Version: Fix in version iMC UAM_TAM 7.2 E0405P3 or
later**
* HP Network Products
  - JF388A HP IMC UAM S/W MODULE W/200-USER LICENSE
  - JF388AAE HP IMC UAM S/W MODULE W/200-USER E-LTU
  - JG752AAE HP IMC UAM SW MOD W/ 50-USER E-LTU
  - JG483A HP IMC TAM S/W MODULE W/100-NODE LIC
  - JG483AAE HP IMC TAM S/W MODULE W/100-NODE E-LTU
  - JG764AAE HP IMC TAM SW MOD W/ 50-NODE E-LTU

  + **iMC EAD - Version: Fix in version iMC EAD 7.2 E0405P05 or later**
* HP Network Products
  - JD147A HP IMC Endpoint Admission Defense Software Module with
200-user License
  - JF391A HP IMC Endpoint Admission Defense Software Module with
200-user License
  - JF391AAE HP IMC Endpoint Admission Defense Software Module with
200-user E-LTU
  - JG754AAE HP IMC Endpoint Admission Defense Software Module with
50-user E-LTU

  + **iMC APM - Version: Fix in version iMC APM 7.2 E0401P04 or later**
* HP Network Products
  - JG489A HP IMC Application Performance Manager Software Module with
25-monitor License
  - JG489AAE HP IMC Application Performance Manager Software Module with
25-monitor E-LTU

  + **iMC NTA - Version: Fix in version iMC NTA 7.2 E0401P01 or later**
* HP Network Products
  - JD002A HP IMC DIG Software Probe License
  - JD140A HP IMC NTA Software Module w/10-node License
  - JF384A HP IMC Network Traffic Analyzer Software Module with 10-node
License
  - JF384AAE HP IMC Network Traffic Analyzer Software Module with 10-node
E-LTU
  - JF409A HP IMC DIG Software Probe License
  - JF409AAE HP IMC DIG Software Probe E-LTU
  - JG750AAE HP IMC Network Traffic Analyzer Software Module with 5-node
E-LTU

  + **iMC BIMS - Version: Fix in version iMC BIMS E0402P02 or later**
* HP Network Products
  - JG265A HP IMC Branch 

[security bulletin] HPSBGN03628 rev.1 - HPE IceWall Federation Agent using libXML2 library, Remote Denial of Service (DoS), Unauthorized Modification, Unauthorized Disclosure of Information

2016-07-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05194709

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05194709
Version: 1

HPSBGN03628 rev.1 - HPE IceWall Federation Agent using libXML2 library,
Remote Denial of Service (DoS), Unauthorized Modification, Unauthorized
Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-07-07
Last Updated: 2016-07-07

Potential Security Impact: Remote Denial of Service (DoS), Unauthorized
Disclosure of Information, Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in the libXML2 library could potentially impact HPE
IceWall Federation Agent resulting in Remote Denial of Service (DoS), or
unauthorized modification, or unauthorized disclosure of information.

References:

  - CVE-2016-4447: Remote Denial of Service (DoS)
  - CVE-2016-4448: Remote unauthorized disclosure of information,
unauthorized modification, Denial of Service (DoS)
  - CVE-2016-4449: Remote unauthorized disclosure of information, Denial of
Service (DoS)
  - PSRT110164

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - IceWall Federation Agent Version 3.0 (RHEL 6/7) using libXML2

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4447
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-4448
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2016-4449
  7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
  5.8 (AV:N/AC:M/Au:N/C:P/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE recommends applying the latest OS vendor security patches for libXML2 to
resolve the vulnerabilities in the libXML2 library.

HISTORY
Version:1 (rev.1) - 7 July 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXftEgAAoJEGIGBBYqRO9/WkkIALPGv8/vyMgCeVggDdi/7wdS
t1k3+Ap6qeaSvcLE6qqTxbSXfeztFXniEimKuHySB42vcOAdRrUi/br+A6e2o/4B
RgC7GSFNplGoHjdPnqQvONNq1VUKLiYuAtf3bczy8ymGpLBFx5jogQoeYbNSxSQ9
yoqQ1VJKZgUluzdQVU3CSPCGyFu5RqAx8lRz7IQrkbRkihNJOXuTwRg+VRnN6Hjj
aUdDEF7MvqVf92mGDoqoK32cNzPji/wfTPWBN8Z9jEmsLX+I1t0t0j3dEutAHoj8
APy2ZYeEgUyu1+9U645z5ofXRXr6EYsdgeCdf0KJ0a0K+Xn9qKU2CM58TIsxtiE=
=1zE0
-END PGP SIGNATURE-


ESA-2016-054: EMC Avamar Data Store and Avamar Virtual Edition Unauthorized Data Access Vulnerability

2016-07-06 Thread Security Alert



-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2016-054: EMC Avamar Data Store and Avamar Virtual Edition Unauthorized 
Data Access Vulnerability

EMC Identifier: ESA-2016-054

CVE Identifier: CVE-2016-0906

Severity Rating: 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Affected products:  
•   EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) all 
supported versions prior to 7.3.0

Summary:  
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) have released a 
fix for a vulnerability that may potentially lead to denial of service and data 
disclosure.

Details:
When restoring backups of Linux Avamar clients using the web restore interface, 
a malicious Avamar Client user may read and/or delete critical directories on 
the Avamar Server. This may lead to a denial-of-service attack on the Avamar 
Server, or unauthorized access to Avamar Server data by the malicious Avamar 
Client user. 

Resolution:  
The following HOTFIXES contain the resolution to this issue.
•   EMC Avamar version 7.2.1 – HOTFIX 256706
•   EMC Avamar version 7.1.2 – HOTFIX 256730

Note: EMC Avamar 7.3.0 and above are not vulnerable to this issue.

EMC recommends all customers apply the Hot Fix at the earliest opportunity. 
Contact EMC Avamar Customer Support at https://support.emc.com for any 
questions regarding this advisory and reference this article number.  


Link to remedies:

Customers can download and apply the following hotfixes:

 ftp://avamar_ftp:anonym...@ftp.avamar.com/software/hotfixes/256706

ftp://avamar_ftp:anonym...@ftp.avamar.com/software/hotfixes/256730

Follow the instructions in the README.htm page.


Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC recommends that all users determine the applicability of this information 
to their individual situations and take appropriate action. The information set 
forth herein is provided "as is" without warranty of any kind. EMC disclaims 
all warranties, either express or implied, including the warranties of 
merchantability, fitness for a particular purpose, title and non-infringement. 
In no event, shall EMC or its suppliers, be liable for any damages whatsoever 
including direct, indirect, incidental, consequential, loss of business profits 
or special damages, even if EMC or its suppliers have been advised of the 
possibility of such damages. Some states do not allow the exclusion or 
limitation of liability for consequential or incidental damages, so the 
foregoing limitation may not apply.


EMC Product Security Response Center
security_al...@emc.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAld82sEACgkQtjd2rKp+ALxkeQCgqDul3QfIo9aL/3tG8gfaBfTS
whsAoNnvweiMzgYfVfUjKqyq8Kqp9c8c
=79Xw
-END PGP SIGNATURE-


[security bulletin] HPSBHF03613 rev.1 - HPE Network Products including iMC, VCX, and Comware using OpenSSL, Remote Denial of Service (DoS), Unauthorized Access

2016-07-05 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05184351

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05184351
Version: 1

HPSBHF03613 rev.1 - HPE Network Products including iMC, VCX, and Comware
using OpenSSL, Remote Denial of Service (DoS), Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-07-05
Last Updated: 2016-07-05

Potential Security Impact: Remote Denial of Service (DoS), Unauthorized
Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities in OpenSSL have been addressed with HPE
network products including iMC, VCX, Comware 5 and Comware 7. The
vulnerabilities could be exploited remotely resulting in Denial of Service
(DoS) or unauthorized access.

References:

  - CVE-2014-8176 - Remote Denial of Service (DoS)
  - CVE-2015-1788 - Remote Denial of Service (DoS)
  - CVE-2015-1789 - Remote Denial of Service (DoS)
  - CVE-2015-1790 - Remote Denial of Service (DoS)
  - CVE-2015-1791 - Remote Denial of Service (DoS)
  - CVE-2015-1792 - Remote Denial of Service (DoS)
  - CVE-2015-1793 - Remote Unauthorized Access
  - PSRT110158, SSRT102264

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

Please refer to the RESOLUTION
 below for a list of impacted products.
All product versions are impacted prior to the fixed versions listed.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2014-8176
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2015-1788
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2015-1789
  3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2015-1790
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-1791
  5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2015-1792
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-1793
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION
HPE has released the following software updates to resolve the
vulnerabilities in the HP network products including iMC, VCX, Comware 5 and
Comware 7.

**COMWARE 5 Products**

  + **A6600 (Comware 5) - Version: R3303P23**
* HP Network Products
  - JC165A HP 6600 RPE-X1 Router Module
  - JC177A HP 6608 Router
  - JC177B HP 6608 Router Chassis
  - JC178A HP 6604 Router Chassis
  - JC178B HP 6604 Router Chassis
  - JC496A HP 6616 Router Chassis
  - JC566A HP 6600 RSE-X1 Router Main Processing Unit
  - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
  - JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit
  + **HSR6602 (Comware 5) - Version: R3303P23**
* HP Network Products
  - JC176A HP 6602 Router Chassis
  - JG353A HP HSR6602-G Router
  - JG354A HP HSR6602-XG Router
  - JG355A HP 6600 MCP-X1 Router Main Processing Unit
  - JG356A HP 6600 MCP-X2 Router Main Processing Unit
  - JG776A HP HSR6602-G TAA-compliant Router
  - JG777A HP HSR6602-XG TAA-compliant Router
  - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
  + **HSR6800 (Comware 5) - Version: R3303P23**
* HP Network Products
  - JG361A HP HSR6802 Router Chassis
  - JG361B HP HSR6802 Router Chassis
  - JG362A HP HSR6804 Router Chassis
  - JG362B HP HSR6804 Router Chassis
  - JG363A HP HSR6808 Router Chassis
  - JG363B HP HSR6808 Router Chassis
  - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
  - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
  + **MSR20 (Comware 5) - Version: R2514P10**
* HP Network Products
  - JD432A HP A-MSR20-21 Router
  - JD662A HP MSR20-20 Router
  - JD663A HP A-MSR20-21 Router
  - JD663B HP MSR20-21 Router
  - JD664A HP MSR20-40 Router
  - JF228A HP MSR20-40 Router
  - JF283A HP MSR20-20 Router
  + **MSR20-1X  (Comware 5) - Version: R2514P10**
* HP Network Products
  - JD431A HP MSR20-10 Router
  - JD667A HP MSR20-15 IW Multi-Service Router
  - JD668A HP MSR20-13 Multi-Service Router
  - JD669A HP MSR20-13 W Multi-Service Router
  - JD670A HP MSR20-15 A Multi-Service Router
  - JD671A HP MSR20-15 AW Multi-Service Router
  - JD672A HP MSR20-15 I Multi-Service Router
 

[security bulletin] HPSBGN03627 rev.1 - HPE Service Manager using OpenSSL, Remote Disclosure of Information

2016-07-04 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05193347

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05193347
Version: 1

HPSBGN03627 rev.1 - HPE Service Manager using OpenSSL, Remote Disclosure of
Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-07-01
Last Updated: 2016-07-01

Potential Security Impact: Remote Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HPE Service
Manager. This is the RC4 stream cipher vulnerability in SSL/TLS known as "Bar
Mitzvah" could be exploited remotely to allow disclosure of information.

References:

CVE-2015-2808
PSRT110156

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Service Manager Software versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-2808
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE Service Manager: https://softw
aresupport.hpe.com/group/softwaresupport/search-result/-/facetsearch/document
/KM01566352

For versions 9.30, 9.31, 9.32, 9.33, 9.34 please:

Upgrade to SM 9.35.P4 (recommended) or SM 9.34.P5

SM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143332

SM 9.35 HP Itanium Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143206

SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143388

SM 9.35 Linux Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143530

SM 9.35 Solaris Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143276

SM 9.35 Windows Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143589

SM 9.34.P5 package, AIX Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310304

HP Itanium Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02311066

Linux Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310566

Solaris Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02311656

Windows Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310486

For version 9.35 please:

Upgrade to SM 9.35.P4

SM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143332

SM 9.35 HP Itanium Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143206

SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143388

SM 9.35 Linux Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143530

SM 9.35 Solaris Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143276

SM 9.35 Windows Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143589

For version 9.40 please:

Upgrade to SM 9.41.P3

SM9.41.P3 package, Service Manager 9.41.3016 p3 - Server for AIX

https://softwaresupport.hpe.com/km/KM02236813

Service Manager 9.41.3016 p3 - Server for HP-UX/IA

https://softwaresupport.hpe.com/km/KM02236897

Service Manager 9.41.3016 p3 - Server for Linux

https://softwaresupport.hpe.com/km/KM02236827

Service Manager 9.41.3016 p3 - Server for Solaris

https://softwaresupport.hpe.com/km/KM02236843

Service Manager 9.41.3016 p3 - Server for Windows

https://softwaresupport.hpe.com/km/KM02236929

HISTORY
Version:1 (rev.1) - 1 July 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd 

[security bulletin] HPSBGN03626 rev.1 - HPE Service Manager using OpenSSL, Remote Disclosure of Information Logjam

2016-07-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05193083

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05193083
Version: 1

HPSBGN03626 rev.1 - HPE Service Manager using OpenSSL, Remote Disclosure of
Information Logjam

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-07-01
Last Updated: 2016-07-01

Potential Security Impact: Remote Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in TLS using US export-grade 512-bit keys in Diffie-Hellman
key exchange known as "Logjam" was addressed by HPE Service Manager. The
vulnerability could be remotely exploited to allow disclosure of information.

References:

CVE-2015-4000
PSRT110153

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Service Manager Software 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40 Server

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-4000
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE Service Manager:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM01728543

For versions 9.30, 9.31, 9.32, 9.33, 9.34 please:

Upgrade to SM 9.35.P4 (recommended) or SM 9.34.P5

SM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143332

SM 9.35 HP Itanium Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143206

SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143388

SM 9.35 Linux Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143530

SM 9.35 Solaris Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143276

SM 9.35 Windows Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143589

SM 9.34.P5 package, AIX Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310304

HP Itanium Server 9.34.5003 p5

<[https://softwaresupport.hpe.com/km/KM02311066>

Linux Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310566

Solaris Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02311656

Windows Server 9.34.5003 p5

https://softwaresupport.hpe.com/km/KM02310486

For versions 9.35 please:

Upgrade to SM 9.35.P4

SM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143332

SM 9.35 HP Itanium Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143206

SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143388

SM 9.35 Linux Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143530

SM 9.35 Solaris Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143276

SM 9.35 Windows Server 9.35.4001 p4

https://softwaresupport.hpe.com/km/KM02143589

For versions 9.40 please:

Upgrade to SM 9.41.P3

SM9.41.P3 package, Service Manager 9.41.3016 p3 - Server for AIX

https://softwaresupport.hpe.com/km/KM02236813

Service Manager 9.41.3016 p3 - Server for HP-UX/IA

https://softwaresupport.hpe.com/km/KM02236897

Service Manager 9.41.3016 p3 - Server for Linux

https://softwaresupport.hpe.com/km/KM02236827

Service Manager 9.41.3016 p3 - Server for Solaris

https://softwaresupport.hpe.com/km/KM02236843

Service Manager 9.41.3016 p3 - Server for Windows

https://softwaresupport.hpe.com/km/KM02236929

HISTORY
Version:1 (rev.1) - 1 July 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 

ESA-2016-069: EMC Documentum WebTop and WebTop Clients Improper Authorization Vulnerability

2016-06-22 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


ESA-2016-069: EMC Documentum WebTop and WebTop Clients Improper Authorization 
Vulnerability

EMC Identifier: ESA-2016-069

CVE Identifier: CVE-2016-0914

Severity Rating: CVSS v3 Base Score: 5.0 (AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)

Affected products:  
•   EMC Documentum WebTop 6.8 and 6.8.1  
•   EMC Documentum Administrator 7.0, 7.1, 7.2
•   EMC Documentum TaskSpace 6.7 SP3
•   EMC Documentum Capital Projects 1.9 and 1.10

Summary:  
EMC Documentum WebTop and WebTop dependent products contain a fix for improper 
authorization vulnerability that could potentially be exploited by malicious 
users to compromise the affected system. 
Details:  
Remote authenticated WebTop and WebTop Client users may gain access to the 
IAPI/IDQL interface in WebTop without proper authorization. Malicious users 
could exploit this vulnerability to run IAPI/IDQL commands on the affected 
systems using their own privilege.

Resolution:  
The following product releases contain resolution to this vulnerability:
EMC Documentum WebTop 6.8 Patch 13 and later 
•   EMC Documentum WebTop 6.8.1 patch 02 and later  
•   EMC Documentum Administrator 7.2 Patch 13 and later
•   EMC Documentum Capital Projects 1.9 Patch 23 and later
•   EMC Documentum Capital Projects 1.10 Patch 10 and later

EMC recommends all customers upgrade to one of the versions listed above at the 
earliest opportunity. In addition, Documentum Engineering is working to 
validate a code fix for Documentum TaskSpace. 
This ESA will be updated as code fixes become available.



Link to remedies:

Customers can download patches from support.emc.com or contact Documentum 
customer support to obtain the patches.
•   EMC Documentum Webtop: 
https://support.emc.com/downloads/5075_Documentum-Webtop
•   EMC Documentum Administrator: 
https://support.emc.com/downloads/2227_Documentum-Administrator
•   EMC Documentum Capital Projects: 
https://support.emc.com/downloads/33010_Documentum-Capital-Projects


Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC recommends that all users determine the applicability of this information 
to their individual situations and take appropriate action. The information set 
forth herein is provided "as is" without warranty of any kind. EMC disclaims 
all warranties, either express or implied, including the warranties of 
merchantability, fitness for a particular purpose, title and non-infringement. 
In no event, shall EMC or its suppliers, be liable for any damages whatsoever 
including direct, indirect, incidental, consequential, loss of business profits 
or special damages, even if EMC or its suppliers have been advised of the 
possibility of such damages. Some states do not allow the exclusion or 
limitation of liability for consequential or incidental damages, so the 
foregoing limitation may not apply.

EMC Product Security Response Center
security_al...@emc.com



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAldq1lsACgkQtjd2rKp+ALwcNQCgmRGy8ocPgvkDDJiQuJW2kjM3
5s4AnjaJRzUqHp8YYF0ryz0BYW3dYXOC
=NpUo
-END PGP SIGNATURE-


[security bulletin] HPSBNS03625 rev.1 - HPE NonStop Application Server for Java (NSASJ) running SSL/TLS, Remote Disclosure of Information

2016-06-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05176765

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05176765
Version: 1

HPSBNS03625 rev.1 - HPE NonStop Application Server for Java (NSASJ) running
SSL/TLS, Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-15
Last Updated: 2016-06-15

Potential Security Impact: Remote Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
NonStop Application Server for Java (NSASJ) has addressed the cross-protocol
Attack on TLS using SSLv2 also known as "DROWN". This vulnerability could be
exploited remotely resulting in disclosure of information.

  Note: NSASJ configurations that have enabled SSL/TLS are vulnerable if
SSLv2 is enabled or they share private keys with systems that have it
enabled.

References:

  - CVE-2016-0800
  - HS03325
  - PSRT110146

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
NonStop Application Server for Java (NSASJ) - all versions

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-0800(AV:N/AC:M/Au:N/C:P/I:N/A:N)   4.3
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has released the following information to resolve the vulnerability in
NonStop Application Server for Java (NSASJ).

To avoid the DROWN vulnerability, the SSLv2 protocol in NSASJ must explicitly
disabled.

The security protocol support in NSASJ is applied through security Realm
settings or through connectors that expose the interface. Disable the SSLv2
protocol either in the connector configuration or the security domain
configuration as shown below.

  **Secure Connector HTTPS and TLS/SSL**

  - To enable TLS/SSL support for a particular instance of a connector, the
secure attribute must be set to true. TLS/SSL support is enabled in the
default NSASJ HTTPS connector configuration.

  - Perform the following steps to complete the TLS/SSL setup:

1. Create a certificate keystore:

 $JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA
- -keystore /path/to/my/keystore

Enter a password when prompted.

2. Add a SSL tag in the connector configuration.

If the protocol attribute is not specified, SSLv2 is supported by
default. To disable SSLv2, specify the protocol attribute and do not include
SSLv2.

  The following is a sample configuration that enables only TLSv1.2:


  


  Due to protocol weaknesses, HPE also recommends to disable SSLv3 and
TLSv1.0 by excluding them from the protocol list.

**Applying security restrictions through Security Domains and Realms**

  - Restricting access to all containers and management interfaces of NSASJ
can be done by configuring security domains in appropriate Realms configured
in domain.xml and host.xml files.

  - Each Realm has a server-identities tag which has an ssl element. The
protocols attribute of this tag must be explicitly set to a protocol list
that does not include SSLv2 in order to disable it.

  The following is a sample configuration that enables only TLS 1.2:








 
 ...

**Note:** Please see NonStop Hotstuff HS03325 for additional information.

HISTORY
Version:1 (rev.1) - 15 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett 

[security bulletin] HPSBGN03553 rev.1 - HP OneView Products using glibc and OpenSSL, Multiple Remote Vulnerabilties

2016-06-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05176716

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05176716
Version: 1

HPSBGN03553 rev.1 - HP OneView Products using glibc and OpenSSL, Multiple
Remote Vulnerabilties

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-15
Last Updated: 2016-06-15

Potential Security Impact: Remote Arbitrary Code Execution, Denial of Service
(DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HP OneView has addressed stack based buffer overflows in glibc's
implementation of getaddrinfo() and also a vulnerability in OpenSSL. These
vulnerabilities could be remotely exploited to cause a Denial of Service
(DoS) or allow execution of arbitrary code on the host with the permissions
of the user running glibc library.

References:

  - CVE-2015-7547 - glibc: Remote Arbitrary Code Execution, Denial of Service
(DoS)
  - CVE-2016-0705 - OpenSSL: Remote Denial of Service (DoS)
  - PSRT110139, PSRT110061

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP OneView version 1.1,1.2 and 2.0

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-7547(AV:N/AC:M/Au:N/C:P/I:P/A:P)6.8
CVE-2016-0705(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following software patch available to resolve the
vulnerabilities with glibc and OpenSSL for HP OneView.

  - Upgrade HP OneView to patch version 2.00.07.

OneView patch version 2.00.07 is available from the following location:

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNu
mber=Z7550-63180

HISTORY
Version:1 (rev.1) - 15 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXYYWJAAoJEGIGBBYqRO9/Ft4IAIWFxZvDKr8LexxNhiYjbgCU
6OSs8aqcFKhzK23mkjFqS7sVDPafLsaa2i91YEfxIzUbA9Y3+xdb4mZxB2ePoXua
2bsQxIszjxyV6l4Jyqlkxg2xdMJjRLb/ZErtnM2wcuKeuZsom+fcLfY27LCN3cBj
9wSPzRjf/pC6TLJlcr0Hva1C2JuHZDJqjTzjR4hXKFquEVx4telOpYx6OikLt9K8
rgiKt1mUyK4d5LagPz1coo3kcCuHgQuxp/u3TSEXQmUJcJMjJ++SAhuPuf1lyWNe
FXnDo8090itin3FxeSIzc2n3nmMYop+FVDxelLxuXLu/PJujivHll51Llkmwo28=
=qCRK
-END PGP SIGNATURE-


ESA-2016-047: RSA Archer® GRC Platform Sensitive Information Disclosure Vulnerability

2016-06-13 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2016-047: RSA Archer® GRC Platform Sensitive Information Disclosure 
Vulnerability


EMC Identifier: ESA-2016-047

CVE Identifier: CVE-2016-0899

Severity Rating: CVSS v3 Base Score:  6.3 (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)
Affected Products:
·RSA Archer version 5.5.x
 
Summary: 
RSA Archer GRC 5.5.3.4 platform contains a fix designed to remedy a sensitive 
information disclosure vulnerability that could potentially be exploited by 
malicious users to compromise an affected system. 

Details: 
RSA Archer GRC is potentially affected by a sensitive information disclosure 
vulnerability. RSA Archer GRC on upgrade (to one of the affected versions 
mentioned above) creates a backup copy (.bak) of the web.config file. IIS on 
RSA Archer GRC allows an authenticated user to configure Multipurpose Internet 
Mail Extensions (MIME) type to allow reading/downloading .bak file. An attacker 
can make a HTTP request to read/download the .bak file which may contain 
sensitive information like RSA Archer webserver's username and password.
 
Recommendation:
 
RSA recommends all customers upgrade to the version mentioned below at the 
earliest opportunity.
·RSA Archer GRC 5.5.3.4
 
5.5 SP3 P4 installers are available through RSA SecureCare Online (SCOL) 
https://knowledge.rsasecurity.com/scolcms/

Severity Rating:
 For an explanation of Severity Ratings, refer to the Knowledge Base Article, 
“Security Advisories Severity Rating” at 
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604. RSA 
recommends all customers take into account both the base score and any relevant 
temporal and environmental scores which may impact the potential severity 
associated with particular security vulnerability.

Obtaining Downloads:
To obtain the latest RSA product downloads, log on to RSA SecurCare Online at 
https://knowledge.rsasecurity.com and click Products in the top navigation 
menu. Select the specific product whose download you want to obtain. Scroll to 
the section for the product download that you want and click on the link.

Obtaining Documentation:
To obtain the Platform documentation, log on to RSA Archer Community at 
https://community.emc.com/community/connect/grc_ecosystem/rsa_archer and click 
Documents in the top navigation menu. Select the specific category and the 
version tag of the Platform version you want. Scroll to the document that you 
want and click the document name. If you have any questions on the Community, 
please email archer_commun...@emc.com.

Severity Rating:
For an explanation of Severity Ratings, refer to the Knowledge Base Article, 
“Security Advisories Severity Rating” at 
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604. RSA 
recommends all customers take into account both the base score and any relevant 
temporal and environmental scores which may impact the potential severity 
associated with particular security vulnerability.

Obtaining More Information:
For more information about RSA Archer GRC in general, visit the public RSA web 
site at http://www.emc.com/security/rsa-archer.htm.

RSA Archer Community/Exchange:
https://community.emc.com/community/connect/grc_ecosystem/rsa_archer

Getting Support and Service:
For customers with current maintenance contracts, contact your local RSA 
Customer Support center with any additional questions regarding this RSA 
SecurCare Note. For contact telephone numbers or e-mail addresses, log on to 
RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help & 
Contact, and then click the Contact Us - Phone tab or the Contact Us - Email 
tab.

General Customer Support Information:
https://www.rsa.com/en-us/support

RSA SecurCare Online:
https://knowledge.rsasecurity.com

EOPS Policy:
RSA has a defined End of Primary Support policy associated with all major 
versions. Please refer to the link below for additional details. 
https://community.rsa.com/docs/DOC-40387

SecurCare Online Security Advisories
Read and use the information in this RSA Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein.  If 
you have any questions regarding this product alert, contact RSA Software 
Technical Support at 1-800-995-5095.  RSA Security LLC and its affiliates, 
including without limitation, its ultimate parent company, EMC Corporation, 
distribute RSA Security Advisories in order to bring to the attention of users 
of the affected RSA products, important security information.  RSA recommends 
that all users determine the applicability of this information to their 
individual situations and take appropriate action.   The information set forth 
herein is provided "as is" without warranty of any kind.   RSA disclaims all 
warranties, either express or implied, including the warranties of 
merchantability, fitness for a particular purpose, title and non-infringement.  
In no event shall RSA, its affiliates 

ESA-2016-062: EMC Data Domain Multiple Vulnerabilities

2016-06-10 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2016-062: EMC Data Domain Multiple Vulnerabilities

EMC Identifier: ESA-2016-062

CVE Identifier: CVE-2016-0911, CVE-2016-0912

Severity Rating: See below for individual scores for each CVE

Affected products:  
EMC Data Domain OS 5.4: All versions
EMC Data Domain OS 5.5: All versions
EMC Data Domain OS 5.6: All versions
EMC Data Domain OS 5.7: version 5.7.1.0 and below

Summary:  
EMC Data Domain contains fixes for multiple security vulnerabilities that could 
potentially be exploited by malicious users to compromise the affected system.

Details:  
•   CVE-2016-0911 - EMC Data Domain Insecure NFS Mount Options 
Vulnerability: 
Data Domain allows administrator level users to create NFS exports and 
no_root_squash is used by default which allows client to mount the NFS export 
as root.

CVSS v3 Base Score: 8.2 (AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)


•   CVE-2016-0912 - EMC Data Domain Insecure Password Reset Vulnerabilities:
Data Domain allows users to change their own password without providing the 
current password. Data Domain also allows malicious users who belong to certain 
roles to change passwords of other users belonging to the same role.
CVSS v3 Base Score: 6.8 (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Resolution:  
The following EMC Data Domain OS release contains resolutions to these 
vulnerabilities:

•   EMC Data Domain OS version 5.7.2.0

Note to Customers: 
EMC recommends customers to always configure all NFS exports with root_squash.
In addition, once you upgrade to the version mentioned above, we also recommend 
hardening the system by using registry settings to change the default from 
no_root_squash to root_squash. For additional information refer to knowledge 
base article - https://support.emc.com/kb/484174

EMC recommends all customers upgrade at the earliest opportunity. 

Link to remedies:

Registered EMC Online Support customers can download patches and software from 
support.emc.com at
https://support.emc.com/downloads/32697_DD-OS

If you have any questions, contact EMC support.


Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC recommends that all users determine the applicability of this information 
to their individual situations and take appropriate action. The information set 
forth herein is provided "as is" without warranty of any kind. EMC disclaims 
all warranties, either express or implied, including the warranties of 
merchantability, fitness for a particular purpose, title and non-infringement. 
In no event, shall EMC or its suppliers, be liable for any damages whatsoever 
including direct, indirect, incidental, consequential, loss of business profits 
or special damages, even if EMC or its suppliers have been advised of the 
possibility of such damages. Some states do not allow the exclusion or 
limitation of liability for consequential or incidental damages, so the 
foregoing limitation may not apply.

EMC Product Security Response Center
security_al...@emc.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAldamecACgkQtjd2rKp+ALxemQCgyUN2+FV29F6AeyOtottAC80Q
Zr0Amwf/OKvKxmvGeiqXyDfPKRAaP2ng
=dvHJ
-END PGP SIGNATURE-


[security bulletin] HPSBGN03617 rev.2 - HPE IceWall Federation Agent and IceWall File Manager using libXML2 library, Remote Denial of Service (DoS)

2016-06-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05157239

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05157239
Version: 2

HPSBGN03617 rev.2 - HPE IceWall Federation Agent and IceWall File Manager
using libXML2 library, Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-09
Last Updated: 2016-06-09

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in the libXML2 library could potentially impact HPE
IceWall Federation Agent and IceWall File Manager resulting in Remote Denial
of Service (DoS).

References:

  - CVE-2016-3627
  - CVE-2016-3705
  - PSRT110132

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - IceWall Federation Agent 3.0 using libXML2
  - IceWall File Manager 3.0 using libXML2

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-3627(AV:N/AC:L/Au:N/C:N/I:N/A:P)   5.0
CVE-2016-3705(AV:N/AC:L/Au:N/C:N/I:N/A:P)   5.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE recommends applying the latest OS vendor security patches for libXML2 to
resolve the vulnerabilities in the libXML2 library.

HISTORY
Version:1 (rev.1) - 9 June 2016 Initial release
Version:2 (rev.2) - 9 June 2016 Corrected content

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXWggfAAoJEGIGBBYqRO9/0JwIAM82/ev9SnVBJprHLNY4fZAJ
Jrha+4BhuYZJ/Sf2hgoaZVKcveW0Q5fWzrB59Pz5CoZiEeJk4qbmezF0E+iGOV17
W3huowscmTzd/0lM6B85lwH36oSc183VhBd+YrCrFPSwGP9h0xOUQkXpnEWWa9+f
L9MTPh++T266mukkGthtbpSK9l4b7GIXDQHIk9xphi6V9HQWbSaWKlWII9tcP45H
iLEZ1awphMRqY6WLA8WPCIWvH3LkPEizNP3UMBPt1lNS3g/zvAbPft96x0RMoP2A
RCe0eRzcyDMlkGnW8vJRZscwK649RlRdNZCAQGXsJdsV/cO/xhZO5a1HqLRPPwA=
=MiD+
-END PGP SIGNATURE-


ESA-2016-064: EMC Data Domain Information Disclosure Vulnerability

2016-06-09 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2016-064: EMC Data Domain Information Disclosure Vulnerability

EMC Identifier: ESA-2016-064

CVE Identifier: CVE-2016-0910

Severity Rating: CVSS v3 Base Score: 8.2 (AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
Affected products:  
EMC Data Domain OS 5.5: version 5.5.3.3 and below
EMC Data Domain OS 5.6: version 5.6.1.0 and below
EMC Data Domain OS 5.7: version 5.7.1.0 and below

Summary:  
EMC Data Domain is affected by an information disclosure vulnerability that 
could potentially be exploited by malicious users to compromise the affected 
system.

Details:  
Data Domain logs the session identifier of a user logged in via the GUI in a 
file that is accessible to all users. A malicious user could use the disclosed 
session identifier to take over the account of the victim, a GUI user whose 
session identifier was disclosed. 

Resolution:  
The following EMC Data Domain releases contain resolutions to these 
vulnerabilities:
•   EMC Data Domain OS 5.5: version 5.5.4.0
•   EMC Data Domain OS 5.6: hotfix version 5.6.1.004. Contact EMC Customer 
Support for access.
•   EMC Data Domain OS 5.7: version 5.7.2.0  
EMC strongly recommends all customers upgrade at the earliest opportunity. 

Link to remedies:

Registered EMC Online Support customers can download patches and software from 
support.emc.com at
https://support.emc.com/downloads/32697_DD-OS

If you have any questions, contact EMC support.

Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC recommends that all users determine the applicability of this information 
to their individual situations and take appropriate action. The information set 
forth herein is provided "as is" without warranty of any kind. EMC disclaims 
all warranties, either express or implied, including the warranties of 
merchantability, fitness for a particular purpose, title and non-infringement. 
In no event, shall EMC or its suppliers, be liable for any damages whatsoever 
including direct, indirect, incidental, consequential, loss of business profits 
or special damages, even if EMC or its suppliers have been advised of the 
possibility of such damages. Some states do not allow the exclusion or 
limitation of liability for consequential or incidental damages, so the 
foregoing limitation may not apply.

EMC Product Security Response Center
security_al...@emc.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAldYcLUACgkQtjd2rKp+ALy/vACgxyoNSugQqR4fu5yv0z8Ny4pj
34QAnRkLeIvgR7D4jGM5s3pbePKUpw1K
=erAR
-END PGP SIGNATURE-


ESA-2016-072: EMC NetWorker Remote Code Execution Vulnerability

2016-06-09 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2016-072: EMC NetWorker Remote Code Execution Vulnerability

EMC Identifier: ESA-2016-072
CVE Identifier: CVE-2016-0916
Severity Rating: CVSS v3 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 


Affected products:  
EMC NetWorker 8.2.1.0 and all versions after  

Summary:  
EMC NetWorker contains a fix for a remote code execution vulnerability that 
could potentially be exploited by malicious users to compromise NetWorker 
systems. 
Details: 
A remote attacker from a NetWorker instance may execute commands, 
unauthenticated, on another NetWorker instance due to an unsafe authentication 
mechanism. 

Resolution:  
The following EMC NetWorker release contains resolutions to these 
vulnerabilities:
•   EMC NetWorker version 8.2.2.6
•   EMC NetWorker version 8.2.3
•   EMC Networker version  9.0.0.6

EMC recommends all customers upgrade to one of the versions mentioned above at 
the earliest opportunity. 

Link to remedies:

Customers can download software from two different locations:
https://support.emc.com/downloads/1095_NetWorker



Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC recommends that all users determine the applicability of this information 
to their individual situations and take appropriate action. The information set 
forth herein is provided "as is" without warranty of any kind. EMC disclaims 
all warranties, either express or implied, including the warranties of 
merchantability, fitness for a particular purpose, title and non-infringement. 
In no event, shall EMC or its suppliers, be liable for any damages whatsoever 
including direct, indirect, incidental, consequential, loss of business profits 
or special damages, even if EMC or its suppliers have been advised of the 
possibility of such damages. Some states do not allow the exclusion or 
limitation of liability for consequential or incidental damages, so the 
foregoing limitation may not apply.


EMC Product Security Response Center
security_al...@emc.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAldYb98ACgkQtjd2rKp+ALx6VQCggMcR90kvL5XH3aDe/AoEwO0w
lwsAoMSzbQwZE4Z8oxp+7tOkk5IlqC2n
=d6dG
-END PGP SIGNATURE-


[security bulletin] HPSBMU03614 rev.1 - HPE Systems Insight Manager using Samba, Multiple Remote Vulnerabilities

2016-06-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05166182

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05166182
Version: 1

HPSBMU03614 rev.1 - HPE Systems Insight Manager using Samba, Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-07
Last Updated: 2016-06-07

Potential Security Impact: Remote Unauthorized Identification of Valid Users,
Unqualified Configuration Change

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in Samba could potentially impact HPE Systems
Insight Manager. These vulnerabilities could be remotely exploited using
man-in-the-middle (MITM) attacks resulting in unauthorized identification of
valid users and unqualified configuration changes.

References:

CVE-2016-2118
PSRT110143

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Systems Insight Manager (HP SIM), All versions

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2118(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE Systems Insight Manager uses Samba from the system library on the system
on which it is installed. Please update the Samba package on the operating
system to mitigate this vulnerability.

HISTORY
Version:1 (rev.1) - 7 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXVyGaAAoJEGIGBBYqRO9/NDEIAIP5fD+T4HobPyRcRGzisXaJ
551ix4Ka4zemy+1YPz6MSPShS/8u2/ACOtB5VS7oooJTwiZd8Ja03tohHh5J+Kr1
zV2YOssbQIq0/ZWqOYekeN4w5cThLfcGYSWsPE1zOos+YbR0GHQZBejTKHI3+gg6
TiIfygp0npIuNnOxMplES1QpxOwyeECWtzwLH8/PgIiCCwvGPIZFLZhV+0+O3F2p
gzS9NSa9MWjdmPgO5AHaksrzx+uKoOm2Wj67NSr0pzQiRn5nkz58iZu0oslT3WXa
LQaik8DBGvBjKLnenzigZdNSRQMVfg9Tfl9LhlQVheDzxtv/96kU2J2AdQcDNnQ=
=wyxy
-END PGP SIGNATURE-


[security bulletin] HPSBMU03584 rev.2 - HPE Network Node Manager I (NNMi), Multiple Remote Vulnerabilities

2016-06-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05103564

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05103564
Version: 2

HPSBMU03584 rev.2 - HPE Network Node Manager I (NNMi), Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-03
Last Updated: 2016-06-08

Potential Security Impact: Remote Authentication Bypass, Cross-Site Scripting
(XSS), Disclosure of Information, Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential vulnerabilities have been addressed by HPE Network Node
Manager I (NNMi). These vulnerabilities could be remotely exploited resulting
in authentication bypass, Cross-Site Scripting (XSS), disclosure of
information, or unauthorized access.

References:

  - CVE-2016-2010 - Cross-Site Scripting (XSS)
  - CVE-2016-2011 - Cross-Site Scripting (XSS)
  - CVE-2016-2012 - Remote Authentication Bypass
  - CVE-2016-2013 - Remote Disclosure of Information
  - CVE-2016-2014 - Remote Unauthorized Data Access
  - CVE-2012-6153 - Remote Disclosure of Information, Apache Commons HTTP
Client
  - CVE-2014-3577 - Remote Disclosure of Information, Apache Commons HTTP
Client
  - PSRT110087

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Network Node Manager I (NNMi) Software versions 9.20, 9.20, 9.20, 9.23,
9.24, 9.25; 10.00, and 10.01

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2010(AV:N/AC:M/Au:S/C:N/I:P/A:P)   4.9
CVE-2016-2011(AV:N/AC:M/Au:S/C:N/I:P/A:P)   4.9
CVE-2012-6153(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2014-3577(AV:N/AC:M/Au:N/C:P/I:P/A:N)   5.8
CVE-2016-2012(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
CVE-2016-2013(AV:N/AC:M/Au:S/C:P/I:N/A:N)   3.5
CVE-2016-2014(AV:N/AC:M/Au:S/C:N/I:C/A:C)   7.9
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerabilities for HPE Network Node Manager i (NNMi).

+ NNMi version 9.2x

**Note:** Requires 9.2x series patch 5 is installed.

  - Windows

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM02020463

  - Linux

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/LID/NNM920L_00022

  - HP-UX

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/LID/NNM920H_00022

  - Solaris

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM02020460

+ NNMi version 10.0x

  - Windows

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM01865498

  - Linux

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM01865484

HISTORY
Version:1 (rev.1) - 3 May 2016 Initial release
Version:2 (rev.2) - 8 June 2016 Removed Apache Commons Collections (ACC) for
handling Java object deserialization vulnerability since it has not been
addressed in this bulletin

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent 

[security bulletin] HPSBGN03618 rev.1 - HPE Service Manager remote Denial of Service (DoS), Disclosure of Information, Unauthorized Read Access to Files, Server Side Request Forgery

2016-06-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05167176

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05167176
Version: 1

HPSBGN03618 rev.1 - HPE Service Manager remote Denial of Service (DoS),
Disclosure of Information, Unauthorized Read Access to Files, Server Side
Request Forgery

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-08
Last Updated: 2016-06-08

Potential Security Impact: Remote Denial of Service (DoS), Disclosure of
Sensitive Information, Unauthorized Read Access to Files, Server-Side Request
Forgery (SSRF)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential vulnerabilities have been identified in HPE Service Manager. These
vulnerabilities could be remotely exploited to allow disclosure of
information, unauthorized read access to files and server side request
forgery.

References:

CVE-2016-4371
PSRT110006

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Service Manager Software 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41
Server, Web Client, Windows Client, Service Request Catalog, Mobility

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-4371(AV:N/AC:M/Au:S/C:P/I:P/A:N)   4.9
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

Acknowledgement: The Hewlett-Packard Company thanks Markus Wulftange of Code
White GmbH for reporting this vulnerability to security-al...@hpe.com.

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE Service Manager:

For versions 9.30, 9.31, 9.32, 9.33, 9.34: Upgrade to SM 9.35.P4
(recommended) or SM 9.34.P5

SM9.35 P4 package,
SM 9.35 Mobility 9.35.4000 p4:

https://softwaresupport.hpe.com/km/KM02143180

SM 9.35 ServiceRequestCatalog 9.35.0015 p4:

https://softwaresupport.hpe.com/km/KM02143502

SM 9.35 AIX Server 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143332

SM 9.35 HP Itanium Server 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143206

SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143388

SM 9.35 Linux Server 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143530

SM 9.35 Solaris Server 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143276

SM 9.35 Windows Server 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143589

SM 9.35 Webtier 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143447

SM 9.35 Windows Client 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143645

SM 9.34.P5 package, AIX Server 9.34.5003 p5:

https://softwaresupport.hpe.com/km/KM02310304

HP Itanium Server 9.34.5003 p5:

https://softwaresupport.hpe.com/km/KM02311066

Linux Server 9.34.5003 p5:

https://softwaresupport.hpe.com/km/KM02310566

Solaris Server 9.34.5003 p5:

https://softwaresupport.hpe.com/km/KM02311656

Windows Server 9.34.5003 p5:

https://softwaresupport.hpe.com/km/KM02310486

Webtier 9.34.5003 p5:

https://softwaresupport.hpe.com/km/KM02310375

Windows Client 9.34.5003 p5:

https://softwaresupport.hpe.com/km/KM02310620

ServiceRequestCatalog 9.34.0011 p5:

https://softwaresupport.hpe.com/km/KM02310439

Mobility 9.34.5001 p5:

https://softwaresupport.hpe.com/km/KM02310466

For version 9.35: Upgrade to SM 9.35.P4

SM9.35 P4 package,
SM 9.35 Mobility 9.35.4000 p4:

https://softwaresupport.hpe.com/km/KM02143180

SM 9.35 ServiceRequestCatalog 9.35.0015 p4:

https://softwaresupport.hpe.com/km/KM02143502

SM 9.35 AIX Server 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143332

SM 9.35 HP Itanium Server 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143206

SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143388

SM 9.35 Linux Server 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143530

SM 9.35 Solaris Server 9.35.4001 p4:

https://softwaresupport.hpe.com/km/KM02143276

SM 9.35 Windows Server 9.35.4001 p4:

< https://softwaresupport.hpe.com/km/KM02143589

SM 9.35 Webtier 9.35.4001 p4:

< https://softwaresupport.hpe.com/km/KM02143447

SM 9.35 Windows Client 9.35.4001 p4:

<
https://softwaresupport.hpe.com/km/KM02143645

For versions 9.40, 9.41: Upgrade to SM 9.41.P3

SM9.41.P3 package,
Service Manager 9.41.3016 p3 - Server for AIX:

https://softwaresupport.hpe.com/km/KM02236813

Service Manager 9.41.3016 p3 - Server for HP-UX/IA:

https://softwaresupport.hpe.com/km/KM02236897

Service Manager 9.41.3016 p3 - Server for Linux:

https://softwaresupport.hpe.com/km/KM02236827

Service Manager 9.41.3016 p3 - Server for 

[security bulletin] HPSBGN03624 rev.1 - HPE Project and Portfolio Management Center, Remote Disclosure of Sensitive Information, Execution of Arbitrary of Commands

2016-06-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05167126

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05167126
Version: 1

HPSBGN03624 rev.1 - HPE Project and Portfolio Management Center, Remote
Disclosure of Sensitive Information, Execution of Arbitrary of Commands

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-08
Last Updated: 2016-06-08

Potential Security Impact: Remote Disclosure of Sensitive Information,
Execution of Arbitrary Commands

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential vulnerability has been identified in Project and Portfolio
Management Center. This vulnerability could be exploited to remotely to allow
execution of arbitrary commands and disclosure of sensitive information.

References:

CVE-2016-4370
PSRT110047

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Project and Portfolio Management Center 9.20, 9.21, 9.22, 9.30, 9.31,
9.32

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-4370(AV:N/AC:M/Au:S/C:P/I:P/A:N)   4.9
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

Hewlett-Packard Enterprise thanks Antonio Palacios Vacas for reporting this
vulnerability to security-al...@hpe.com

RESOLUTION

HPE has provided the following mitigation information to resolve the
vulnerability for the impacted versions of HPE Project and Portfolio
Management Center:

For versions 9.20, 9.21, 9.22 Please contact with HPE support if you have any
concern
For versions 9.30, 9.31, 9.32 please Update to PPM 9.32.0002:

https://softwaresupport.hpe.com/km/KM02246673

HISTORY
Version:1 (rev.1) - 8 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXWE62AAoJEGIGBBYqRO9/+QEH/0nFDiSzags/4BXeumlN51K/
2LvXzY35nUAU7UMwoGOfxZskgnsYlmMwEZH22GwZp6ph7NfJLYmejUGW2Yq69OYH
aK1AM2rQNpdj3NsfPLbgoQerTneDpiNsf/y8ly6jnTdWG5LuvVnTs9RipAGi+io/
FRxfHgZYiewTuFVIEmdIaVm4p4FJzNAvdRLrsf2Xp8h27gawQYfinm5wVfjhY83z
U4W6ukm9WG79ww0s2WiGKHmAXMvX7h69WdN2fXXH1/hB0jPGvzqQ/ner3ZYkFdca
4HBo//264L33nhPtUMI4i/tCzMXtx/PiyF4Ot0or/6eyMyZpds9B3mcPdBeGS/s=
=Op87
-END PGP SIGNATURE-


[security bulletin] HPSBGN03622 rev.1 - HPE UCMDB, Universal Discovery, and UCMDB Configuration Manager using Apache Commons Collection, Remote Code Executon

2016-06-07 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05164408

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05164408
Version: 1

HPSBGN03622 rev.1 - HPE UCMDB, Universal Discovery, and UCMDB Configuration
Manager using Apache Commons Collection, Remote Code Executon

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-06
Last Updated: 2016-06-06

Potential Security Impact: Remote Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in the Apache Commons
Collections (ACC) component in HPE Universal CMDB, HPE Universal Discovery,
and HPE Universal CMDB Configuration Manager. The vulnerability could be
exploited remotely to allow remote code execution.

References:

CVE-2016-4368
PSRT102949

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Universal CMDB Foundation Software  HPE Universal CMDB v 10.0, v10.01,
v10.10, v10.11, v10.20, v10.21  HPE Universal Discovery v 10.0, v10.01,
v10.10, v10.11, v10.20, v10.21  HPE Universal CMDB Configuration Manager v
10.0, v10.01, v10.10, v10.11, v10.20, v 10.21 HPE Universal CMDB, HPE
Universal Discovery, HPE Universal CMDB Configuration Manager

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-4368(AV:A/AC:M/Au:N/C:P/I:P/A:P)   5.4
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following mitigation information available to resolve this
vulnerability in the impacted versions of HPE Universal CMDB, HPE Universal
Discovery, and HPE UCMDB Configuration Manager:

 HPE Universal CMDB and Universal Discovery:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM02310095

 For HPE UCMDB Configuration Manager:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM02306867

HISTORY
Version:1 (rev.1) - 6 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEbBAEBAgAGBQJXVd/JAAoJEGIGBBYqRO9/kIUH+OqSBeBVemph4gNFtrYv9KDE
cRpyvL2oaMBSTKQqgneaYRwWDTeXE6GmBDRJDQLb8aLCFVzCGuTHh5tSWy+BILuG
1t+P2FWnmJysXwLBt1t94CmGb95eS3qkfKCRo+O4xugmbgjqRs5PZIg3PmZjEbWN
CObjiU/CUg0gYpTdnHWwpkhspn+jA25KW58phpuL2+m/l0dlWjVCR+82EQAatETs
DKK07EeJRFFVmdBDCAo3xWXcMcaunoXPraBJPOl+Zj8dnX/egAPLwvqm/0WYd/d6
L0LvPrYGRoOFin/7vHRE79V6q3LLOgBcwucBcYSm3u0LtaNX1Yyq6jkEpGhq2w==
=pBGt
-END PGP SIGNATURE-


[security bulletin] HPSBGN03621 rev.1 - HPE Universal CMDB using OpenSSL, Remote Disclosure of Sensitive Information

2016-06-07 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05164821

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05164821
Version: 1

HPSBGN03621 rev.1 - HPE Universal CMDB using OpenSSL, Remote Disclosure of
Sensitive Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-06
Last Updated: 2016-06-06

Potential Security Impact: Remote Disclosure of Sensitive Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Several potential security vulnerabilities have been identified in the
OpenSSL library for HPE Universal CMDB. These vulnerabilities could be
exploited remotely to allow disclosure of sensitive information.

References: CVE-2016-0701

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Universal CMDB Foundation Software 10.0, 10.01, 10.10, 10.11, 10.20, 10.21
UD Agent

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-0701(AV:N/AC:H/Au:N/C:P/I:N/A:N)   2.6
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has released the following mitigation information to resolve the
vulnerabilities for the impacted versions of HPE Universal CMDB:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM02241027

HISTORY
Version:1 (rev.1) - 6 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXVeaqAAoJEGIGBBYqRO9/sC8IAN3MKZSpp3vu8WeOmaom90W5
kq0CN2oliZMF3vFF5PWqx4kNnWWazYIfXsKLYMASBrztZxqkzlnv6gftu7Q4W+JR
+4KX+HxSMQJlV/DGArRPSeLcu0WDwOnhNdUDhPL+86uQiXTYchHEgDR+kkwMe9it
6czvl3xuzzelYOZfVLUbAgvMh2Q8fU8RvfLZPI5vDnxx5zWd5AH7CxqoeRkFB1ho
jTJWnA1yrM1WU3B9kpqLHhzybwMH/kJyB9QWLn66men2to2aaI7HJBqnPhHk/eNs
d95K+QuY7iTLAUN1b0kNBhOL0yQ9tOMVcHcqlSEfi73z87IwlnGfL36lz8WzL9c=
=HKZI
-END PGP SIGNATURE-


[security bulletin] HPSBGN03620 rev.1 - HPE Helion OpenStack using OpenSSL and QEMU, Remote Unauthorized Data Access

2016-06-07 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05164862

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05164862
Version: 1

HPSBGN03620 rev.1 - HPE Helion OpenStack using OpenSSL and QEMU, Remote
Unauthorized Data Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-06
Last Updated: 2016-06-06

Potential Security Impact: Unauthorized Data Access, Remote Unauthorized Data
Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in OpenSSL were addressed by HPE Helion OpenStack.
The vulnerabilities could be exploited resulting in remote unauthorized data
access.

A security vulnerability in QEMU was addressed by HPE Helion OpenStack. The
vulnerability could be exploited resulting in local unauthorized data access.

References:

CVE-2016-2108
CVE-2016-2107
CVE-2016-3710
PSRT110142

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Helion OpenStack 2.0, 2.1, 2.1.2, 2.1.4

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2108(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-2107(AV:N/AC:H/Au:N/C:P/I:N/A:N)2.6
CVE-2016-3710(AV:L/AC:L/Au:N/C:C/I:C/A:C)7.2
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software update to resolve the vulnerabilities
for HPE Helion OpenStack 2.x:

Go to
https://helion.hpwsportal.com

and download HPE Helion OpenStack 2.1.5
Follow these
http://docs.hpcloud.com/#helion/installation/upgrade2x_to_215.html

deployment steps to upgrade to 2.1.5

Release Notes are available here:

http://docs.hpcloud.com/#helion/releasenotes215.html

HISTORY
Version:1 (rev.1) - 6 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXVfKVAAoJEGIGBBYqRO9/iysIAMBD46uROFkIp0vmgb9jLh3h
ubHvPQJmhA+xhagKLsTMJmxyqHn8wKz2oY2RNbh/OABEtxBZU04MqjovbiOWCi6f
aQ5ZCjCOdN4lT711BSYkxY3I9qC5xgRMWPb7TDAGykhZCYrYyLTv9EzrL9YeGKqg
qjbs3S0IwJdLUflgN3gOwE9wNARjXQoDri2kIjgYj10o4y+Sa/VvBMD/Wm0Vc+ar
HSg9iLSgQKf9v4iYhbT6Lb4gYWsXHOc9WzpREigkgvWbyqkMGeHvWfa95zSTQfUd
r47MPkLk+5+X3ylJIqgaUUtlGk3rgHxFo4jp8s4krfaZs15+/TlXDNUa/q4Sr0I=
=acjo
-END PGP SIGNATURE-


[security bulletin] HPSBGN03619 rev.1 - HPE Discovery and Dependency Mapping Inventory (DDMi) using Java Deserialization, remote Code Execution

2016-06-07 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05164819

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05164819
Version: 1

HPSBGN03619 rev.1 - HPE Discovery and Dependency Mapping Inventory (DDMi)
using Java Deserialization, remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-06
Last Updated: 2016-06-06

Potential Security Impact: Remote Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in Apache Commons Collections for handling Java object
deserialization was addressed by HPE Discovery and Dependency Mapping
Inventory (DDMi). The vulnerability could be exploited remotely to allow
remote code execution.

References:

CVE-2016-4369
CERT-VU#576313
SSRT110134

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP DDMI Inventory Software Series 9.30, 9.31, 9.32, 9.32 update 1, 9.32
update 2, and 9.32 update 3

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-4369(AV:N/AC:M/Au:S/C:P/I:P/A:P)   6.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of Discovery and Dependency Mapping
Inventory (DDMi):

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM02338864

HISTORY
Version:1 (rev.1) - 6 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXVe/zAAoJEGIGBBYqRO9/XyYH/RN+luVOrPp2TmbmuY3oj4mQ
oL/EyarFFRjjosIZVchsLuvhTXoE3BvMuzkmKL3aV9ScZjbEAf9h6jE289iicrvE
Mi0JmerxIvfR0q8+3JirBjY/invDj6y/5WdHf3s/F9M5rQSKsJRv6k52RKeEVjtu
fG1pwPHA/5fRGBoNpKpjaOVbkMkACqm7NmTFS9isYIsB1xMH41vjSbS5c1MTAhRb
Elx7Zzy4nKXRDIlDoZwD6WaZ9rBZUS680lUZziOpxvD9liWQ+N1GPXI9Y5xDxFEs
ngfRbETxVqomNwTIvoxWfGkUSGxXRZsDqIndOXeiIN+SlEnVSZqM8ISjaJo7MQw=
=80Bg
-END PGP SIGNATURE-


[security bulletin] HPSBGN03442 rev.2 - HP Helion OpenStack using glibc, Remote Denial of Service (DoS), Arbitrary Code Execution

2016-06-07 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05028479

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05028479
Version: 2

HPSBGN03442 rev.2 - HP Helion OpenStack using glibc, Remote Denial of Service
(DoS), Arbitrary Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-03-01
Last Updated: 2016-06-06

Potential Security Impact: Remote Arbitrary Code Execution, Denial of Service
(DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HPE Helion OpenStack has addressed stack based buffer overflows in glibc's
implementation of getaddrinfo(). These vulnerabilities could be remotely
exploited to cause a Denial of Service (DoS) or allow execution of arbitrary
code on the host with the permissions of a user running glibc library.

References:

CVE-2015-7547
PSRT110041

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Helion OpenStack 1.1.1, 2.0.0, 2.1.0

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-7547(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software update to resolve the vulnerability
in HPE Helion OpenStack.

For HPE Helion OpenStack 1.1.1:

Helion OpenStack 1.1.1 customers should engage with HPE Helion Professional
Services via existing support channels to assist with the upgrade.

For HPE Helion OpenStack 2.0.x the recommended update path is to download and
upgrade to Helion OpenStack 2.1.2 or a subsequent later version . This can be
done as follows:

Go to
https://helion.hpwsportal.com

and download HPE Helion OpenStack 2.1.2
Follow these
http://docs.hpcloud.com/#helion/installation/upgrade20_to_212.html

deployment steps to upgrade to 2.1.2

HPE Helion OpenStack 2.0.x customers can also choose to install the 2.0.2
release, which only includes the changes mentioned in the release notes
http://docs.hpcloud.com/#helion/releasenotes202.html . This can be done as
follows:

Go to
https://helion.hpwsportal.com

and download HPE Helion OpenStack 2.0.2
Follow these
http://docs.hpcloud.com/#helion/installation/upgrade20_to_202.html

deployment steps to upgrade to 2.0.2

To patch HPE Helion OpenStack 2.1.0:

Go to
https://helion.hpwsportal.com

and download HPE Helion OpenStack 2.1.2 or a subsequent later version .
Follow these
http://docs.hpcloud.com/#helion/installation/upgrade_to_212.html

deployment steps to upgrade to 2.1.2

HISTORY
Version:1 (rev.1) - 1 March 2016 Initial release
Version:2 (rev.2) - 6 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other 

[security bulletin] - Linux Kernel Flaw, ASN.1 DER decoder for x509 certificate DER

2016-06-06 Thread HP Security Alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05158555

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05158555
Version: 1

HPSBHF3548 - Linux Kernel Flaw, ASN.1 DER decoder for x509 certificate DER
files
NOTICE: The information in this Security Bulletin should be acted upon as soon
as possible.

Release Date: 2016-06-01
Last Updated: 2016-06-01

Potential Security Impact: System downtime, or privilege escalation.

Source: HP, HP Product Security Response Team (PSRT)

VULNERABILITY SUMMARY

A flaw was found in the way the Linux kernel's ASN.1 DER decoder processed
certain certificate files with tags of indefinite length. A local, unprivileged
user could use a specially crafted X.509 certificate DER file to crash the
system or, potentially, escalate his or her privileges on the system.

References: CVE-2016-0758, PSR-2016-0054

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  * HP ThinPro 4.4
  * HP ThinPro 5.0
  * HP ThinPro 5.1
  * HP ThinPro 5.2
  * HP ThinPro 5.2.1

BACKGROUND

For a PGP signed version of this security bulletin please write to:
hp-security-al...@hp.com

CVSS 2.0 Base Metrics

Reference  Base Vector  Base Score
CVE-2016-0758 AV:L/AC:L/Au:N/C:C/I:C/A:C   7.2

Information on CVSS is documented in HP Customer Notice: HPSN-2008-002.

RESOLUTION

HP has released the following software updates to resolve the vulnerability.
Patches for the affected version of HP ThinPro can be found through the links
below:

  * HP ThinPro 5.2.1

ftp://ftp.hp.com/pub/tcdebian/updates/5.2.1/service_packs/
CVE-2016-0758-1.0-all-5.2.1-x86-SQ.xar

  * HP ThinPro 5.2

ftp://ftp.hp.com/pub/tcdebian/updates/5.2/service_packs/
CVE-2016-0758-1.0-all-5.2-x86-SQ.xar

  * HP ThinPro 5.1

ftp://ftp.hp.com/pub/tcdebian/updates/5.1/service_packs/
CVE-2016-0758-1.0-all-5.0-5.1-x86-SQ.xar

  * HP ThinPro 5.0

ftp://ftp.hp.com/pub/tcdebian/updates/5.1/service_packs/
CVE-2016-0758-1.0-all-5.0-5.1-x86-SQ.xar

  * HP ThinPro 4.4

ftp://ftp.hp.com/pub/tcdebian/updates/4.4/service_packs/
CVE-2016-0758-1.0-all-4.4-x86-SQ.xa r

System management and security procedures must be reviewed frequently to
maintain system integrity. HP is continually reviewing and enhancing the
security features of software products to provide customers with current secure
solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the
attention of users of the affected HP products the important security
information contained in this Bulletin. HP recommends that all users determine
the applicability of this information to their individual situations and take
appropriate action. HP does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently, HP will not be
responsible for any damages resulting from user's use or disregard of the
information provided in this Bulletin. To the extent permitted by law, HP
disclaims all warranties, either express or implied, including the warranties
of merchantability and fitness for a particular purpose, title and
non-infringement."

REVISION HISTORY

Version:1 (rev.1) 27 May 2016: Initial release

Copyright 2016 Hewlett-Packard Development Company, L.P.

Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or its
affiliates, subcontractors or suppliers will be liable for incidental,special
or consequential damages including downtime cost; lost profits;damages relating
to the procurement of substitute products or services; or damages for loss of
data, or software restoration. The information in this document is subject to
change without notice. Hewlett-Packard Company and the names of Hewlett-Packard
products referenced herein are trademarks of Hewlett-Packard Company in the
United States and other countries. Other product and company names mentioned
herein may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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[security bulletin] HPSBUX03616 SSRT110128 rev.2 - HPE HP-UX running CIFS Server (Samba), Remote Denial of Service (DoS), Disclosure of Information, Unauthorized Access

2016-06-06 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05162399

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05162399
Version: 2

HPSBUX03616 SSRT110128 rev.2 - HPE HP-UX running CIFS Server (Samba), Remote
Denial of Service (DoS), Disclosure of Information, Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-03
Last Updated: 2016-06-03

Potential Security Impact: Denial of Service (DoS), Remote Denial of Service
(DoS), Disclosure of Information, Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP-UX
CIFS-Server (Samba). The vulnerabilities could be exploited remotely to allow
Denial of Service (DoS), disclosure of information and unauthorized access.

References:

CVE-2015-5370
CVE-2016-2118
CVE-2016-2115
CVE-2016-2112
CVE-2016-2111
CVE-2016-2110
PSRT110128

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX Common Internet File System (CIFS), Client/Server Software All Version
upto 03.02.06

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-5370(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2016-2118(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2016-2115(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2016-2112(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2016-2111(AV:A/AC:M/Au:N/C:P/I:P/A:N)   4.3
CVE-2016-2110(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2015-5370(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2016-2118(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2016-2115(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2016-2112(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2016-2111(AV:A/AC:M/Au:N/C:P/I:P/A:N)   4.3
CVE-2016-2110(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities. Updates are available for download from:

https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumbe
r=B8725AA

HP-UX CIFS-Server (Samba):- A.03.02.07 HP-UX Release :- 11iv3 Samba Depot
name :- HP_UX_11.31_CIFS-SERVER_A.03.02.07_HP-UX_B.11.31_IA_PA.depot

MANUAL ACTIONS: Yes - Update

Install HP-UX CIFS-Server (Samba) A.03.02.07 or subsequent for 11i v3

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
which replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HP and lists recommended actions that may apply to a specific HP-UX
system. It can also download patches and create a depot automatically. For
more information see: https://h20392.www2.hpe.com/portal/swdepot/displayProdu
ctInfo.do?productNumber=B6834AA

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31 IA/PA
===
CIFS-Development.CIFS-PRG
CIFS-Server.CIFS-ADMIN
CIFS-Server.CIFS-DOC
CIFS-Server.CIFS-LIB
CIFS-Server.CIFS-RUN
CIFS-Server.CIFS-UTIL
action: install revision A.03.02.07 or subsequent

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 3 June 2016 Initial release
Version:2 (rev.2) - 3 June 2016 Updated title, software assistant text

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions 

ESA-2016-060: EMC Isilon OneFS Privilege Escalation Vulnerability

2016-06-03 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2016-060: EMC Isilon OneFS Privilege Escalation Vulnerability

EMC Identifier: ESA-2016-060 

CVE Identifier: CVE-2016-0908  

Severity Rating: CVSS v3 Base Score: 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Affected products: 

•   EMC Isilon OneFS 7.2.1.x
•   EMC Isilon OneFS 7.2.0.x
•   EMC Isilon OneFS 7.1.1.x
•   EMC Isilon OneFS 7.1.0.x

Summary:  

EMC Isilon OneFS is affected by a privilege escalation vulnerability that may 
potentially be exploited by attackers to compromise the affected system. 

Details:  

EMC Isilon OneFS is affected by a privilege escalation vulnerability that 
allows administrative users to gain shell access, and execute commands as root.


Resolution 

The following versions of EMC Isilon OneFS resolve this vulnerability:
•   EMC Isilon OneFS 7.2.1.2
•   EMC Isilon OneFS 7.1.1.9
In addition, patches are available for the following versions of OneFS:
Version Patch
OneFS 7.2.1.1   Patch-170434  
OneFS 7.1.1.0 - 7.1.1.8 Patch-170435

EMC strongly recommends that all customers upgrade to a version containing the 
fix, or install a patch, at the earliest opportunity.  

Link to remedies:
Registered EMC Online Support customers can download OneFS installation files 
from the Downloads for Isilon OneFS page of the EMC Online Support site at 
https://support.emc.com/downloads/15209_Isilon-OneFS. 

Patches are available here:   
•   Patch-170434: https://download.emc.com/downloads/DL70269
•   Patch-170435: https://download.emc.com/downloads/DL70270

If you have any questions, please contact EMC Support.



Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC Corporation distributes EMC Security Advisories, in order to bring to the 
attention of users of the affected EMC products, important security 
information. EMC recommends that all users determine the applicability of this 
information to their individual situations and take appropriate action. The 
information set forth herein is provided "as is" without warranty of any kind. 
EMC disclaims all warranties, either express or implied, including the 
warranties of merchantability, fitness for a particular purpose, title and 
non-infringement. In no event, shall EMC or its suppliers, be liable for any 
damages whatsoever including direct, indirect, incidental, consequential, loss 
of business profits or special damages, even if EMC or its suppliers have been 
advised of the possibility of such damages. Some states do not allow the 
exclusion or limitation of liability for consequential or incidental damages, 
so the foregoing limitation may not apply.



EMC Product Security Response Center
security_al...@emc.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAldQOqQACgkQtjd2rKp+ALwfjgCgv/5eRnVXCrp34fZD06uqn30U
7FMAnRcz5sWg62iPumRX2gF2vbZrJkv2
=Osfd
-END PGP SIGNATURE-


[security bulletin] HPSBMU03607 rev.1 - HPE BladeSystem c-Class Virtual Connect (VC) Firmware, Remote Denial of Service (DoS), Disclosure of Information, Cross-Site Request Forgery (CSRF)

2016-06-02 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05157667

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05157667
Version: 1

HPSBMU03607 rev.1 - HPE BladeSystem c-Class Virtual Connect (VC) Firmware,
Remote Denial of Service (DoS), Disclosure of Information, Cross-Site Request
Forgery (CSRF)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-01
Last Updated: 2016-06-01

Potential Security Impact: Remote Cross-Site Request Forgery (CSRF), Denial
of Service (DoS), Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
BladeSystem c-Class Virtual Connect (VC) firmware. These vulnerabilities
include:

The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy
Encryption" also known as "POODLE", which could be exploited remotely
resulting in disclosure of information.
The Cross-protocol Attack on TLS using SSLv2 also known as "DROWN", which
could be exploited remotely resulting in disclosure of information.
Additional OpenSSL and OpenSSH vulnerabilities which could be remotely
exploited resulting in Denial of Service (DoS), disclosure of information, or
Cross-site Request Forgery (CSRF).

References:

CVE-2016-0800
CVE-2016-0799
CVE-2016-2842
CVE-2015-1789
CVE-2015-1791
CVE-2015-3194
CVE-2015-0705
CVE-2015-5600
CVE-2014-3566
CVE-2008-5161
SSRT102281

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
The following firmware versions of Virtual Connect (VC) are impacted:

HPE BladeSystem c-Class Virtual Connect (VC) Firmware 4.30 through VC 4.45
HPE BladeSystem c-Class Virtual Connect (VC) Firmware 3.62 through VC 4.21

Note: Firmware versions 3.62 through 4.21 are not impacted by CVE-2016-0800,
CVE-2015-3194, CVE-2014-3566, CVE-2015-0705, CVE-2016-0799, and
CVE-2016-2842.

The following products run the impacted versions of Virtual Connect (VC)
firmware:

HPE VC Flex-10 10Gb Enet Module
HPE Virtual Connect Flex-10/10D Module for c-Class BladeSystem
HPE Virtual Connect FlexFabric 10Gb/24-port Module for c-Class BladeSystem
HPE Virtual Connect FlexFabric-20/40 F8 Module for c-Class BladeSystem

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-0800(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
CVE-2015-1789(AV:N/AC:M/Au:N/C:N/I:N/A:P)4.3
CVE-2015-1791(AV:N/AC:M/Au:N/C:P/I:P/A:P)6.8
CVE-2015-3194(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2014-3566(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
CVE-2008-5161(AV:N/AC:H/Au:N/C:P/I:N/A:N)2.6
CVE-2015-0705(AV:N/AC:M/Au:N/C:P/I:P/A:P)6.8
CVE-2016-0799(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-2842(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2015-5600(AV:N/AC:L/Au:N/C:P/I:N/A:C)8.5
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided an updated version of the BladeSystem c-Class Virtual
Connect (VC) firmware to address these vulnerabilities.

HPE BladeSystem c-Class Virtual Connect (VC) Firmware v4.50

The update can be downloaded from: http://h20564.www2.hpe.com/hpsc/swd/public
/detail?swItemId=MTX_1f352fb404f5410d9b2ca1b56d

HISTORY
Version:1 (rev.1) - 1 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial

[security bulletin] HPSBMU03612 rev.1 - HPE Insight Control on Windows and Linux, Multiple Remote Vulnerabilities

2016-06-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05158380

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05158380
Version: 1

HPSBMU03612 rev.1 - HPE Insight Control on Windows and Linux, Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-01
Last Updated: 2016-06-01

Potential Security Impact: Cross-Site Request Forgery (CSRF), Remote
Arbitrary Code Execution, Code Execution, Cross-Site Scripting (XSS), Denial
of Service (DoS), Disclosure of Sensitive Information, Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified with HPE
Insight Control (IC) on Windows which could be exploited remotely resulting
in Denial of Service (DoS), Unauthorized Access, Cross-site scripting (XSS),
Execution of Arbitrary code, Disclosure of Sensitive Information,Remote Code
Execution and locally resulting in Cross-site Request Forgery (CSRF).

References:

CVE-2007-6750
CVE-2011-4969
CVE-2014-3508
CVE-2014-3509
CVE-2014-3511
CVE-2014-3513
CVE-2014-3569
CVE-2014-3568
CVE-2014-3567
CVE-2015-1788
CVE-2015-1789
CVE-2015-1790
CVE-2015-1791
CVE-2015-1792
CVE-2015-0205
CVE-2015-3194
CVE-2015-3195
CVE-2015-3237
CVE-2015-6565
CVE-2015-7501
CVE-2015-7547
CVE-2015-7995
CVE-2015-8035
CVE-2016-0705
CVE-2016-0728
CVE-2016-0799
CVE-2016-2015
CVE-2016-2017
CVE-2016-2018
CVE-2016-2019
CVE-2016-2020
CVE-2016-2021
CVE-2016-2022
CVE-2016-2024
CVE-2016-2030
CVE-2016-2842
PSRT110092
PSRT110093
PSRT110094
PSRT110095
PSRT110096
PSRT110138

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

System Management Homepage Prior to 7.5.5
HP Systems Insight Manager (HP SIM), Prior to 7.5.1
HP Insight Control Prior to 7.5.1
HPE Version Control Repository Manager Prior to 7.5.1
HPE Server Migration Pack Prior to 7.5.1
HP Insight Control server provisioning Prior to 7.5.1

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2007-6750(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2011-4969(AV:N/AC:M/Au:N/C:N/I:P/A:N)4.3
CVE-2014-3508(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
CVE-2014-3509(AV:N/AC:M/Au:N/C:P/I:P/A:P)6.8
CVE-2014-3511(AV:N/AC:M/Au:N/C:N/I:P/A:N)4.3
CVE-2014-3513(AV:N/AC:M/Au:N/C:N/I:N/A:C)7.1
CVE-2014-3567(AV:N/AC:M/Au:N/C:N/I:N/A:C)7.1
CVE-2014-3568(AV:N/AC:M/Au:N/C:N/I:P/A:N)4.3
CVE-2014-3569(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2015-0205(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2015-1788(AV:N/AC:M/Au:N/C:N/I:N/A:P)4.3
CVE-2015-1789(AV:N/AC:M/Au:N/C:N/I:N/A:P)4.3
CVE-2015-1790(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2015-1791(AV:N/AC:M/Au:N/C:P/I:P/A:P)6.8
CVE-2015-3194(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2015-1792(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2015-3195(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2015-3237(AV:N/AC:L/Au:N/C:P/I:N/A:P)6.4
CVE-2015-6565(AV:L/AC:L/Au:N/C:C/I:C/A:C)7.2
CVE-2015-7501(AV:N/AC:L/Au:N/C:P/I:P/A:P)7.5
CVE-2015-7547(AV:N/AC:M/Au:N/C:P/I:P/A:P)6.8
CVE-2015-7995(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2015-8035(AV:N/AC:H/Au:N/C:N/I:N/A:P)2.6
CVE-2016-0705(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-0728(AV:L/AC:L/Au:N/C:C/I:C/A:C)7.2
CVE-2016-0799(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-2015(AV:L/AC:H/Au:S/C:C/I:C/A:N)5.5
CVE-2016-2017(AV:N/AC:L/Au:S/C:P/I:P/A:N)5.5
CVE-2016-2018(AV:N/AC:M/Au:N/C:P/I:P/A:N)5.8
CVE-2016-2019(AV:L/AC:L/Au:M/C:C/I:C/A:N)5.9
CVE-2016-2020(AV:L/AC:L/Au:S/C:C/I:C/A:N)6.2
CVE-2016-2021(AV:L/AC:L/Au:M/C:C/I:C/A:N)5.9
CVE-2016-2022(AV:N/AC:H/Au:M/C:P/I:P/A:N)3.2
CVE-2016-2024(AV:N/AC:L/Au:N/C:P/I:P/A:P)7.5
CVE-2016-2030(AV:N/AC:L/Au:S/C:P/I:P/A:N)5.5
CVE-2016-2842(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has released the following software updates to resolve these
vulnerabilities in HPE Insight Control. The HPE Insight Control 7.5.1 Update
kit applicable to HPE Insight Control 7.5.x installations is available at the
following location:

http://www.hpe.com/info/insightcontrol

HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Insight Control in the following HPE Security Bulletins:

HPE Systems Insight Manager (SIM) (HPE Security 

[security bulletin] HPSBOV03615 rev.1 - HPE OpenVMS CSWS running the Apache Tomcat 7 Servlet Engine, Multiple Remote Vulnerabilities

2016-06-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05158626

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05158626
Version: 1

HPSBOV03615 rev.1 - HPE OpenVMS CSWS running the Apache Tomcat 7 Servlet
Engine, Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-01
Last Updated: 2016-06-01

Potential Security Impact: Remote Cross-Site Request Forgery (CSRF), Denial
of Service (DoS), Directory Traversal, Execution of Arbitrary Code With
Privilege Elevation, Unauthenticated Disclosure of Information, Unauthorized
Data Modification, Unauthorized Read Access to Data

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in OpenVMS CSWS
running the Apache Tomcat 7 Servlet Engine. These vulnerabilities could be
exploited remotely resulting in access restriction bypass, Cross-Site Request
Forgery (CSRF), directory traversal, unauthorized read access to data,
execution of arbitrary code with privilege elevation, or Denial of Service
(DoS).

References:

  - CVE-2015-5174 - Remote Directory Traversal
  - CVE-2015-5345 - Remote Execution of Arbitrary Code with Privilege
Elevation
  - CVE-2015-5346 - Remote Unauthorized Read Access to Data
  - CVE-2015-5351 - Remote Cross-Site Request Forgery (CSRF)
  - CVE-2016-0706 - Remote Unauthorized Read Access to Data
  - CVE-2016-0714 - Remote Execution of Arbitrary Code with Privilege
Elevation
  - CVE-2016-0763 - Remote Denial of Service (DoS)
  - PSRT110131

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
OpenVMS CSWS JAVA V7.0.29 Tomcat

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-5351(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
CVE-2016-0706(AV:N/AC:L/Au:S/C:P/I:N/A:N)   4.0
CVE-2016-0714(AV:N/AC:L/Au:S/C:P/I:P/A:P)   6.5
CVE-2016-0763(AV:N/AC:L/Au:S/C:P/I:P/A:P)   6.5
CVE-2015-5174(AV:N/AC:L/Au:S/C:P/I:N/A:N)   4.0
CVE-2015-5345(AV:N/AC:L/Au:N/C:P/I:N/A:N)   5.0
CVE-2015-5346(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software patch to resolve the vulnerabilities
in OpenVMS CSWS running the Apache Tomcat 7 Servlet Engine.

  - Patch Name for OpenVMS CSWS JAVA Tomcat:

TOMCAT_CUMULATIVE_SECURITY_PATCH_MARCH16.BCK

  - Security Patch Location:

http://h71000.www7.hp.com/openvms/products/ips/apache/csws_java.html

HISTORY
Version:1 (rev.1) - 1 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and 

[security bulletin] HPSBGN03609 rev.1 - HPE LoadRunner and Performance Center, Remote Code Execution, Denial of Service (DoS)

2016-06-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05157423

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05157423
Version: 1

HPSBGN03609 rev.1 - HPE LoadRunner and Performance Center, Remote Code
Execution, Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-31
Last Updated: 2016-05-31

Potential Security Impact: Remote Code Execution, Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Several potential security vulnerabilities have been identified in HPE
LoadRunner and Performance Center. These vulnerabilities could be exploited
remotely to allow code execution, and Denial of Service (DoS).

References:

CVE-2016-4359 (PSRT110020, ZDI-CAN-3516)
CVE-2016-4360 (PSRT110032, ZDI-CAN-3555)
CVE-2016-4361 (SSRT102274)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HPE LoadRunner Software v11.52 up to and including patch 3
HPE LoadRunner Software v12.00 up to and including patch 1
HPE LoadRunner Software v12.01 up to and including patch 3
HPE LoadRunner Software v12.02 up to and including patch 2
HPE LoadRunner Software v12.50 up to and including patch 3
HPE Performance Center v11.52 up to and including patch 3
HPE Performance Center v12.00 up to and including patch 1
HPE Performance Center v12.01 up to and including patch 3
HPE Performance Center v12.20 up to and including patch 2
HPE Performance Center v12.50 up to and including patch 1

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-4359(AV:N/AC:L/Au:N/C:P/I:P/A:P)   7.5
CVE-2016-4360(AV:N/AC:L/Au:N/C:N/I:P/A:C)   8.5
CVE-2016-4361(AV:N/AC:M/Au:N/C:N/I:N/A:C)   7.1
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

Hewlett Packard Enterprise thanks Tenable Network Security for working with
Trend Micro's Zero Day Initiative (ZDI) for reporting CVE-2016-4359 and
CVE-2016-4360 to security-al...@hpe.com
Hewlett Packard Enterprise thanks Tenable Network Security for reporting
CVE-2016-4361 to security-al...@hpe.com

RESOLUTION

HPE has released following mitigation information to resolve the
vulnerabilities for the impacted versions of LoadRunner and Performance
Center:

LoadRunner v11.52, please update to LoadRunner v12.53 or later.

http://www.hpe.com/software/updates

Performance Center v11.52, please update to Performance Center v12.53 or
later.

http://www.hpe.com/software/updates

LoadRunner v12.00 and Performance Center v12.00:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM02293466

LoadRunner v12.01 and Performance Center v12.01:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM02293446

LoadRunner v12.02 and Performance Center v12.20:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM02293451

LoadRunner v12.50 and Performance Center v12.50:

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM02293458

HISTORY
Version:1 (rev.1) - 31 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP 

ESA-2016-061: EMC Isilon OneFS SMB Signing Vulnerability

2016-05-26 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2016-061: EMC Isilon OneFS SMB Signing Vulnerability 

EMC Identifier: ESA-2016-061

CVE Identifier: CVE-2016-0907

Severity Rating: CVSSv3 Base Score: 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) 

Affected products: 
EMC IsilonSD Edge OneFS 8.0.x
EMC Isilon OneFS 8.0.x
EMC Isilon OneFS 7.2.1.x
EMC Isilon OneFS 7.2.0.x
EMC Isilon OneFS 7.1.1.x
EMC Isilon OneFS 7.1.0.x

Summary: 
EMC Isilon OneFS and EMC IsilonSD Edge include an implementation of the SMB 
protocol. This implementation is vulnerable to a man-in-the-middle attack that 
could compromise the affected systems.

Details: 

The Isilon implementation of the SMB client does not require SMB signing within 
a DCERPC session over ncacn_np, which may allow man-in-the-middle attackers to 
spoof SMB clients by modifying the client-server data stream. This is similar 
to CVE-2016-2115 in Samba implementation. More information can be found at 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2115.  

Resolution: 

This issue is resolved in the following versions of OneFS:
•   EMC IsilonSD Edge OneFS 8.0.0.1
•   EMC Isilon OneFS 8.0.0.1
•   EMC Isilon OneFS 7.2.1.3

In addition, patches are available for the following versions of OneFS:   

Version   Patch

OneFS 8.0.0.0  Patch-169836
IsilonSD Edge OneFS 8.0.0.0Patch-169836
OneFS 7.2.1.1 - 7.2.1.2Patch-169835
OneFS 7.1.1.8 - 7.1.1.9Patch-169833

EMC recommends that all customers install the appropriate patch at the earliest 
opportunity. If you are not running a version for which a patch is available, 
EMC recommends that you upgrade to a target code version, and then install the 
patch.  

Isilon Engineering is also working to validate a code fix for the following 
product family. This code fix will be available in an upcoming maintenance 
release:

•   EMC Isilon OneFS 7.1.1.x

This ESA will be updated when the code fix becomes available.

Link to remedies:
Registered EMC Online Support customers can download the patches from the 
following locations:

Patch-169836: https://download.emc.com/downloads/DL70407 
Patch-169835: https://download.emc.com/downloads/DL70405 
Patch-169833: https://download.emc.com/downloads/DL70402 

If you have any questions, please contact EMC Support.


Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867. 

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability. EMC 
Corporation distributes EMC Security Advisories, in order to bring to the 
attention of users of the affected EMC products, important security 
information. EMC recommends that all users determine the applicability of this 
information to their individual situations and take appropriate action. The 
information set forth herein is provided "as is" without warranty of any kind. 
EMC disclaims all warranties, either express or implied, including the 
warranties of merchantability, fitness for a particular purpose, title and 
non-infringement. In no event, shall EMC or its suppliers, be liable for any 
damages whatsoever including direct, indirect, incidental, consequential, loss 
of business profits or special damages, even if EMC or its suppliers have been 
advised of the possibility of such damages. Some states do not allow the 
exclusion or limitation of liability for consequential or incidental damages, 
so the foregoing limitation may not apply.

EMC Product Security Response Center
security_al...@emc.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAldHIk8ACgkQtjd2rKp+ALzFLACfX7UlCfV/s4Z5cs2TpS92ZkFs
ks4AoJM3hbNCMtYXT6NJKVxRfkeiQ4i7
=IGjN
-END PGP SIGNATURE-


[security bulletin] HPSBGN03610 rev.1 - HPE IceWall Products using OpenSSL, Remote Denial of Service (DoS), Arbitrary Code Execution

2016-05-25 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05149345

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05149345
Version: 1

HPSBGN03610 rev.1 - HPE IceWall Products using OpenSSL, Remote Denial of
Service (DoS), Arbitrary Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-24
Last Updated: 2016-05-24

Potential Security Impact: Remote Arbitrary Code Execution, Denial of Service
(DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in the OpenSSL library could potentially impact HPE
IceWall products resulting in Remote arbitrary code execution or Denial of
Service (DoS).

References:

  - CVE-2016-2108
  - PSRT110123

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - IceWall SSO Dfw Version 10.0 (RHEL 5/6/7 and HP-UX 11i v3) using OpenSSL
  - IceWall SSO Agent Option Version 10.0 (RHEL 5/6/7 and HP-UX 11i v3) using
OpenSSL

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2108(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE recommends applying the latest OS vendor security patches for OpenSSL
package to resolve the vulnerabilities for the IceWall products.

HISTORY
Version:1 (rev.1) - 24 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXRjyYAAoJEGIGBBYqRO9/IUMIALBkivoGJwt61NSJC1dgV6Ew
pCYedT4s75Ha1e32ACSqxMd5XyBzyPcbjUANgqC/z9mgzK9mQOkjUQ4DzVCg5+gS
+c8tvdk1WUyLwXpX7AzYzD1d3tdZBpPbbpq5TQIdoVp/+4AHoLrMK+PKe58f/9vR
jb8N1pVQS4/ic6rbT7ZJje0HjhZOzdHU/rdXSEbdtOC9zY1GZ2i6w3fcqhd5Uta/
x/SrZC9Ad8lCUUgUpZZtQsp8/DnUPXtDMsJHdPaqjjtL7HmBqjgv929arbKfCwoJ
5BdJ2ymLIll1ODOlkssvrYk1JfwlsPe85oIfMdfAcNv1kzDPVLCzups7UxhZIok=
=zM+f
-END PGP SIGNATURE-


[security bulletin] HPSBMU03611 rev.1 - HPE Matrix Operating Environment on Windows and Linux, Multiple Remote Vulnerabilities

2016-05-25 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05150888

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05150888
Version: 1

HPSBMU03611 rev.1 - HPE Matrix Operating Environment on Windows and Linux,
Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-25
Last Updated: 2016-05-25

Potential Security Impact: Cross-Site Request Forgery (CSRF), Remote
Arbitrary Code Execution, Code Execution, Cross-Site Scripting (XSS), Denial
of Service (DoS), Disclosure of Sensitive Information, Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified with the
Matrix Operating Environment on Windows and Linux that could be exploited
remotely resulting in Denial of Service (DoS), Unauthorized Access, Execution
of arbitrary code, Cross-site scripting (XSS), Disclosure of Sensitive
Information, Code Execution, and locally resulting in Cross-site Request
Forgery (CSRF).

References:

CVE-2015-1788
CVE-2015-1789
CVE-2015-1790
CVE-2015-1791
CVE-2015-1792
CVE-2014-3569
CVE-2015-0205
CVE-2014-3508
CVE-2014-3509
CVE-2014-3511
CVE-2014-3513
CVE-2014-3567
CVE-2014-3568
CVE-2016-0705
CVE-2016-0799
CVE-2016-2842
PSRT110092
PSRT110095
CVE-2016-2026
CVE-2016-2027
CVE-2016-2028
CVE-2016-2029
CVE-2016-2030
CVE-2016-4357
CVE-2009-3555
CVE-2016-4358
CVE-2015-3194
CVE-2015-3195
CVE-2015-6565
CVE-2016-2017
CVE-2016-2018
CVE-2016-2019
CVE-2016-2020
CVE-2016-2021
CVE-2016-2022
CVE-2015-7501

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP Matrix Operating Environment Software prior to 7.5.1
HP Systems Insight Manager (HP SIM), Software prior to 7.5.1

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-1788(AV:N/AC:M/Au:N/C:N/I:N/A:P)4.3
CVE-2015-1789(AV:N/AC:M/Au:N/C:N/I:N/A:P)4.3
CVE-2015-1790(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2015-1791(AV:N/AC:M/Au:N/C:P/I:P/A:P)6.8
CVE-2015-1792(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2014-3569(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2015-0205(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2014-3508(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
CVE-2014-3509(AV:N/AC:M/Au:N/C:P/I:P/A:P)6.8
CVE-2014-3511(AV:N/AC:M/Au:N/C:N/I:P/A:N)4.3
CVE-2014-3513(AV:N/AC:M/Au:N/C:N/I:N/A:C)7.1
CVE-2014-3567(AV:N/AC:M/Au:N/C:N/I:N/A:C)7.1
CVE-2014-3568(AV:N/AC:M/Au:N/C:N/I:P/A:N)4.3
CVE-2016-0705(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-0799(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-2842(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-2026(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2016-2027(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2016-2028(AV:N/AC:L/Au:S/C:P/I:P/A:N)5.5
CVE-2016-2029(AV:N/AC:L/Au:N/C:P/I:P/A:N)6.4
CVE-2016-2030(AV:N/AC:L/Au:S/C:P/I:P/A:N)5.5
CVE-2016-4357(AV:L/AC:M/Au:S/C:P/I:C/A:N)5.0
CVE-2009-3555(AV:N/AC:M/Au:N/C:N/I:P/A:P)5.8
CVE-2016-4358(AV:A/AC:L/Au:N/C:P/I:P/A:N)4.8
CVE-2015-3194(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2015-3195(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2015-6565(AV:L/AC:L/Au:N/C:C/I:C/A:C)7.2
CVE-2016-2017(AV:N/AC:L/Au:S/C:P/I:P/A:N)5.5
CVE-2016-2018(AV:N/AC:M/Au:N/C:P/I:P/A:N)5.8
CVE-2016-2019(AV:L/AC:L/Au:M/C:C/I:C/A:N)5.9
CVE-2016-2020(AV:L/AC:L/Au:S/C:C/I:C/A:N)6.2
CVE-2016-2021(AV:L/AC:L/Au:M/C:C/I:C/A:N)5.9
CVE-2016-2022(AV:N/AC:H/Au:M/C:P/I:P/A:N)3.2
CVE-2015-7501(AV:N/AC:L/Au:N/C:P/I:P/A:P)7.5
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software updates to resolve these
vulnerabilities in the HPE Matrix Operating Environment. The HPE Matrix
Operating Environment 7.5.1 Update kit applicable to HPE Matrix Operating
Environment 7.5.x installations is available at the following location:

http://www.hpe.com/info/insightmanagement

HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletin:

HPE Systems Insight Manager (SIM) (HPE Security Bulletin: HPSBMU03590):

http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05131085

HISTORY
Version:1 (rev.1) - 25 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running 

[security bulletin] HPSBMU03600 rev.1 - HPE Insight Control server provisioning using OpenSSL, Remote Denial of Service (DoS)

2016-05-25 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05150736

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05150736
Version: 1

HPSBMU03600 rev.1 - HPE Insight Control server provisioning using OpenSSL,
Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-25
Last Updated: 2016-05-25

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HPE Insight Control server provisioning has addressed security
vulnerabilities in OpenSSL that could be exploited remotely resulting in
Denial of Service (DoS).

References:

CVE-2016-0705
CVE-2016-0799
CVE-2016-2842

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Insight Control server provisioning prior to version 7.5.1

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-0705(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-0799(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-2842(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following software updates available to resolve the
vulnerabilities for the impacted versions of HPE Insight Control server
provisioning. Please upgrade to Insight Control server provisioning version
7.5.1 to fix these vulnerabilities.

http://www.hpe.com/info/insightmanagement

Note: HPE Matrix Operating Environment 7.4.x requires an updated library to
be installed on the Central Management System (CMS) to work correctly with
Insight Control server provisioning 7.5.1.

Please contact your Hewlett Packard Enterprise support representative for
assistance to install this required patch. The CloudSystem Matrix patch is
named: 2M-56C-SAP_7.3.x-7.4.x-HOTFIX56C-d.

HISTORY
Version:1 (rev.1) - 25 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXRfRZAAoJEGIGBBYqRO9/B3kIANmXhtvnPrLP5vU7+4XXFtAJ
lFTiT8SxeHwsvSZvBNNeAFJ+sK0AdfsAtTenZ/OxsJmek6Ayon1JnEsgxYZeWNPt
OhR+vNzq6GXj68uDnSXCSvpMB9/teRWK3KecUniVch9NZXOIzExkdN8d9ZeABbYV
IHwpdsB/L7aCg5ZdbrlW5g+l6mTa4MXzUHNkCyOnwF43poiCiltR+kaAMddxtQE/
d6rl2NUZ1HCYR1UqSvNLorSLpk/gauAYgArFOiXqqRkd/5jJFiHOzwlHnSSRmDFy
RK1lr44vocxPkIkJzrEVwYnnMJpXYIquxSpla3tUzOkdy5y+8eMA2ChC3ovb0SI=
=Rqck
-END PGP SIGNATURE-


[security bulletin] HPSBUX03606 rev.1 - HPE HP-UX running Apache Tomcat 7, Multiple Remote Vulnerabilities

2016-05-25 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05150442

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05150442
Version: 1

HPSBUX03606 rev.1 - HPE HP-UX running Apache Tomcat 7, Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-25
Last Updated: 2016-05-25

Potential Security Impact: Remote Access Restriction Bypass, Cross-Site
Request Forgery (CSRF), Denial of Service (DoS), Directory Traversal,
Execution of Arbitrary Code With Privilege Elevation, URL Redirection,
Unauthorized Read Access to Data

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HP-UX running the
Apache Tomcat 7 Servlet Engine. These vulnerabilities could be exploited
remotely resulting in URL redirection, access restriction bypass, Cross-Site
Request Forgery (CSRF), directory traversal, unauthorized read access to
data, execution of arbitrary code with privilege elevation, or Denial of
Service (DoS).

References:

  - CVE-2015-5174 - Remote Directory Traversal
  - CVE-2015-5345 - Remote Execution of Arbitrary Code with Privilege
Elevation
  - CVE-2015-5346 - Remote Unauthorized Read Access to Data
  - CVE-2015-5351 - Remote Cross-Site Request Forgery (CSRF)
  - CVE-2016-0706 - Remote Unauthorized Read Access to Data
  - CVE-2016-0714 - Remote Execution of Arbitrary Code with Privilege
Elevation
  - CVE-2016-0763 - Remote Denial of Service (DoS)
  - PSRT110118

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX Tomcat-based Servlet v.7.x Engine 11.31 HP-UX B.11.31 Tomcat 7 prior to
D.7.0.68.01

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-5174(AV:N/AC:L/Au:S/C:P/I:N/A:N)   4.0
CVE-2015-5346(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
CVE-2016-0763(AV:N/AC:L/Au:S/C:P/I:P/A:P)   6.5
CVE-2016-0714(AV:N/AC:L/Au:S/C:P/I:P/A:P)   6.5
CVE-2016-0706(AV:N/AC:L/Au:S/C:P/I:N/A:N)   4.0
CVE-2015-5351(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
CVE-2015-5345(AV:N/AC:L/Au:N/C:P/I:N/A:N)   5.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software update to resolve the vulnerabilities
in the HP-UX Apache Tomcat 7 Servlet Engine.

  - Tomcat 7.0.68.01 for HP-UX Release B.11.31 (IPF and PA-RISC)

Depot: hpuxws22Tomcat_D.7.0.68.01_HP-UX_B.11.31_IA_PA.depot

  **Note:** The depot file can be found here:

  

**MANUAL ACTIONS:** Yes - Update

Download and install the software update

**PRODUCT SPECIFIC INFORMATION**

**HP-UX Software Assistant:** HP-UX Software Assistant is an enhanced
application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HPE and lists recommended actions that may apply to a specific
HP-UX
system. It can also download patches and create a depot automatically. For
more information see:


The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31 IA/PA
===
hpuxws22TOMCAT.TOMCAT
hpuxws22TOMCAT.TOMCAT2

action: install revision D.7.0.68.01 or subsequent

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 25 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = 

[security bulletin] HPSBMU03601 rev.1 - HPE Insight Control server deployment using OpenSSL, Multiple Vulnerabilities

2016-05-25 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05150800

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05150800
Version: 1

HPSBMU03601 rev.1 - HPE Insight Control server deployment using OpenSSL,
Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-25
Last Updated: 2016-05-25

Potential Security Impact: Cross-Site Scripting (XSS), Disclosure of
Information, Remote Denial of Service (DoS), Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HPE Insight Control server deployment has addressed the following security
vulnerabilities:

The Cross-protocol Attack on TLS using SSLv2 also known as "DROWN" which
could be exploited remotely resulting in disclosure of information
Multiple OpenSSL vulnerabilities which could be remotely exploited resulting
in Denial of Service (DoS)
Multiple vulnerabilities that can be exploited locally resulting in
Cross-site scripting (XSS), and Information Disclosure.

References:

CVE-2016-0705
CVE-2016-0799
CVE-2016-2842
CVE-2016-0800

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Insight Control server deployment All versions

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-0705(AV:N/AC:H/Au:N/C:C/I:C/A:C)7.6
CVE-2016-0799(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-2842(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-0800(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP Insight Control server deployment is End-Of-Life. HPE recommends customers
upgrade from HP Insight Control server deployment to the replacement product
HP Insight Control server provisioning 7.5.1, which is not impacted by this
vulnerability.

The white paper Data Migration from Insight Control server deployment to
Insight Control server provisioning at the following location provides
instructions on how to upgrade from HP Insight Control server deployment to
HP Insight Control server provisioning:

http://www8.hp.com/h20195/V2/getpdf.aspx/4AA4-8057ENW.pdf?ver=1.0

HP Insight Control server provisioning can be downloaded from the following
location:

http://www.hpe.com/info/insightmanagement

HISTORY
Version:1 (rev.1) - 25 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXRfdjAAoJEGIGBBYqRO9/r/0H/iAkKKyGdgdWQvbQuNzq5KzF

[security bulletin] HPSBGN03605 rev.1 - HPE Service Manager, Remote Disclosure of Information

2016-05-24 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05149290

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05149290
Version: 1

HPSBGN03605 rev.1 - HPE Service Manager, Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-24
Last Updated: 2016-05-24

Potential Security Impact: Remote Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential vulnerability has been identified in HPE Service Manager. The
vulnerability could be exploited remotely to allow disclosure of information.

References:

CVE-2016-2025
PSRT110018

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Service Manager Software 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41
Web Client, Service Request Catalog, Mobility

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2025(AV:N/AC:M/Au:N/C:P/I:N/A:N)   4.3
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

Hewlett Packard Enterprise thanks Todd Bertschi for reporting this issue to
security-al...@hpe.com.

RESOLUTION

HPE has provided the following mitigation information available to resolve
the vulnerability for the impacted versions of HPE Service Manager:

https://softwaresupport.hpe.com/km/KM02233778

HISTORY
Version:1 (rev.1) - 24 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXRLcNAAoJEGIGBBYqRO9/fuEH+wUR20zPVP8M4bTeHh/jl9l1
7e5EX42rpuqbBHigMmHjK6KCJuOVp8+dxtsVLbD9Io6EVyiXJQBAV0M6rBKwp6zh
La41/M3UPNngTW6vp3Ovm1+Jr5/W9sjnuqXEkypZ7gf45Ah/IE2hBo8H94qhIV8I
PCSd1MTyzxKVsxNV6DdkJlC43KrkAnv/XE37ofSy2Eb3SCsgpyB1xmLQC5/brNqs
sE/fc2vd03NERv8IoIjeNClYxw8LXX6D43gIz4g6Po0UNOhHPamvsq5EVa5ATmZ4
S1DRqL/QW+Dcg5GbMB0H0GZ+OLCPL2aSfa8jJ9NALbGXMp3vqEBwnFh318nrOlY=
=xMg7
-END PGP SIGNATURE-


[security bulletin] HPSBGN03564 rev.1 - HPE Release Control using Java Deserialization, Remote Code Execution

2016-05-19 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05063986

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05063986
Version: 1

HPSBGN03564 rev.1 - HPE Release Control using Java Deserialization, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-03-29
Last Updated: 2016-03-29

Potential Security Impact: Remote Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in Apache Commons Collections for handling Java object
deserialization was addressed by HPE Release Control. The vulnerability could
be exploited remotely to allow remote code execution.

References: CVE-2016-1999

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Release Control Software 9.13, 9.20, 9.21 Server

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-1999(AV:L/AC:L/Au:N/C:C/I:C/A:C)   7.2
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability in HPE Release Control:

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea
rch/document/KM02177013

HISTORY
Version:1 (rev.1) - 28 March 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJW+t/LAAoJEGIGBBYqRO9/d70IAKS9HwlkFbVgxuFQNLczoADm
gi7DLyHJRQvtYfJMK6Csj9YaOeR71QgKZ65maMvCEoiYdpkSVaqHPjoq+st7Dp+t
W5T5rgnxnqFhG3zPrjzR63eTh0A6ykBAnPFEN5LXP3Q551zzr0tvGQKMhFmklOBP
QFdaSWf1d84C574hNxRpIvCWtz6dHQLXpAgFkMlGA65e0jQqtoCCq9Dmtbux6pO/
8RwybmHqP+ZpafDWL4glaqHg7BIo1f/aVgMzAk962hX1Vj/3C59UwdenQpmwdlq0
t3ix4ZSon8wTO4zsWUvqUS2zKAu/QvSmlo3LZ4oxSrdUcpPVDRriUOUswHMS5l0=
=up2H
-END PGP SIGNATURE-


[security bulletin] HPSBGN03602 rev.1 - HPE RESTful Interface Tool, Local Disclosure of Information

2016-05-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05141083

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05141083
Version: 1

HPSBGN03602 rev.1 - HPE RESTful Interface Tool, Local Disclosure of
Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-18
Last Updated: 2016-05-18

Potential Security Impact: Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE RESTful
Interface Tool application on Linux and Windows. The vulnerability could be
exploited locally resulting in disclosure of information.

References:

CVE-2016-2023
PSRT110114

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP RESTful Interface Tool - v1.40

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2023(AV:L/AC:L/Au:S/C:C/I:C/A:C)   6.8
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software update to resolve the vulnerability
in HPE RESTful Interface Tool.

Please download the latest version of RESTful Interface Tool v1.50 from the
following location:

For Linux: https://h20566.www2.hpe.com/hpsc/swd/public/detail?idx==dri
verDocument==MTX_61aa73bfb6b5496c9b82b8acbd

For Windows: https://h20566.www2.hpe.com/hpsc/swd/public/detail?idx==d
riverDocument==MTX_c4164baacf7541dd95ea6b7605

HISTORY
Version:1 (rev.1) - 17 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXPK6mAAoJEGIGBBYqRO9/cnkH/Aia4Ith3b75cxgesCd6HzvM
ASgcBXUpYtnlXCdzPD5qdDGI13u1DwCWLvoe535+ATHmb25wpXH9jQMHbtdyOFub
lZxvaLnZNpYxtQQ9VkDFDr1Y+W3X1kq57RM0zo/O0H3wkNYQnJF21PIXczK5Letd
10Ei3cfOuCjyvCZwYZTDYCZ2cSBWxkRY1kwK3k8pXFDE7WwMbypb3ghlRcVr5qkB
iZpTuwhTvW+/cQZ+mA9c5M8aoze5VGYIFxgQuuHU7KxNTHq2kSyFg7/ub6uwS+rb
ljiWbUsBTaH+ooRU7CTbRAHDcxV3rJeP3+MRFu34IFvKeIESAqV86HpZ/2y6+ns=
=IMAZ
-END PGP SIGNATURE-


[security bulletin] HPSBHF03578 rev.1 - HPE ConvergedSystem for SAP HANA using glibc, Multiple Remote Vulnerabilities

2016-05-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05140858

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05140858
Version: 1

HPSBHF03578 rev.1 - HPE ConvergedSystem for SAP HANA using glibc, Multiple
Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-18
Last Updated: 2016-05-18

Potential Security Impact: Remote Arbitrary Code Execution, Denial of Service
(DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HPE ConvergedSystem for SAP HANA Solutions has addressed stack-based buffer
overflows in the GNU C library's (glibc) implementation of the getaddrinfo()
library function. These vulnerabilities could be exploited remotely to cause
a Denial of Service (DoS) or allow execution of arbitrary code on the host
with the permissions of a user using the glibc library.

References: CVE-2015-7547

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP ConvergedSystem 500 For SAP HANA Scale-out Configurations 2.0, 3.0
HP ConvergedSystem 500 For SAP HANA Scale-Up Configurations 2.0, 3.0
HP ConvergedSystem 900 for SAP HANA Scale-out Configurations 2.0, 3.0
HP ConvergedSystem 900 for SAP HANA Scale-up Configurations 2.0, 3.0
HP AppSystems for SAP HANA - Scale Out Configurations 1.0, 1.2
HP AppSystems for SAP HANA - Single Node Configurations 1.0

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-7547(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following software updates available to resolve these
vulnerabilities in HPE ConvergedSystem for SAP HANA:

OS patches for SLES for SAP 11 SP3 based systems

Please contact HPE Technical Support to determine your system's vulnerability
and support options.

HISTORY
Version:1 (rev.1) - 18 April 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXPHo8AAoJEGIGBBYqRO9/XmkH/2lPeGZHbFfY/ZzHt5nTGEbi
5ZYZKVInHfeKQ61/4M15pg7ikI+Xt1ydtYda1xbtV8djEvxqb4VEBZhlfzdMjzt5
c/TQWqkEOCDrm2KybI8k4y9OMt20uxjnz4eG+JYt6TNFeNUr8DBbWO/oJaghTjk5
NCmDCHs2JzvT+nJ43vSoW3f6UVB2Z5aNEdBAHIXp3yLIqSvwwz642NuawJqspXJh
l+V/oWICd8nPqCD6+8lkD+1IqJeX+MXh3GUzx/cLZIPqP1cCwaQBPpqTorg2cHPA
+Lu4ogTOZio/WppBNhaHVxpU9dJn+qnBBe3H+r5iVvZXTYSmJ9/P7/feHwOmxkY=
=lk5z
-END PGP SIGNATURE-


[security bulletin] HPSBHF03579 rev.1 - HPE ConvergedSystem for SAP HANA using OpenSSL, Multiple Remote Vulnerabilities

2016-05-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05143554

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05143554
Version: 1

HPSBHF03579 rev.1 - HPE ConvergedSystem for SAP HANA using OpenSSL, Multiple
Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-18
Last Updated: 2016-05-18

Potential Security Impact: Remote Disclosure of Privileged Information,
Unauthorized Access to Data, Unauthorized Access to Sensitive Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HPE ConvergedSystem for SAP HANA has addressed security vulnerabilities in
OpenSSL. The Cross-protocol Attack on TLS using SSLv2, also known as "DROWN",
could be could be remotely exploited resulting in disclosure of privileged
information, unauthorized access to data, and unauthorized access to
sensitive information.

References: CVE-2016-0800

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP ConvergedSystem 500 For SAP HANA Scale-out Configurations 2.0, 3.0
HP ConvergedSystem 500 For SAP HANA Scale-Up Configurations 2.0, 3.0
HP ConvergedSystem 900 for SAP HANA Scale-out Configurations 2.0, 3.0
HP ConvergedSystem 900 for SAP HANA Scale-up Configurations 2.0, 3.0
HP AppSystems for SAP HANA - Scale Out Configurations 1.0, 1.2
HP AppSystems for SAP HANA - Single Node Configurations 1.0

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-0800(AV:N/AC:M/Au:N/C:P/I:N/A:N)   4.3
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following software updates available to resolve these
vulnerabilities in HPE ConvergedSystem for SAP HANA:

OS patches for SLES for SAP 11 SP3 based systems

Please contact HPE Technical Support to determine your system's vulnerability
and support options.

HISTORY
Version:1 (rev.1) - 18 April 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXPHrbAAoJEGIGBBYqRO9/5PsH+gOdxfaWYPfIHNhL1sj+iwst
B3D2FvervrphhXJzHLsO5ABXSa2cn7vPaKpgxwRMSSBSUKt52uAKRh+nD48G0JTX
A2Ko5i59LfPJ4K0JEij36Tj3u2W4XdhtdjxHhazpZr8vlYqGZnnY5+5XiXUx9OmW
6YKp6IG21x8mJYH0T58aU6Zg5whKUEsAlElA4sZ3WG+WUx5LpvkWUKL4CFlh4Okx
zLa7jtMbpfYB3l9Vx522mnvvfu1DrFBD7kPMumC9CxMcM1Gb87ekDjUAhsdYGrBJ
teQfKrJUUqbvnFJvOlFRvRM9gGmjy1M/5tTsAv55K+o52ff1KW8BP8y9tlkNA8M=
=YJTa
-END PGP SIGNATURE-


[security bulletin] HPSBHF03594 rev.1 - HPE ConvergedSystem and AppSystem for SAP HANA using OpenSSL, Multiple Remote Vulnerabilities

2016-05-17 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05135617

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05135617
Version: 1

HPSBHF03594 rev.1 - HPE ConvergedSystem and AppSystem for SAP HANA using
OpenSSL, Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-16
Last Updated: 2016-05-16

Potential Security Impact: Remote Denial of Service (DoS), Unauthorized
Disclosure of Information, Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in OpenSSL have been addressed by HPE
ConvergedSystem 500 & 900 and HPE AppSystems for SAP HANA. The
vulnerabilities could be remotely exploited resulting in Denial of Service
(DoS), unauthorized disclosure of information, and unauthorized modification.

References:

CVE-2016-0705
CVE-2016-0799
CVE-2016-2842
PSRT110099

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HPE ConvergedSystem 500 For SAP HANA Scale-out Configurations v 2.0, v3.0
HPE ConvergedSystem 500 For SAP HANA Scale-Up Configurations v2.0, v3.0
HPE ConvergedSystem 900 for SAP HANA Scale-out Configurations v2.0
HPE ConvergedSystem 900 for SAP HANA Scale-up Configurations v2.0, v3.0
HPE AppSystems for SAP HANA - Scale Out Configurations v1.0, v1.2
HPE AppSystems for SAP HANA - Single Node Configurations v1.0

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-0705(AV:N/AC:H/Au:N/C:C/I:C/A:C)7.6
CVE-2016-0799(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-2842(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following software updates available to resolve these
vulnerabilities in HPE ConvergedSystem for SAP HANA:

OS patches for SLES for SAP 11 SP3 based systems
Please contact HPE Technical Support to determine your systems vulnerability
and support options.

HISTORY
Version:1 (rev.1) - 16 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXOiBDAAoJEGIGBBYqRO9/ZU0IAIrAHycJGQmJLngL0KJLw9TH
dI0/eX0Cx8k7s/+1EODc9SCjJpgc5scVFeZ4Dqx5lT64dTcACUXcXe/LBEPlRzaN
LycoY83P91Vyd7peqk5U6pc9UsrpGTTTSzwZue3RQlPnn6hmJ0uhcDtA9i34LmYW
JA42TYXL/FYxpIqvgAQa8dEL7ZQBfxdloMw+jp4bdNljiTBBpZJ5VL9rcbeaXycv
g5GviVZ/0g3owgcgfPHYo9rFtrq4Fwjscf9wYRP1h3mMJKizC+OwrVZkaiqdqhQL
+z711bueXsU6n7RPxYYYGNBVhNi948FxL1af9tHfVTEklI9xGf43VInt/uzPyCA=
=Z2f4
-END PGP SIGNATURE-


[security bulletin] HPSBMU03590 rev.1 - HPE Systems Insight Manager (SIM) on Windows and Linux, Multiple Vulnerabilities

2016-05-13 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05131085

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05131085
Version: 1

HPSBMU03590 rev.1 - HPE Systems Insight Manager (SIM) on Windows and Linux,
Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-12
Last Updated: 2016-05-12

Potential Security Impact: Cross-Site Request Forgery (CSRF), Cross-Site
Scripting (XSS), Remote Arbitrary Code Execution, Denial of Service (DoS),
Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Several potential security vulnerabilities have been identified in HPE
Systems Insight Manager (SIM) on Windows and Linux. The vulnerabilities could
be exploited remotely resulting in Denial of Service (DoS), execution of
arbitrary code, disclosure of information, Cross-site Request Forgery (CSRF),
and Cross-site scripting (XSS).

References:

CVE-2015-3194
CVE-2015-3195
CVE-2016-0705
CVE-2016-0799
CVE-2016-2842
PSRT110092
CVE-2015-6565

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Systems Insight Manager (HP SIM), prior to 7.5.1

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-3194(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2015-3195(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2016-0705(AV:N/AC:H/Au:N/C:C/I:C/A:C)7.6
CVE-2016-0799(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-2842(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2015-6565(AV:L/AC:L/Au:N/C:C/I:C/A:C)7.2
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software updates to resolve the
vulnerabilities for the impacted versions of HPE Systems Insight Manager
(SIM).

Please download the latest version of HPE Systems Insight Manager (7.5.1)
from the following location:

https://www.hp.com/go/hpsim

HISTORY
Version:1 (rev.1) - 12 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXNOVtAAoJEGIGBBYqRO9/sJsIAI4nfYFQWRl8KfhWNZgV12dX
ZZdfA78hbhr6Y+5kKuTlpO2Ad8f47xWUdPMp1uOWhE5uyvd/WMJD/UHgmGlMr0un
HpSzGQDsrBjawOvVRtRiy5ZqHElmS9jlyzXHA0029xHICjtI0icOjNIflkSblmXY
VYSp6jXb8l4KfspH/XlNNhxfl6qAJ1nhewgLKCwzoRpTrDLngFI8VeImITzq0zXF
fZGkR9qgDEPoXVLDUN/mq90UE0y6ueRyhjp9JImRpBMtJMvWY78hmoEGF7Y7v/18
eFW9HCu1mHpxG9AyzAYvqCq9pAgTOa9fCeQkRoLnE0SHvymkT7GVYoS/hAByRNU=
=5Rty
-END PGP SIGNATURE-


[security bulletin] HPSBMU03589 rev.1 - HPE Version Control Repository Manager (VCRM), Remote Denial of Service (DoS)

2016-05-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05131044

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05131044
Version: 1

HPSBMU03589 rev.1 - HPE Version Control Repository Manager (VCRM), Remote
Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-12
Last Updated: 2016-05-12

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Several potential security vulnerabilities have been identified with HPE
Version Control Repository Manager (VCRM) on Windows and Linux. The
vulnerabilities could be exploited remotely resulting in Denial of Service
(DoS).

References:

CVE-2015-1788
CVE-2015-1789
CVE-2015-1791
CVE-2015-1792
CVE-2015-1790
PSRT110093

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Version Control Repository Manager prior to 7.5.1

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-1788(AV:N/AC:M/Au:N/C:N/I:N/A:P)   4.3
CVE-2015-1789(AV:N/AC:M/Au:N/C:N/I:N/A:P)   4.3
CVE-2015-1791(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
CVE-2015-1792(AV:N/AC:L/Au:N/C:N/I:N/A:P)   5.0
CVE-2015-1790(AV:N/AC:L/Au:N/C:N/I:N/A:P)   5.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software updates to resolve the
vulnerabilities for the impacted versions of HPE Version Control Repository
Manager (VCRM) on Windows and Linux.

Please download the latest version of HPE Version Control Repository Manager
(VCRM) (7.5.1) from the following location:

VCRM for Windows:

https://www.hp.com/swpublishing/MTX-b59b11be53744759a650eadeb4

VCRM for Linux is only available only with HPE Systems Insight Manager (HPE
SIM):

https://www.hp.com/go/sim

HISTORY
Version:1 (rev.1) - 12 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXNN8bAAoJEGIGBBYqRO9/VesH/3v1Aktk80dgfadx5rEwTYNu
c5734BK5QYHWjeK2VMWral2oLXzqCHopRWqWon5IfRq2CiQ5W7FkHEAOGKTs8FLK
Z6vcTMDqlLTRA+KAaEtH8bCUwjgTAy+xj88xLragB6m/gguC5WfyMgGjEdfrVIkX
WsP2Uhorkz6X4us/19LYfnsyB5L1V4jEleCvD+Tc+haAoDc5jidaN1YRHHUJCXDU
BCME7tYIsD056lu7mriDK5gtzUUHvq7B6yRc+BZ6d5RaUmaWlzi83GseSRXjSrr2
hQCXWwEt+4cvYzIc5ZpU4kYFqpmF1ZeIhp5Mu0JyNdZItvLAeI++rVVfFBJZ+l0=
=O9zZ
-END PGP SIGNATURE-


[security bulletin] HPSBMU03591 rev.1 - HPE Server Migration Pack, Remote Denial of Service (DoS)

2016-05-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05130958

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05130958
Version: 1

HPSBMU03591 rev.1 - HPE Server Migration Pack, Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-12
Last Updated: 2016-05-12

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Several potential security vulnerabilities have been identified in HPE Server
Migration Pack (SMP) on Windows and Linux. The vulnerabilities could be
exploited remotely resulting in Denial of Service (DoS).

References:

CVE-2015-7547
CVE-2016-0728
PSRT110094

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Server Migration Pack prior to 7.5.1

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-7547(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
CVE-2016-0728(AV:L/AC:L/Au:N/C:C/I:C/A:C)   7.2
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE Server Migration Pack 7.5.1 is only available on the HPE Insight
Management 7.5.1 DVD.  Please download the HPE Insight Management 7.5.1 DVD
from the following location:

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber
=IMDVD

HISTORY
Version:1 (rev.1) - 12 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXNNoaAAoJEGIGBBYqRO9/y+oH/3JogpygQ0bt0olkCIYoY2TB
mqxUoaEEIuY5OdrSBlKKwUB4MtlZjtxZXOHBMxz4eeUyhoauQE5JO0YX/HY5RKfe
p+3/C6Ub1W+rYLrdl1pQiedTV5/JsGYSLXtLIKJaM6O6RId0HJEhjCI/s/Yeyks7
WjmkygWG4UhwWI8SwGUtce456jt4nnfsBJwJvWsINT/9yK6C7bVaBnslkk4PKsjW
XVhx9DSnEANk4s2r6yqqjIf9wwb9zN+yYDBQEPTvF6SmBLJtDLWO5fi90VdRe9sd
SQAvQUL9y/o+/7ZaFzXi+yJNuzN9T1W2Dw8K/iTDFteNlI/cvx32Q2GkMLDj0nk=
=Ao/W
-END PGP SIGNATURE-


[security bulletin] HPSBGN03597 rev.1 - HPE Cloud Optimizer (Virtualization Performance Viewer) using glibc Remote Denial of Service (DoS)

2016-05-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05125672

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05125672
Version: 1

HPSBGN03597 rev.1 - HPE Cloud Optimizer (Virtualization Performance Viewer)
using glibc Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-12
Last Updated: 2016-05-12

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in GNU C Library (glibc) was addressed by HPE Cloud Optimizer
(Virtualization Performance Viewer). The vulnerability could be exploited
remotely to allow Denial of Service (DoS).

References:

CVE-2015-7547
PSRT110108

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Cloud Optimizer Cloud Optimizer v3.0 ; Virtualization Performance Viewer
v2.20; Virtualization Performance Viewer v2.10

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-7547(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following mitigation information to resolve the
vulnerability for the impacted versions of HPE Cloud Optimizer
(Virtualization Performance Viewer):

https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse
arch/document/KM02251735?lang=en=us=202392_SSO_PRO_HPE

HISTORY
Version:1 (rev.1) - 12 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXNKcEAAoJEGIGBBYqRO9/FR4IAIQgaz18Ek6jelmZ/dikNkSP
2gTUz9wB/+oB4AG3Usf3EeL2oeVp2HycKz1dEiG9WyKEsq7pTDfhtxLvzN44/4OO
SqSa9OwKclxlpHuE8CPjROTW81BeUOKRNXUYJcoXWCUHyVOZv/8K6ZGH1NnUv2ps
QIwZX5pA3GTD7JMCzHJ4Tky4vTnBLLICMlJxQmhp0zSEEGaDquzKZNYxSOBZP6wn
i/Y0bTYUoIOAsKqUxt09++BBcWlQI9CAKNcQoO+C6DEErTVrFpRfxpaT3syNpwAu
qFI26he4yFoheSkMxqNNYEXXouMphz5YAMPrHG/fm1GGps4WCLNDraqwFB1GPNc=
=evRD
-END PGP SIGNATURE-


[security bulletin] HPSBST03599 rev.1 - HPE 3PAR OS running OpenSSH, Remote Denial of Service (DoS), Access Restriction Bypass

2016-05-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05128992

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05128992
Version: 1

HPSBST03599 rev.1 - HPE 3PAR OS running OpenSSH, Remote Denial of Service
(DoS), Access Restriction Bypass

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-11
Last Updated: 2016-05-11

Potential Security Impact: Remote Access Restriction Bypass, Denial of
Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in OpenSSH has been addressed by HPE 3PAR OS. The vulnerabily
could be exploited remotely resulting in Denial of Service (DoS) or access
restriction bypass.

References:

  - CVE-2015-5600
  - PSRT110106

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE 3PAR OS versions 3.1.3 and later, prior to 3.2.1 MU5 and 3.2.2 MU2
running OpenSSH

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-5600(AV:N/AC:L/Au:N/C:P/I:N/A:C)   8.5
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software updates and mitigation information to
resolve the vulnerability in 3PAR OS running OpenSSH.

+ 3PAR OS 3.2.1 MU5 and 3.2.2 MU2

- HPE recommends prior impacted versions update to 3PAR OS 3.2.1 MU5 or
3.2.2 MU2.
- OpenSSH has been updated in these releases to resolve the vulnerability
in OpenSSH.

+ 3PAR OS 3.1.3 is also vulnerable but will not be fixed.

**Mitigation:** The best protection to guard against exploitation of this
vulnerability is to securely configure and operate the storage array in
accordance with the *HPE 3PAR Configuration Guidelines* documentation. Please
contact HPE Technical Support for assistance.

HISTORY
Version:1 (rev.1) - 11 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXM6AtAAoJEGIGBBYqRO9/e3IIANA1uuOMtztOsTLX+fLKOEKq
RFHzGHEVKDrc+GoKy4iI5RP3GH/v+YCiZAaqXnA5nJQLIT0zZRRHYd1apGY2aVh2
vGDPGFBnWQKBj8tJV+5nibuEhvj8YfmPxdtNo/TLvSFeFOKP2nI8T/NG4QPiusEK
HSGV0crxZ9HTRHsOjLQcdFc46676Joq4RwXbcSFvuZlXuCWIOqW14x44niXWZbBZ
ZEQd/WvfE3D6ChM1VXw9NNau41zdT4aNOKlF4+svx1ZOtZnD7udD2H5+H/LbfbUs
mlOXrrvSZF/amR8wXLAM3bCYkmBUCJnOaL+FOrTha3mfzuGrZKRvyCcRlatqdnQ=
=JdIg
-END PGP SIGNATURE-


[security bulletin] HPSBST03598 rev.1 - HPE 3PAR OS using glibc, Remote Denial of Service (DoS), Arbitrary Code Execution

2016-05-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05128937

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05128937
Version: 1

HPSBST03598 rev.1 - HPE 3PAR OS using glibc, Remote Denial of Service (DoS),
Arbitrary Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-11
Last Updated: 2016-05-11

Potential Security Impact: Remote Arbitrary Code Execution, Denial of Service
(DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HPE 3PAR OS has addressed stack based buffer overflows in glibc's
implementation of getaddrinfo(). This vulnerability could be remotely
exploited to cause Denial of Service (DoS) or allow execution of arbitrary
code on the host with the permissions of a user running glibc library.

References:

  - CVE-2015-7547
  - PSRT110105

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE 3PAR OS versions 3.1.3 and later, prior to 3.2.1 MU5 and 3.2.2 MU2 using
glibc

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-7547(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software updates and mitigation information to
resolve the vulnerability in 3PAR OS using glibc.

+ 3PAR OS 3.2.1 MU5 and 3.2.2 MU2

- HPE recommends prior impacted versions update to 3PAR OS 3.2.1 MU 5 or
3.2.2 MU2.
- glibc has been updated in these releases to resolve the glibc
vulnerability.

+ 3PAR OS 3.1.3 is also vulnerable but will not be fixed.

**Mitigation:** The best protection to guard against exploitation of this
vulnerability is to securely configure and operate the storage array in
accordance with the *HPE 3PAR Configuration Guidelines* documentation. Please
contact HPE Technical Support for assistance.

HISTORY
Version:1 (rev.1) - 11 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXM6AtAAoJEGIGBBYqRO9/QioH/RZSc5YPunh3BS9OpwmTeeib
2B1ScjFu60S0m4w66Zpy3j4K4OX0o1VyXLmJQogGAS0E+/rnpAiMxjUWJA7DMQ3W
AMRtz7Vpbrq2oz7v/q3/w2HkPpMAq3UOrTseN9sNPRzuTCVdsY4LZw/qVlpXWPvb
1Z+M5s0LMk1Y8+GSjx3+4E+LmqUBccn1HfCDH4MddvBxM+HvFepAxnzsAyLc+lFM
4jgch19LAbteSbPIubEPUyJIX0Ync7JF4AXdg2dHhOWZLV9rcHbijDr+VUo1sXYK
xLMdC6RH+VpGqUmLd2auoS8rhRn58ytxRSnqkOQ2a6vcOsUyHl/3RJzAOmH52Lg=
=pCEE
-END PGP SIGNATURE-


[security bulletin] HPSBST03586 rev.1 - HPE 3PAR OS, Remote Unauthorized Modification

2016-05-11 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05128722

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05128722
Version: 1

HPSBST03586 rev.1 - HPE 3PAR OS, Remote Unauthorized Modification

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-11
Last Updated: 2016-05-11

Potential Security Impact: Remote Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE 3PAR OS. This
is the TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman
key exchange known as "Logjam" which could be exploited remotely to allow
unauthorized modification.

References:

  - CVE-2015-4000
  - PSRT110085

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE 3PAR OS versions 3.1.3 and later, prior to 3.2.1 MU5 and 3.2.2 MU2
running OpenSSL

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-4000(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software updates and mitigation information to
resolve the vulnerability in 3PAR OS.

+ 3PAR OS 3.2.1 MU5 and 3.2.2 MU2

- HPE recommends prior impacted versions update to 3PAR OS 3.2.1 MU 5 or
3.2.2 MU2.
- OpenSSL has been updated in these releases.

+ 3PAR OS 3.1.3 is also vulnerable but will not be fixed.

**Mitigation:** The best protection to guard against exploitation of this
vulnerability is to securely configure and operate the storage array in
accordance with the *HPE 3PAR Configuration Guidelines* documentation. Please
contact HPE Technical Support for assistance.

HISTORY
Version:1 (rev.1) - 11 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXM6AtAAoJEGIGBBYqRO9/ifgH+wa/Mmi89DJJab9q+Mm/TK/G
zU+isalJIlvu7pu4qAzfFJDOicXK5AwywjXo0RHORKeevBq0+cNzBuOvvIlQ/1Zf
8b3/BCIckNdirsjko8WPJxBYch1hKrMmC20lmZpYwW1CVcO5eePCwLxNhgdFzC6u
63mmOSDlWsPfWt495YpMHODcEefaLZOcOs3QeduMov9erMM19X0TTiFjfwJgHelP
Wj73TZVnjXfiqWdpblGvf9H5lHsx829NbYP/qfNuie2Q4WJKdggH+g9LMxGb9dt3
yASAk0zbUCmrg2vhX3Jw+9ZignVDecAP79Kf8hKFazy2J9LnWZTNMbWYUeyk6PA=
=QZi5
-END PGP SIGNATURE-


[security bulletin] HPSBNS03581 rev.2 - HPE NonStop Servers running Samba (NS-Samba), Multiple Remote Vulnerabilities

2016-05-11 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05082964

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05082964
Version: 2

HPSBNS03581 rev.2 - HPE NonStop Servers running Samba (NS-Samba), Multiple
Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-04-13
Last Updated: 2016-05-11

Potential Security Impact: Remote Arbitrary File Deletion, Denial of Service
(DoS), Disclosure of Sensitive Information, Multiple Vulnerabilities,
Unauthorized Access, Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in Samba could potentially impact HPE NonStop
Servers. These vulnerabilities could be remotely exploited using
man-in-the-middle (MITM) attacks resulting in Denial of Service (DoS),
arbitrary file deletion, disclosure of sensitive information, unauthorized
access, or unauthorized modification of file or database.

Note: This product is NOT affected by the 'Badlock' vulnerability
(CVE-2016-2118).

Affected RVUs:

L15.02 - L15.08.01 J06.04 - J06.19.02 H06.15 - H06.29.01

References:

CVE-2016-2110
CVE-2016-2111
CVE-2016-2112
CVE-2016-2115
PSRT110079
HS03321 (NonStop HotStuff Notice)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Samba on NonStop - T1201L01, T1201L01^AAI (L series), T1201H01 through
T1201H01^AAH (H/J series)

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2110(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2016-2111(AV:A/AC:M/Au:N/C:P/I:P/A:N)   4.3
CVE-2016-2112(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2016-2115(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has released following software updates to resolve the vulnerabilities in
NonStop Samba Server.

Install following Software Product Revisions (SPRs):

L series: T1201L01^AAK, usable with L15.02 through L15.08.01

J and H series: T1201H01^AAJ, usable with J06.04 through J06.19.01 and H06.15
through H06.29.01

Note: See NonStop Hotstuff HS03321

HISTORY
Version:1 (rev.1) - 13 April 2016 Initial release
Version:2 (rev.2) - 11 May 2016 Added CVSS vector and score table

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXM1hGAAoJEGIGBBYqRO9/77UIAMflMcCm61gZ8UfxZ4FmdHS0
fOsXMWH6NHfDDS9v0Dh2pAXhpOri7h71+Jl4pfOovTQJDDvxNuLnaYkNKU0AJFb/
mJBdkjd/nYx2PMzecLYA/14G2QKjsdSI7aXWz0LhXMpkC02+6ZXDrVu0xJWEwV3u

[security bulletin] HPSBHF03592 rev.1 - HPE VAN SDN Controller OVA using OpenSSL, Multiple Remote Vulnerabilities

2016-05-11 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05126404

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05126404
Version: 1

HPSBHF03592 rev.1 - HPE VAN SDN Controller OVA using OpenSSL, Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-11
Last Updated: 2016-05-11

Potential Security Impact: Remote Denial of Service (DoS), Remote
Unauthorized Disclosure of Information, Remote Unauthorized Modification Of
Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Several potential security vulnerabilities have been identified in the
OpenFlow Virtual Appliance (OVA) version of the HPE VAN SDN Controller using
OpenSSL which could be exploited remotely to allow Denial of Service (DoS),
unauthorized disclosure of information, and unauthorized modification of
information.

References:

CVE-2016-0705
CVE-2016-0799
CVE-2016-2842

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE VAN SDN CONTROLLER SOFTWARE 2.7.10 OVA

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-0705(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-0799(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2016-2842(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following instructions to mitigate these vulnerabilities
in the OVA version of HPE VAN SDN Controller:

Follow these steps to update the version of OpenSSL in the controller, which
reduces the risk of these vulnerabilities:

If a proxy is configured to access the Internet:

Edit the "apt.conf" file found in the /etc/apt directory.
Add the http proxy setting by adding a line similar to the following:

Acquire::http::Proxy "http://proxy-ip:proxy-port/;;

Create and Edit the sources.list file in the /etc/apt directory:

Add the line: deb http://security.debian.org/ jessie/updates main contrib
non-free

Run updates for apt-get indexes:

sudo apt-get update

Run apt-get upgrade command to upgrade openssl version:

sudo apt-get upgrade openssl

Remove the "sources.list" file from /etc/apt directory.

If a proxy is configured in the first step:

Edit the "apt.conf" file found in the /etc/apt directory.
Remove the http proxy setting by removing the line added in step 1:

Acquire::http::Proxy "http://proxy-ip:proxy-port/;;

Reboot the system to use the newer version of OpenSSL.

HISTORY
Version:1 (rev.1) - 11 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their 

[security bulletin] HPSBUX03574 rev.1 - HPE HP-UX CIFS-Server (Samba), Remote Access Restriction Bypass, Authentication bypass, Denial of Service (DoS), Unauthorized Access to Files, Access Restrictio

2016-05-11 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05115993

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05115993
Version: 1

HPSBUX03574 rev.1 - HPE HP-UX CIFS-Server (Samba), Remote Access Restriction
Bypass, Authentication bypass, Denial of Service (DoS), Unauthorized Access
to Files, Access Restriction Bypass, Unauthorized Information Disclosure

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-09
Last Updated: 2016-05-09

Potential Security Impact: Remote access restriction bypass, authentication
bypass Denial of Service (DoS), unauthorized access to files, access
restriction bypass, unauthorized information disclosure

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP-UX
CIFS-Server (Samba). The vulnerabilities could be exploited remotely to cause
access restriction bypass, authentication bypass, Denial of Service (DoS),
unauthorized access to files, access restriction bypass, or unauthorized
information disclosure.

References:

CVE-2015-5252
CVE-2015-5296
CVE-2015-5299
CVE-2014-0178
CVE-2013-4496
CVE-2013-4475
CVE-2013-0213
CVE-2013-0214
CVE-2014-0244
CVE-2014-3493
PSRT110074

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX Common Internet File System (CIFS), Client/Server Software All Versions
prior to 03.02.04

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-5252(AV:N/AC:L/Au:N/C:N/I:P/A:N)   5.0
CVE-2015-5296(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2015-5299(AV:N/AC:L/Au:N/C:P/I:N/A:N)   5.0
CVE-2014-0178(AV:N/AC:M/Au:S/C:P/I:N/A:N)   3.5
CVE-2013-4496(AV:N/AC:L/Au:N/C:P/I:N/A:N)   5.0
CVE-2013-4475(AV:N/AC:H/Au:N/C:P/I:P/A:N)   4.0
CVE-2013-0213(AV:N/AC:H/Au:N/C:P/I:P/A:P)   5.1
CVE-2013-0214(AV:N/AC:H/Au:N/C:P/I:P/A:P)   5.1
CVE-2014-0244(AV:A/AC:L/Au:N/C:N/I:N/A:P)   3.3
CVE-2014-3493(AV:A/AC:L/Au:S/C:N/I:N/A:P)   2.7
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following software updates to resolve the
vulnerabilities.

Updates are available for download from: https://h20392.www2.hpe.com/portal/s
wdepot/displayProductInfo.do?productNumber=B8725AA

HP-UX CIFS-Server (Samba):- A.03.02.06HP-UX Release :- 11iv3Samba Depot name
:- HP_UX_11.31_CIFS-SERVER_A.03.02.06_HP-UX_B.11.31_IA_PA.depot

MANUAL ACTIONS: Yes - UpdateInstall HP-UX CIFS-Server (Samba) A.03.02.06 or
subsequent for 11i v3

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
which replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HP and lists recommended actions that may apply to a specific HP-UX
system. It can also download patches and create a depot automatically. For
more information see: https://h20392.www2.hpe.com/portal/swdepot/displayProdu
ctInfo.do?productNumber=B6834AA

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31 IA/PA
===
CIFS-Development.CIFS-PRG
CIFS-Server.CIFS-ADMIN
CIFS-Server.CIFS-DOC
CIFS-Server.CIFS-LIB
CIFS-Server.CIFS-RUN
CIFS-Server.CIFS-UTIL
action: install REVISION A.03.02.06 or subsequent

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 9 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett 

[security bulletin] HPSBUX03596 rev.1 - HPE HP-UX running CIFS Server (Samba), Remote Access Restriction Bypass, Unauthorized Access

2016-05-11 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05121842

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05121842
Version: 1

HPSBUX03596 rev.1 - HPE HP-UX running CIFS Server (Samba), Remote Access
Restriction Bypass, Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-09
Last Updated: 2016-05-09

Potential Security Impact: Remote Access Restriction Bypass, Gain
Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in Samba was addressed by HPE HP-UX running CIFS
Server (Samba). The vulnerability could be exploited resulting in remote
access restriction bypass and unauthorized access.

References: CVE-2015-7560

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX Common Internet File System (CIFS), Client/Server Software All version
upto 03.02.06

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2015-7560(AV:N/AC:L/Au:S/C:N/I:P/A:N)   4.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided the following workarounds. Apply either one:

Workaround 1: Add the parameter: unix extensions = no to the [global] section
of your smb.conf and restart smbd.

Workaround 2: Prohibit the use of SMB1 by setting the parameter: server min
protocol = SMB2 to the [global] section of your smb.conf and restart smbd.

HISTORY
Version:1 (rev.1) - 9 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJXMP9aAAoJEGIGBBYqRO9/zQ8IAKNoOfVBHi1b7JBzKDKM+ryZ
/gVYJrbKd5V9cd/JZRZSJ3fFzlkVD6DPnCrRKnL8U1ZPuGp27+WY2nvMzvnQb33Q
oJjEZNekeLchCheDMqD/cFqZk+uZsk1qVVXtWZJP0ryV4FK0OIOy+wg9SjAH+LDg
7KZ2WQyNefVVw0bYsUc9z54LWUNJDPZk4j2RHeoq26VVQYc0dwbe9l2z8r8L65eL
mNwB7NuuBjRtCkQXdWRxojhtb5mHyCw+Cq1dLRG4JIik9SlzOjUsNBUXmYzw2Kfw
J/QbbRK5Wyjiu9m0/IWkD2nJtCmwQpBGuSYp2/yFqe6/ZlxZXysEG/+h6MNL3Tc=
=2F7Y
-END PGP SIGNATURE-


[security bulletin] HPSBUX03577 SSRT102172 rev.1 - HP-UX VxFS, Local Unauthorized Access to Files

2016-05-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05121749

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05121749
Version: 1

HPSBUX03577 SSRT102172 rev.1 - HP-UX VxFS, Local Unauthorized Access to Files

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-09
Last Updated: 2016-05-09

Potential Security Impact: Local Unauthorized Access to Files

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HP-UX VxFS ACL
inheritance. The vulnerability could result in local unauthorized access to
files.

Notes:

  - Default ACL entries "default:other:", "default:user:", and
"default:class:" are not inherited correctly.
  - There is a risk that file access restrictions may not be effective on
inherited ACLs to restrict file or directory access by other users, for
example, by defining "default:other:---" in a parent directory.
  - The defect does not impact "default:group:" entries.

References:

  - CVE-2016-2016
  - SSRT102172

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX 11iv3 VxFS 5.0, VxFS 5.0.1, VxFS 5.1SP1

  - Base-VxFS-50 B.05.00.01 through B.05.00.02
  - Base-VxFS-501 B.05.01.0 through B.05.01.03
  - Base-VxFS-51 B.05.10.00 through B.05.10.02

  Note: VxFS 4.1 on HP-UX 11iv3 and VxFS 5.0 on HP-UX 11iv2 are not affected.

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2016(AV:L/AC:L/Au:S/C:P/I:N/A:N)   1.7
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has released the following updates to resolve the vulnerability in HP-UX
11iv3 VxFS.

  - Base-VxFS-50

PHKL_44459 VxFS 5.0 MP1P14

  - Base-VxFS-501

PHKL_44411 VxFS 5.0.1 RP3P14

  - Base-VxFS-51

PHKL_44439 VxFS 5.1 SP1RP3P6

  The updates are available for download at the following location:

https://h20565.www2.hpe.com/portal/site/hpsc/patch/home

  Note: A valid HPE Passport account is needed to download the patches.
Please contact HPE Technical Support for assistance.

MANUAL ACTIONS: No

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HPE and lists recommended actions that may apply to a specific
HP-UX system. It can also download patches and create a depot automatically.
For more information see: https://h20392.www2.hpe.com/portal/swdepot/displayP
roductInfo.do?productNumber=B6834AA

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

For VxFS 5.0 MP1P14
HP-UX B.11.31
=

VRTSvxfs.VXFS-KRN
action: install patch PHKL_44459 or subsequent

For VxFS 5.0.1 RP3P14
HP-UX B.11.31
=

VRTSvxfs.VXFS-KRN
action: install patch PHKL_44411 or subsequent

For VxFS 5.1 SP1RP3P6
HP-UX B.11.31
=

VRTSvxfs.VXFS-KRN
action: install patch PHKL_44439 or subsequent

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 9 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for

[security bulletin] HPSBMU03584 rev.1 - HPE Network Node Manager I (NNMi), Multiple Remote Vulnerabilities

2016-05-05 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05103564

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05103564
Version: 1

HPSBMU03584 rev.1 - HPE Network Node Manager I (NNMi), Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-05-03
Last Updated: 2016-05-03

Potential Security Impact: Remote Arbitrary Code Execution, Authentication
Bypass, Cross-Site Scripting (XSS), Disclosure of Information, Unauthorized
Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in Apache Commons Collections (ACC) for handling Java object
deserialization and other vulnerabilities have been addressed by HPE Network
Node Manager I (NNMi). These vulnerabilities could be remotely exploited
resulting in arbitrary code execution, authentication bypass, Cross-Site
Scripting (XSS), disclosure of information, or unauthorized access.

References:

  - CVE-2016-2009 - Remote Arbitrary Code Execution, Apache Commons
Collections (ACC)
  - CVE-2016-2010 - Cross-Site Scripting (XSS)
  - CVE-2016-2011 - Cross-Site Scripting (XSS)
  - CVE-2016-2012 - Remote Authentication Bypass
  - CVE-2016-2013 - Remote Disclosure of Information
  - CVE-2016-2014 - Remote Unauthorized Data Access
  - CVE-2012-6153 - Remote Disclosure of Information, Apache Commons HTTP
Client
  - CVE-2014-3577 - Remote Disclosure of Information, Apache Commons HTTP
Client
  - PSRT110087

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Network Node Manager I (NNMi) Software versions 9.20, 9.20, 9.20, 9.23,
9.24, 9.25; 10.00, and 10.01

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2016-2009(AV:N/AC:M/Au:S/C:N/I:P/A:N)   3.5
CVE-2016-2010(AV:N/AC:M/Au:S/C:N/I:P/A:P)   4.9
CVE-2016-2011(AV:N/AC:M/Au:S/C:N/I:P/A:P)   4.9
CVE-2012-6153(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2014-3577(AV:N/AC:M/Au:N/C:P/I:P/A:N)   5.8
CVE-2016-2012(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
CVE-2016-2013(AV:N/AC:M/Au:S/C:P/I:N/A:N)   3.5
CVE-2016-2014(AV:N/AC:M/Au:S/C:N/I:C/A:C)   7.9
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerabilities for HPE Network Node Manager i (NNMi).

+ NNMi version 9.2x

**Note:** Requires 9.2x series patch 5 is installed.

  - Windows

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM02020463

  - Linux

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/LID/NNM920L_00022

  - HP-UX

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/LID/NNM920H_00022

  - Solaris

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM02020460

+ NNMi version 10.0x

  - Windows

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM01865498

  - Linux

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/
facetsearch/document/KM01865484

HISTORY
Version:1 (rev.1) - 3 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained 

<    1   2   3   4   5   6   7   8   9   10   >