From aleph1@DFW.NET Mon Sep 22 00:21:43 1997 Date: Tue, 9 Sep 1997 09:18:25 -0500 From: Aleph One To: BUGTRAQ@NETSPACE.ORG Subject: Security Bulletins Digest HP Support Information Digests =============================================================================== o HP Electronic Support Center World Wide Web Service --------------------------------------------------- If you subscribed through the HP Electronic Support Center and would like to be REMOVED from this mailing list, access the HP Electronic Support Center on the World Wide Web at: http://us-support.external.hp.com Enter the Support Information Digests service as a registered user, using your HP Electronic Support Center User ID and Password to login. You may then unsubscribe from the appropriate digest. =============================================================================== Digest Name: Daily Security Bulletins Digest Created: Tue Sep 9 4:30:08 PDT 1997 Table of Contents: Document ID Title --------------- ----------- HPSBUX9704-058 Security Vulnerability in libXt for HP-UX 9.X & 10.X HPSBUX9707-067 Buffer overflows in X11/Motif libraries HPSBUX9709-069 Security Advisory in vuefile, vuepad, et. al. in HP-UX The documents are listed below. ------------------------------------------------------------------------------- Document ID: HPSBUX9704-058 Date Loaded: 970909 Title: Security Vulnerability in libXt for HP-UX 9.X & 10.X ------------------------------------------------------------------------ **REVISED 02**HEWLETT-PACKARD SECURITY BULLETIN: #00058, 28 April 1997 Last Revised: 08 September 1997 ------------------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett Packard will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------------- PROBLEM: Buffer overflow condition in libXt/Error.c PLATFORM: HP 9000 series 700/800 systems running version 9.X or 10.X DAMAGE: Users could increase privileges. SOLUTION: Apply the patches listed below and relink any suid/sgid programs that use libXt.a. Programs that use the shared library libXt.sl require no action other than loading the patches. AVAILABILITY: All patches are available now. CHANGE SUMMARY: Added patches for HP-UX 10.24. ------------------------------------------------------------------------- I. A. Background A buffer overflow condition has been identified in the Xt library. This can be exploited using suid/sgid programs to increase privileges. B. Fixing the problem Apply the library patches and relink any suid/sgid programs that are linked with the archived version of libXt. C. Recommended solution **REVISED 02** Install the applicable patches: PHSS_10167 9.X X11R5/Motif1.2 Runtime PHSS_10168 9.X X11R5/Motif1.2 Development PHSS_9809 10.0X X11R5/Motif1.2 Runtime (also for 10.10) PHSS_9810 10.0X X11R5/Motif1.2 Development PHSS_9809 10.10 X11R5/Motif1.2 Runtime (also for 10.0X) PHSS_9811 10.10 X11R5/Motif1.2 Development PHSS_10688 10.20 X11R5/Motif1.2 Runtime PHSS_9813 10.20 X11R5/Motif1.2 Development PHSS_10789 10.20 X11R6/Motif1.2 Runtime PHSS_9815 10.20 X11R6/Motif1.2 Development -->>PHSS_11021 10.24 VVOS X/Motif Runtime July97 Periodic patch Then relink as indicated above. D. Impact of the patch Installs new versions of X11R5 or X11R6 and Motif1.2. E. To subscribe to automatically receive future NEW HP Security Bulletins from the HP Electronic Support Center via electronic mail, do the following: User your browser to get to the HP Electronic Support Center page at: http://us-support.external.hp.com (for US, Canada, Asia-Pacific, & Latin-America) http://europe-support.external.hp.com (for Europe) Click on the Technical Knowledge Database, register as a user (remember to save the User ID assigned to you, and your password), and it will connect to a HP Search Technical Knowledge DB page. Near the bottom is a hyperlink to our Security Bulletin archive. Once in the archive there is another link to our current security patch matrix. Updated daily, this matrix is categorized by platform/OS release, and by bulletin topic. F. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. ________________________________________________________________________ -----End of Document ID: HPSBUX9704-058-------------------------------------- Document ID: HPSBUX9707-067 Date Loaded: 970909 Title: Buffer overflows in X11/Motif libraries ------------------------------------------------------------------------- **REVISED 01** HEWLETT-PACKARD SECURITY BULLETIN: #00067, 30 July 1997 Last Revised: 08 September 1997 ------------------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett Packard will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------------- PROBLEM: Buffer overflows in X11/Motif libraries. PLATFORM: HP9000 Series 700/800 running releases 9.X and 10.X DAMAGE: Suid/sgid programs linked with X11/Motif libraries can be exploited to increase privileges. SOLUTION: Install the patches listed below. Any programs that are linked archived with any previous versions of the X11/Motif libraries must be relinked with the libraries in the patches. AVAILABILITY: The patches are available now. CHANGE SUMMARY: Added patches for HP-UX 10.24. ------------------------------------------------------------------------- I. A. Background - Several buffer overflow conditions have been identified. These have been present in all previous versions of the X11/Motif libraries. B. Fixing the problem - Install the applicable patches: **REVISED 01** PHSS_11626 9.X X11R5/Motif1.2 Runtime PHSS_11627 9.X X11R5/Motif1.2 Development PHSS_11043 10.0X X11R5/Motif1.2 Runtime (also for 10.10) PHSS_11044 10.0X X11R5/Motif1.2 Development PHSS_11043 10.10 X11R5/Motif1.2 Runtime (also for 10.0X) PHSS_11045 10.10 X11R5/Motif1.2 Development PHSS_11628 10.20 X11R5/Motif1.2 Runtime PHSS_11629 10.20 X11R5/Motif1.2 Development PHSS_11628 10.20 X11R6/Motif1.2 Runtime PHSS_11630 10.20 X11R6/Motif1.2 Development -->>PHSS_11021 10.24 VVOS X/Motif Runtime July97 Periodic patch PHSS_9858 9.X VUE 3.0 PHSS_9804 10.01 VUE 3.0 PHSS_9805 10.10/10.20 VUE 3.0 PHSS_11373 9.X JSE A.B9.40 Then relink any suid/sgid programs that use X11 or Motif archived libraries. C. Recommended solution - Install the applicable patches and relink archived suid/sgid programs. D. Impact of the patch - The fixes are in the X11/Motif patches. The VUE and JSE patches make use of the libraries in the X11/Motif patches. E. To subscribe to automatically receive future NEW HP Security Bulletins from the HP Electronic Support Center via electronic mail, do the following: User your browser to get to the HP Electronic Support Center page at: http://us-support.external.hp.com (for US, Canada, Asia-Pacific, & Latin-America) http://europe-support.external.hp.com (for Europe) Click on the Technical Knowledge Database, register as a user (remember to save the User ID assigned to you, and your password), and it will connect to a HP Search Technical Knowledge DB page. Near the bottom is a hyperlink to our Security Bulletin archive. Once in the archive there is another link to our current security patch matrix. Updated daily, this matrix is categorized by platform/OS release, and by bulletin topic. F. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. ________________________________________________________________________ -----End of Document ID: HPSBUX9707-067-------------------------------------- Document ID: HPSBUX9709-069 Date Loaded: 970909 Title: Security Advisory in vuefile, vuepad, et. al. in HP-UX ------------------------------------------------------------------------- HEWLETT-PACKARD SECURITY ADVISORY: #00069, 08 September 1997 ------------------------------------------------------------------------- The information in the following Security Advisory should be acted upon as soon as possible. Hewlett Packard will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Advisory as soon as possible. ------------------------------------------------------------------------- PROBLEM: Users can inadvertently allow access to their accounts by running vuefile, vuepad, dtfile, or dtpad to displays they do not control. PLATFORM: HP9000 Series 700/800s running HP-UX releases 9.X and 10.X DAMAGE: Users can gain privileges. SOLUTION: Do not run vuefile, vuepad, dtfile, or dtpad while su'd to another account. Also do not run them with the display set to another Xserver, unless the same account is logged in at each Xserver. AVAILABILITY: Not applicable ------------------------------------------------------------------------- I. A. Background Vuefile, vuepad, dtfile, and dtpad do not authenticate users. Care must be taken to insure that only one user per Xserver runs these programs. B. Fixing the problem The current and perhaps only solution is to avoid the situation. This advisory will be updated if patches become available. C. Recommended solution Inform users so that they can avoid the situation. They should never run vuefile, vuepad, dtfile, or dtpad while su'd to another account. They also should never run these programs with the display directed to another Xserver unless they are logged into that Xserver in the same account. One way to make it more difficult for a user to su and run these programs is to enable per user authorization. This eliminates the potential for a user to run the programs on the wrong display by accidentally mistyping the display name. Per-user authorization is the default in CDE. In Vue, it can be enabled in /usr/vue/config/Xconfig: # To enable R4 MIT-MAGIC-COOKIE-1 per-user authorization. # Vuelogin*authorize: True Note that if per-user authorization is not enabled many security breaches are possible. For example, it is possible for a program to capture keystrokes typed on the Xserver. The root user can circumvent the per-user authorization and non-root users can give the Xauthority away. So all users still must be aware not to run vuefile, vuepad, dtfile, or dtpad as described above. D. To subscribe to automatically receive future NEW HP Security Bulletins from the HP Electronic Support Center via electronic mail, do the following: Use your browser to get to the HP Electronic Support Center page at: http://us-support.external.hp.com (for US, Canada, Asia-Pacific, & Latin-America) http://europe-support.external.hp.com (for Europe) Click on the Technical Knowledge Database, register as a user (remember to save the User ID assigned to you, and your password), and it will connect to a HP Search Technical Knowledge DB page. Near the bottom is a hyperlink to our Security Bulletin archive. Once in the archive there is another link to our current security patch matrix. Updated daily, this matrix is categorized by platform/OS release, and by bulletin topic. E. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. ________________________________________________________________________ -----End of Document ID: HPSBUX9709-069--------------------------------------