Risks
Advisories
Browse
or
or
HP Security Bulletin - OpenVMS running Java on Integrity Servers, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities (HPSBOV02833)
HPSBOV02833 SSRT101043 rev.1 - OpenVMS running Java on Integrity Servers, Remote
Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as
possible.
Release Date: 2013-01-07
Last Updated: 2013-01-07
Potential Security Impact: Remote unauthorized access, disclosure of information, and
other vulnerabilities
Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in Java Runtime Environment
(JRE) and Java Developer Kit (JDK) running on OpenVMS Integrity Servers. These
vulnerabilities could allow remote unauthorized access, disclosure of information,
and other exploits.

References: CVE-2012-1531, CVE-2012-1532, CVE-2012-1533, CVE-2012-3143,
CVE-2012-3159, CVE-2012-3216, CVE-2012-4416, CVE-2012-5068, CVE-2012-5069,
CVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5077,
CVE-2012-5079, CVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5085,
CVE-2012-5086, CVE-2012-5087, CVE-2012-5089
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
OpenVMS Integrity JDK and JRE 6.0-3.p1 and earlier.

BACKGROUND
For a PGP signed version of this security bulletin please write to:
security-alert@hp.com

CVSS 2.0 Base Metrics

Reference; Base Vector; Base Score
CVE-2012-1531; (AV:N/AC:L/Au:N/C:C/I:C/A:C); 10.0
CVE-2012-1532; (AV:N/AC:L/Au:N/C:C/I:C/A:C); 10.0
CVE-2012-1533; (AV:N/AC:L/Au:N/C:C/I:C/A:C); 10.0
CVE-2012-3143; (AV:N/AC:L/Au:N/C:C/I:C/A:C); 10.0
CVE-2012-3159; (AV:N/AC:L/Au:N/C:P/I:P/A:P); 7.5
CVE-2012-3216; (AV:N/AC:H/Au:N/C:P/I:N/A:N); 2.6
CVE-2012-4416; (AV:N/AC:L/Au:N/C:P/I:P/A:N); 6.4
CVE-2012-5068; (AV:N/AC:L/Au:N/C:P/I:P/A:P); 7.5
CVE-2012-5069; (AV:N/AC:M/Au:N/C:P/I:P/A:N); 5.8
CVE-2012-5071; (AV:N/AC:L/Au:N/C:P/I:P/A:N); 6.4
CVE-2012-5072; (AV:N/AC:L/Au:N/C:P/I:N/A:N); 5.0
CVE-2012-5073; (AV:N/AC:L/Au:N/C:N/I:P/A:N); 5.0
CVE-2012-5075; (AV:N/AC:L/Au:N/C:P/I:N/A:N); 5.0
CVE-2012-5077; (AV:N/AC:H/Au:N/C:P/I:N/A:N); 2.6
CVE-2012-5079; (AV:N/AC:L/Au:N/C:N/I:P/A:N); 5.0
CVE-2012-5081; (AV:N/AC:L/Au:N/C:N/I:N/A:P); 5.0
CVE-2012-5083; (AV:N/AC:L/Au:N/C:C/I:C/A:C); 10.0
CVE-2012-5084; (AV:N/AC:H/Au:N/C:C/I:C/A:C); 7.6
CVE-2012-5085; (AV:N/AC:M/Au:S/C:N/I:N/A:N); 0.0
CVE-2012-5086; (AV:N/AC:L/Au:N/C:C/I:C/A:C); 10.0
CVE-2012-5087; (AV:N/AC:L/Au:N/C:C/I:C/A:C); 10.0
CVE-2012-5089; (AV:N/AC:H/Au:N/C:C/I:C/A:C); 7.6

Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following software updates available to resolve these
vulnerabilities.

The updates are available from the following location:

http://h18012.www1.hp.com/java/alpha

Kit Name
Java™ SE Development Kit (JDK) 6.0-4 for the OpenVMS I64 Operating System
Java™ SE Runtime Environment (JRE) 6.0-4 for the OpenVMS I64 Operating System
HISTORY 
Version:1 (rev.1) - 7 January 2013 Initial release

Third Party Security Patches: Third party security patches that are to be installed
on systems running HP software products should be applied in accordance with the
customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin,
contact normal HP Services support channel. For other issues about the content of
this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product,
send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts
via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin List: A list of HP Security Bulletins, updated periodically, is
contained in HP Security Notice HPSN-2011-001
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964
430

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title
by the two characters following HPSB.

3C = 3COM 
3P = 3rd Party Software 
GN = HP General Software 
HF = HP Hardware and Firmware 
MP = MPE/iX 
MU = Multi-Platform Software 
NS = NonStop Servers 
OV = OpenVMS 
PI = Printing and Imaging 
PV = ProCurve 
ST = Storage Software 
TU = Tru64 UNIX 
UX = HP-UX

REQUIRED FIELD INADVERTENTLY LEFT BLANK

REQUIRED FIELD INADVERTENTLY LEFT BLANK

System management and security procedures must be reviewed frequently to maintain
system integrity. HP is continually reviewing and enhancing the security features of
software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention
of users of the affected HP products the important security information contained in
this Bulletin. HP recommends that all users determine the applicability of this
information to their individual situations and take appropriate action. HP does not
warrant that this information is necessarily accurate or complete for all user
situations and, consequently, HP will not be responsible for any damages resulting
from user's use or disregard of the information provided in this Bulletin. To the
extent permitted by law, HP disclaims all warranties, either express or implied,
including the warranties of merchantability and fitness for a particular purpose,
title and non-infringement."




Spotlight

Bash Shellshock bug: More attacks, more patches

Posted on 29 September 2014.  |  As vendors scramble to issue patches for the GNU Bash Shellshock bug and companies rush to implement them, attackers around the world are probing systems for the hole it opens.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //