Risks
Advisories
Browse
or
or
HP Security Bulletin - HP NonStop Servers running OSS Remote Operations, Unauthorized Disclosure of Information, Unauthorized Modification, Unauthorized Access to Files (HPSBNS02843)
HPSBNS02843 SSRT101001 rev.2 - HP NonStop Servers running OSS Remote Operations,
Unauthorized Disclosure of Information, Unauthorized Modification, Unauthorized
Access to Files
NOTICE: The information in this Security Bulletin should be acted upon as soon as
possible.
Release Date: 2013-02-11
Last Updated: 2013-04-02
Potential Security Impact: Remote unauthorized disclosure of information,
unauthorized modification, unauthorized access to files
Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential vulnerabilities have been identified with HP NonStop Servers running
certain OSS Remote Operations between a NonStop system running H06.22/J06.11 or a
later RVU and a remote NonStop system running an RVU either in the range of H06.08 to
H06.21 or J06.03 to J06.10 RVU (inclusive) or G06.29.0x to G06.32.0x (inclusive). The
vulnerabilities could be exploited remotely over Expand resulting in unauthorized
disclosure of information, unauthorized modification, or unauthorized access to
files.

References: CVE-2012-3280
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Affected SPRs:

T6533H04 – T6533H04^ACR

T6533G06 – T6533G06^ACL

Release Version Updates containing the defective SPR(s):

J06.03, J06.04, J06.04.01, J06.04.02, J06.05, J06.05.01, J06.05.02, J06.06,
J06.06.01, J06.06.02, J06.06.03, J06.07, J06.07.01, J06.07.02, J06.08, J06.08.01,
J06.08.02, J06.08.03, J06.08.04, J06.09, J06.09.01, J06.09.02, J06.09.03, J06.09.04,
J06.10, J06.10.01, J06.10.02

H06.08, H06.09, H06.10, H06.10.01, H06.11, H06.11.01, H06.11.02, H06.11.03, H06.12,
H06.13, H06.14, H06.15, H06.15.01, H06.15.02, H06.16, H06.16.01, H06.16.02, H06.17,
H06.17.01, H06.17.02, H06.17.03, H06.18, H06.18.01, H06.18.02, H06.19, H06.19.01,
H06.19.02, H06.19.03, H06.20, H06.20.01, H06.20.02, H06.20.03, H06.21, H06.21.01,
H06.21.02

G06.29, G06.29.01, G06.29.02, G06.29.03, G06.30, G06.30.01, G06.30.02, G06.31,
G06.31.01, G06.32, G06.32.01

BACKGROUND
For a PGP signed version of this security bulletin please write to:
security-alert@hp.com

CVSS 2.0 Base Metrics

Reference; Base Vector; Base Score
CVE-2012-3280; (AV:A/AC:M/Au:S/C:P/I:P/A:C); 6.3

Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following software updates available to resolve the vulnerability.

T6533H04^ADA ( Standard Security )
This SPR is usable with these RVUs: 
J06.03, J06.04, J06.04.01, J06.04.02, J06.05, J06.05.01, J06.05.02, J06.06,
J06.06.01, J06.06.02, J06.06.03, J06.07, J06.07.01, J06.07.02, J06.08, J06.08.01,
J06.08.02, J06.08.03, J06.08.04, J06.09, J06.09.01, J06.09.02, J06.09.03, J06.09.04,
J06.10, J06.10.01, J06.10.02 

H06.09, H06.10, H06.10.01, H06.11, H06.11.01, H06.11.02, H06.11.03, H06.12, H06.13,
H06.14, H06.15, H06.15.01, H06.15.02, H06.16, H06.16.01, H06.16.02, H06.17,
H06.17.01, H06.17.02, H06.17.03, H06.18, H06.18.01, H06.18.02, H06.19, H06.19.01,
H06.19.02, H06.19.03, H06.20, H06.20.01, H06.20.02, H06.20.03, H06.21, H06.21.01,
H06.21.02 

G06.29, G06.29.01, G06.29.02, G06.29.03, G06.30, G06.30.01, G06.30.02, G06.31,
G06.31.01, G06.32, G06.32.01
This SPR is already present in these RVUs: 
None
RVU containing final fix: 
None
Installation impact: 
SYSGEN required
Please refer to the T6533H04^ADA softdoc for detailed SPR information, including
installation instructions, superseded SPRs, and requisite SPR lists. Note that in
some cases, requisite SPRs might have greater installation impact than the SPR
described in this security bulletin.

T6533G06^ADD ( Standard Security )
This SPR is usable with these RVUs: 
G06.29, G06.29.01 G06.29.02, G06.29.03, G06.30, G06.30.01, G06.30.02, G06.31,
G06.31.01, G06.32, G06.32.01
Please check with the Global NonStop Support Center (GNSC) for applicability of these
SPRs to RVURs released since publication of this bulletin.
This SPR is already present in these RVUs: 
None
Installation impact: 
SYSGEN required
Please refer to the T6533G06^ADD softdoc for detailed SPR information, including
installation instructions, superseded SPRs, and requisite SPR lists. Note that in
some cases, requisite SPRs might have greater installation impact than the SPR
described in this security bulletin.

Note: No fix is planned for the following RVU: H06.08.

HISTORY 
Version:1 (rev.1) - 11 February 2013 Initial release 
Version:2 (rev.2) - 2 April 2013 Updated information for G-series SPR, corrected
T6533H04^ADA applicability, and corrected CVSS Base Vector

Third Party Security Patches: Third party security patches that are to be installed
on systems running HP software products should be applied in accordance with the
customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin,
contact normal HP Services support channel. For other issues about the content of
this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product,
send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts
via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin List: A list of HP Security Bulletins, updated periodically, is
contained in HP Security Notice HPSN-2011-001
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964
430

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title
by the two characters following HPSB.

3C = 3COM 
3P = 3rd Party Software 
GN = HP General Software 
HF = HP Hardware and Firmware 
MP = MPE/iX 
MU = Multi-Platform Software 
NS = NonStop Servers 
OV = OpenVMS 
PI = Printing and Imaging 
PV = ProCurve 
ST = Storage Software 
TU = Tru64 UNIX 
UX = HP-UX

System management and security procedures must be reviewed frequently to maintain
system integrity. HP is continually reviewing and enhancing the security features of
software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention
of users of the affected HP products the important security information contained in
this Bulletin. HP recommends that all users determine the applicability of this
information to their individual situations and take appropriate action. HP does not
warrant that this information is necessarily accurate or complete for all user
situations and, consequently, HP will not be responsible for any damages resulting
from user's use or disregard of the information provided in this Bulletin. To the
extent permitted by law, HP disclaims all warranties, either express or implied,
including the warranties of merchantability and fitness for a particular purpose,
title and non-infringement."




Spotlight

Biggest ever cyber security exercise in Europe is underway

Posted on 30 October 2014.  |  More than 200 organisations and 400 cyber-security professionals from 29 European countries are testing their readiness to counter cyber-attacks in a day-long simulation, organised by the European Network and Information Security Agency (ENISA).


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //