[security bulletin] MFSBGN03838 rev.1 - UCMDB Configuration Management Service, Multiple Vulnerabilities

2018-12-31 Thread security-alert
Note: the current version of the following document is available here:
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03309650

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: KM03309650
Version: 1

MFSBGN03838 rev.1 - UCMDB Configuration Management Service, Multiple
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-12-31
Last Updated: 2018-12-31

Potential Security Impact: Remote: Directory Traversal, Disclosure of
Privileged Information

Source: Micro Focus, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in UCMDB. The
vulnerability could be remotely exploited to Remote Directory Traversal and
Remote Disclosure of Privileged Information.

References:

  - PSRT110633
  - CVE-2018-18593

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP UCMDB Configuration Manager Software 10.22, 10.22 CUP1, 10.22 CUP2,
10.22 CUP3, 10.22 CUP4, 10.22 CUP5, 10.22 CUP6, 10.22 CUP7, 10.33, 10.33
CUP1, 10.33 CUP2, 10.33 CUP3, 2018.02, 2018.05, 2018.08, 2018.11

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector


Micro Focus would like to thank Bahadir Pektas and Emre Ilbeyoglu for
reporting this issue to secur...@microfocus.com

RESOLUTION

Please contact support for the fix.

HISTORY
Version:1 (rev.1) - 31 December 2018 Initial release

Third Party Security Patches: Third party security patches that are to be 
installed on 
systems running Micro Focus products should be applied in accordance with the 
customer's 
patch management policy.

Support: For issues about implementing the recommendations of this Security 
Bulletin, contact normal Micro Focus services support channel. 
For other issues about the content of this Security Bulletin, send e-mail to 
secur...@microfocus.com.

Report: To report a potential security vulnerability for any supported product:
  Web form: https://softwaresupport.softwaregrp.com/psrt
  Email: secur...@microfocus.com

Subscribe:
 To initiate receiving subscriptions for future Micro Focus Security Bulletin 
alerts via Email,  please subscribe here - 
https://softwaresupport.softwaregrp.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification
 Once you are logged in to the portal, please choose security bulletins under 
product and document types.
 Please note that you will need to sign in using a Passport account. If you do 
not have a Passport account yet, you can create one- its free and easy 
https://cf.passport.softwaregrp.com/hppcf/createuser.do 

Security Bulletin Archive:
 A list of recently released Security Bulletins is available here: 
https://softwaresupport.softwaregrp.com/security-vulnerability
 
Software Product Category: The Software Product Category is represented in
the title by the two characters following Micro Focus Security Bulletin.

3P = 3rd Party Software
GN = Micro Focus General Software
MU = Multi-Platform Software

System management and security procedures must be reviewed frequently to 
maintain system integrity. 
Micro Focus is continually reviewing and enhancing the security features of 
software products to provide 
customers with current secure solutions. 

"Micro Focus is broadly distributing this Security Bulletin in order to bring 
to the attention of users of the 
affected Micro Focus products the important security information contained in 
this Bulletin. Micro Focus recommends 
that all users determine the applicability of this information to their 
individual situations and take appropriate action. 
Micro Focus does not warrant that this information is necessarily accurate or 
complete for all user situations and, consequently, 
Micro Focus will not be responsible for any damages resulting from user's use 
or disregard of the information provided in 
this Security Bulletin. To the extent permitted by law, Micro Focus  disclaims  
all warranties, either express or 
implied, including the warranties of merchantability and fitness for a 
particular purpose, title and non-infringement." 


Copyright Micro Focus

Micro Focus shall not be liable for technical or editorial errors or omissions 
contained herein. 
The information provided is provided "as is" without warranty of any kind. To 
the extent permitted by law, 
neither Micro Focus nor its affiliates, subcontractors or suppliers will be 
liable for incidental, special 
or consequential damages including downtime cost; lost profits; damages 
relating to the procurement of 
substitute products or services; or damages for loss of data, or software 
restoration. 
The information in this document is subject to change without notice. Micro 
Focus and the names of 
Micro Focus products referenced herein are trademarks of Micro Focus in the 
United States and other countries. 
Other product and company names mentioned herein may be 

[security bulletin] MFSBGN03835 rev.1 - Fortify Software Security Center (SSC), Remote Unauthorized Access

2018-12-19 Thread security-alert
Note: the current version of the following document is available here:
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03298201

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: KM03298201
Version: 1

MFSBGN03835 rev.1 - Fortify Software Security Center (SSC), Remote
Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-12-19
Last Updated: 2018-12-19

Potential Security Impact: Remote: Unauthorized Access

Source: Micro Focus, Product Security Response Team

VULNERABILITY SUMMARY
The SSC REST API contains Insecure Direct Object Reference (IDOR)
vulnerabilities that allow authenticated users access to arbitrary details of
the Local and LDAP users via POST method and to arbitrary details of other
user's Fortify projects via GET method.

References:

  - PSRT110648
  - CVE-2018-7690
  - CVE-2018-7691

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Fortify Software Security Center (SSC) 17.10, 17.20, 18.10

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector


Micro Focus would like to extend a special thanks to Alex Hernandez, aka
alt3kx, for responsibly disclosing this vulnerability.

RESOLUTION

Upgrade to SSC version 18.20.

HISTORY
Version:1 (rev.1) - 12 December 2018 Initial release

Third Party Security Patches: Third party security patches that are to be 
installed on 
systems running Micro Focus products should be applied in accordance with the 
customer's 
patch management policy.

Support: For issues about implementing the recommendations of this Security 
Bulletin, contact normal Micro Focus services support channel. 
For other issues about the content of this Security Bulletin, send e-mail to 
secur...@microfocus.com.

Report: To report a potential security vulnerability for any supported product:
  Web form: https://softwaresupport.softwaregrp.com/psrt
  Email: secur...@microfocus.com

Subscribe:
 To initiate receiving subscriptions for future Micro Focus Security Bulletin 
alerts via Email,  please subscribe here - 
https://softwaresupport.softwaregrp.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification
 Once you are logged in to the portal, please choose security bulletins under 
product and document types.
 Please note that you will need to sign in using a Passport account. If you do 
not have a Passport account yet, you can create one- its free and easy 
https://cf.passport.softwaregrp.com/hppcf/createuser.do 

Security Bulletin Archive:
 A list of recently released Security Bulletins is available here: 
https://softwaresupport.softwaregrp.com/security-vulnerability
 
Software Product Category: The Software Product Category is represented in
the title by the two characters following Micro Focus Security Bulletin.

3P = 3rd Party Software
GN = Micro Focus General Software
MU = Multi-Platform Software

System management and security procedures must be reviewed frequently to 
maintain system integrity. 
Micro Focus is continually reviewing and enhancing the security features of 
software products to provide 
customers with current secure solutions. 

"Micro Focus is broadly distributing this Security Bulletin in order to bring 
to the attention of users of the 
affected Micro Focus products the important security information contained in 
this Bulletin. Micro Focus recommends 
that all users determine the applicability of this information to their 
individual situations and take appropriate action. 
Micro Focus does not warrant that this information is necessarily accurate or 
complete for all user situations and, consequently, 
Micro Focus will not be responsible for any damages resulting from user's use 
or disregard of the information provided in 
this Security Bulletin. To the extent permitted by law, Micro Focus  disclaims  
all warranties, either express or 
implied, including the warranties of merchantability and fitness for a 
particular purpose, title and non-infringement." 


Copyright Micro Focus

Micro Focus shall not be liable for technical or editorial errors or omissions 
contained herein. 
The information provided is provided "as is" without warranty of any kind. To 
the extent permitted by law, 
neither Micro Focus nor its affiliates, subcontractors or suppliers will be 
liable for incidental, special 
or consequential damages including downtime cost; lost profits; damages 
relating to the procurement of 
substitute products or services; or damages for loss of data, or software 
restoration. 
The information in this document is subject to change without notice. Micro 
Focus and the names of 
Micro Focus products referenced herein are trademarks of Micro Focus in the 
United States and other countries. 
Other product and company names mentioned herein may be trademarks of their 
respective owners.

[security bulletin] MFSBGN03835 rev.1 - Fortify Software Security Center (SSC), Remote Unauthorized Access

2018-12-12 Thread security-alert
Note: the current version of the following document is available here:
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03298201

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: KM03298201
Version: 1

MFSBGN03835 rev.1 - Fortify Software Security Center (SSC), Remote
Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-12-12
Last Updated: 2018-12-12

Potential Security Impact: Remote: Unauthorized Access

Source: Micro Focus, Product Security Response Team

VULNERABILITY SUMMARY
The SSC REST API contains Insecure Direct Object Reference (IDOR)
vulnerabilities that allow authenticated users access to arbitrary details of
the Local and LDAP users via POST method and to arbitrary details of other
user's Fortify projects via GET method.

References:

  - PSRT110648
  - CVE-2018-7690
  - CVE-2018-7691

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Fortify Software Security Center (SSC) 17.10, 17.20, 18.10

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector


Micro Focus would like to extend a special thanks to Alex Hernandez, aka
alt3kx, for responsibly disclosing this vulnerability.

RESOLUTION

Upgrade to SSC version 18.20.

HISTORY
Version:1 (rev.1) - 12 December 2018 Initial release

Third Party Security Patches: Third party security patches that are to be 
installed on 
systems running Micro Focus products should be applied in accordance with the 
customer's 
patch management policy.

Support: For issues about implementing the recommendations of this Security 
Bulletin, contact normal Micro Focus services support channel. 
For other issues about the content of this Security Bulletin, send e-mail to 
secur...@microfocus.com.

Report: To report a potential security vulnerability for any supported product:
  Web form: https://softwaresupport.softwaregrp.com/psrt
  Email: secur...@microfocus.com

Subscribe:
 To initiate receiving subscriptions for future Micro Focus Security Bulletin 
alerts via Email,  please subscribe here - 
https://softwaresupport.softwaregrp.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification
 Once you are logged in to the portal, please choose security bulletins under 
product and document types.
 Please note that you will need to sign in using a Passport account. If you do 
not have a Passport account yet, you can create one- its free and easy 
https://cf.passport.softwaregrp.com/hppcf/createuser.do 

Security Bulletin Archive:
 A list of recently released Security Bulletins is available here: 
https://softwaresupport.softwaregrp.com/security-vulnerability
 
Software Product Category: The Software Product Category is represented in
the title by the two characters following Micro Focus Security Bulletin.

3P = 3rd Party Software
GN = Micro Focus General Software
MU = Multi-Platform Software

System management and security procedures must be reviewed frequently to 
maintain system integrity. 
Micro Focus is continually reviewing and enhancing the security features of 
software products to provide 
customers with current secure solutions. 

"Micro Focus is broadly distributing this Security Bulletin in order to bring 
to the attention of users of the 
affected Micro Focus products the important security information contained in 
this Bulletin. Micro Focus recommends 
that all users determine the applicability of this information to their 
individual situations and take appropriate action. 
Micro Focus does not warrant that this information is necessarily accurate or 
complete for all user situations and, consequently, 
Micro Focus will not be responsible for any damages resulting from user's use 
or disregard of the information provided in 
this Security Bulletin. To the extent permitted by law, Micro Focus  disclaims  
all warranties, either express or 
implied, including the warranties of merchantability and fitness for a 
particular purpose, title and non-infringement." 


Copyright Micro Focus

Micro Focus shall not be liable for technical or editorial errors or omissions 
contained herein. 
The information provided is provided "as is" without warranty of any kind. To 
the extent permitted by law, 
neither Micro Focus nor its affiliates, subcontractors or suppliers will be 
liable for incidental, special 
or consequential damages including downtime cost; lost profits; damages 
relating to the procurement of 
substitute products or services; or damages for loss of data, or software 
restoration. 
The information in this document is subject to change without notice. Micro 
Focus and the names of 
Micro Focus products referenced herein are trademarks of Micro Focus in the 
United States and other countries. 
Other product and company names mentioned herein may be trademarks of their 
respective owners.

[security bulletin] MFSBGN03837 rev.1 - Network Node Manager i, Multiple Vulnerabilities

2018-12-12 Thread security-alert
Note: the current version of the following document is available here:
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03302206

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: KM03302206
Version: 1

MFSBGN03837 rev.1 - Network Node Manager i, Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-12-12
Last Updated: 2018-12-12

Potential Security Impact: Remote: Cross-Site Scripting (XSS), Disclosure of
Information

Source: Micro Focus, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerabilities in Apache Tomcat was addressed by Micro Focus Network Node
Manager i. The vulnerability could be exploited Remote Cross-Site Scripting
(XSS) and Remote Disclosure of Information

References:

  - PSRT110650
  - CVE-2016-6816
  - CVE-2017-5664

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Network Node Manager I (NNMi) Software 9.2x, 10.0x, 10.00 Patch 1,
10.00 Patch 2, 10.00 Patch 3, 10.00 Patch 4, 10.00 Patch 5, 10.1x, 10.10
Patch 1, 10.10 Patch 2, 10.10 Patch 3, 10.10 Patch 4, 10.2x, 10.20 Patch 1,
10.20 Patch 2, 10.20 Patch 3, 10.30, 10.30 Patch 1

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector


RESOLUTION

Micro Focus has made the following software updates and mitigation
information to resolve the vulnerability in Micro Focus Network Node Manager
i:
Customers using v9.X must upgrade to v10.x and then install the patch below.
Patches are available to address the vulnerabilities:
For v10.0x: Network Node Manager i 10.00 Patch 8 
Linux 
[https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/KM03139745](https://softwaresupport.softwaregrp.com/gro
p/softwaresupport/search-result/-/facetsearch/document/KM03139745)
Windows
[https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/KM03139763](https://softwaresupport.softwaregrp.com/gro
p/softwaresupport/search-result/-/facetsearch/document/KM03139763)
For v10.1x: Network Node Manager i 10.10 Patch 7
Linux
[https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/KM03139729](https://softwaresupport.softwaregrp.com/gro
p/softwaresupport/search-result/-/facetsearch/document/KM03139729)
Windows
[https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/KM03139781](https://softwaresupport.softwaregrp.com/gro
p/softwaresupport/search-result/-/facetsearch/document/KM03139781)
For v10.2x: Network Node Manager i 10.20 Patch 6
Linux
[https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/KM03139701](https://softwaresupport.softwaregrp.com/gro
p/softwaresupport/search-result/-/facetsearch/document/KM03139701)
Windows
[https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/KM03139715](https://softwaresupport.softwaregrp.com/gro
p/softwaresupport/search-result/-/facetsearch/document/KM03139715)
For v10.3x: Network Node Manager i 10.30 Patch 2
Linux
[https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/KM03139685](https://softwaresupport.softwaregrp.com/gro
p/softwaresupport/search-result/-/facetsearch/document/KM03139685)
 Windows
[https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/
/facetsearch/document/KM03139693](https://softwaresupport.softwaregrp.com/gro
p/softwaresupport/search-result/-/facetsearch/document/KM03139693) 


HISTORY
Version:1 (rev.1) - 12 December 2018 Initial release

Third Party Security Patches: Third party security patches that are to be 
installed on 
systems running Micro Focus products should be applied in accordance with the 
customer's 
patch management policy.

Support: For issues about implementing the recommendations of this Security 
Bulletin, contact normal Micro Focus services support channel. 
For other issues about the content of this Security Bulletin, send e-mail to 
secur...@microfocus.com.

Report: To report a potential security vulnerability for any supported product:
  Web form: https://softwaresupport.softwaregrp.com/psrt
  Email: secur...@microfocus.com

Subscribe:
 To initiate receiving subscriptions for future Micro Focus Security Bulletin 
alerts via Email,  please subscribe here - 
https://softwaresupport.softwaregrp.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification
 Once you are logged in to the portal, please choose security bulletins under 
product and document types.
 Please note that you will need to sign in using a Passport account. If you do 
not have a Passport account yet, you can create one- its free and easy 
https://cf.passport.softwaregrp.com/hppcf/createuser.do 

Security 

[security bulletin] HPESBHF03826 rev.1 - HPE Integrated Lights-Out 3 (iLO 3) Remote Denial of Service

2018-02-27 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03826en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03826en_us
Version: 1

HPESBHF03826 rev.1 - HPE Integrated Lights-Out 3 (iLO 3) Remote Denial of
Service

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-02-27
Last Updated: 2018-02-27

Potential Security Impact: Remote: Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in HPE Integrated Lights-Out 3 (iLO 3) allows remote
Denial of Service (DoS).

References:

  - CVE-2017-8987

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Integrated Lights-Out 3 (iLO 3)  1.88 - Unauthenticated Remote Denial
of Service

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8987
  8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank Ross Kirk and Adam McClenaghan
of Rapid7 for identifying and reporting this vulnerability to
security-al...@hpe.com.

RESOLUTION

HPE has provided the following instructions to resolve the vulnerability in
HPE Integrated Lights-Out 3 (iLO 3) version 1.88: Please upgrade to HPE
Integrated Lights-Out 3 (iLO 3) 1.89 which is available on HPE Support
Center:



HISTORY
Version:1 (rev.1) - 23 February 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJalX6NAAoJELXhAxt7SZaidm8H/0o/kMTpJiRFB7LlHsfEVWKZ
NiJd/DFVmKbkqFS20jAKC7k8a0PdHxkDJ8svUEGOzbUGDcJX9TfIjqk1sSYkMs+c
4i0qlyyH3VtpZy10A26gP9qsLVrOm2b0skfmEtuqCsXRFe6/OH5dppelSukFStwN
/L3Mvga3Ti/wUYNlx83Vsfhdm+WYZXEBV9yG2G/So0chIEJwB7nxtj/kmDXr6vPT
zoV4RZ1QaNQ6DebxGdgRIcxDTIB6wRSPB4bDldc+VhiPbAXJ0wcx1llloEdkvwvg
UPw+tkb4U4at47iGa3+FrOONP/4kmPBcHQRxRp3EzmrdS7Oexr5zAAphx6aOb04=
=NVRE
-END PGP SIGNATURE-


[security bulletin] HPESBHF03819 rev.1 - HPE XP Storage using HGLM, Local Authentication Bypass

2018-02-13 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03819en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03819en_us
Version: 1

HPESBHF03819 rev.1 - HPE XP Storage using HGLM, Local Authentication Bypass

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-02-12
Last Updated: 2018-02-12

Potential Security Impact: Local: Authentication Restriction Bypass; Remote:
Authentication Restriction Bypass

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HPE XP Storage using Hitachi Global Link Manager (HGLM) has a local
authenticated information disclosure vulnerability in HGLM version HGLM
6.3.0-00 to 8.5.2-00.

References:

  - CVE-2017-8985

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - XP Storage HGLM 6.3.0-00 to 8.5.2-00

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8985
  4.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
  4.3 (AV:L/AC:L/Au:S/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the an update to resolve this vulnerability:

   * Upgrade HPE XP Storage HGLM to version HGLM 8.5.3-00 or subsequent
version

HISTORY
Version:1 (rev.1) - 9 February 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJagdU/AAoJELXhAxt7SZaiXdYIALSCmon3yKWPJ20mqFWQPuXZ
LVTJkFvSCTcKtSdQuwzC8PiBmGl1948lK5et27SHz6AwryHzKYK0FPVEsZi5EFvF
7LBufD75L36pDTjbASyroGzTHI2aUlmvcZjkZeA69EnT40Ksmwm0dMUD7vcAT0wH
1TzE8zC++DrkcSsos/ukeiRqu4hx3XpsYEzWBk9V6mOrsAjTDhdcdx3y3cDukX9s
jPgJJKta4KOT4aQOru1fHzDftBAuSckmMAP46rcIcUdCLZGA2J4QBy4qcC0szLz+
DgPMvYv4CFeJ+2gbEchEYUOwDl6saXkB252BUf4nD1k+2ri+75RuLLv7gUsYC5c=
=OR3V
-END PGP SIGNATURE-


[security bulletin] HPSBHF02981 rev.2 - HPE Integrated Lights-Out 2, 3, 4 (iLO2, iLO3, iLO4) and HPE Superdome Flex RMC - IPMI 2.0 RCMP+ Authentication Remote Password Hash Vulnerability (RAKP)

2018-02-07 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04197764

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04197764
Version: 2

HPSBHF02981 rev.2 - HPE Integrated Lights-Out 2, 3, 4 (iLO2, iLO3, iLO4) and
HPE Superdome Flex RMC -  IPMI 2.0 RCMP+ Authentication Remote Password Hash
Vulnerability (RAKP)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-02-08
Last Updated: 2018-02-07

Potential Security Impact: Remote: Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Integrated
Lights-Out 2, 3, 4 (iLO2, iLO3, iLO4) and HPE Superdome Flex RMC. The
vulnerability could be exploited to allow an attacker to gain unauthorized
privileges and unauthorized access to privileged information.

**Note:**  
  - This vulnerability also impacts the RMC of the "Superdome Flex" Server.

References:

  - CVE-2013-4786

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Superdome Flex Server 1.0
  - HPE Integrated Lights-Out 4 (iLO 4) Firmware for ProLiant Gen8 Servers -
All, when IPMI is enabled
  - HPE Integrated Lights-Out 3 (iLO 3) Firmware for ProLiant G7 Servers -
All, when IPMI is enabled
  - HPE Integrated Lights-Out 2 (iLO 2) Firmware for ProLiant G6 Servers -
All, when IPMI is enabled

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2013-4786
  8.3 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
  8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

There is no resolution to this issue. The authentication process for the IPMI
2.0 specification mandates that the server send a salted SHA1 or MD5 hash of
the requested user's password to the client, prior to the client
authenticating. The BMC returns the password hash for any valid user account
requested. This password hash can be broken using an offline brute force or
dictionary attack. Because this functionality is a key part of the IPMI 2.0
specification, there is no way to fix the problem without deviating from the
IPMI 2.0 specification. HP recommends the following actions to mitigate the
risk this introduces:

1.  If you do not need to use IPMI, disable it. You can disable IPMI on
iLO2/3/4 using the Disable IPMI over LAN command.
2.  Maintain the latest iLO firmware that contains the most recent security
patches.
3.  Employ best practices in the management of the protocols and passwords on
your systems and networks. Use strong passwords wherever possible.
4.  If you must use IPMI, use a separate management LAN or VLAN, Access
Control Lists (ACLs), or VPN to limit and restrict access to your iLO
management interfaces.


For Superdome Flex's RMC: 

 * Refer to the below link for the details:  
 


HISTORY

Version:1 (rev.1) - 1 April 2014 Initial release

Version:2 (rev.2) - 7 February 2018 Include RMC of HPE Superdome Flex as an
affected product


Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be 

[security bulletin] HPESBHF03811 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Multiple Vulnerabilities

2018-01-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03811en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03811en_us
Version: 1

HPESBHF03811 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-25
Last Updated: 2018-01-25

Potential Security Impact: Remote: Multiple Vulnerabilities

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities have been identified in IMC PLAT 7.3 E0506P03. 
These vulnerabilities could be remotely exploited to allow unauthenticated
command execution, arbitrary file write, and arbitrary file deletion as
SYSTEM or root.

References:

  - PSRT110597 - No CVE or ZDI associated
  - CVE-2017-8984

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) version 7.3 E0506P03

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8984
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to than Ron Waisberg of TELUS Security
Labs for reporting this vulnerability.

RESOLUTION

HPE has provided Intelligent Management Center (iMC) PLAT 7.3 E0506P07 to
resolve these vulnerabilities in the following products:

 + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0506P07**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU

HISTORY
Version:1 (rev.1) - 24 January 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be 

[security bulletin] HPESBHF03814 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Unauthorized Modification

2018-01-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03814en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03814en_us
Version: 1

HPESBHF03814 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Unauthorized Modification

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-24
Last Updated: 2018-01-24

Potential Security Impact: Remote: Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability has been identified in HPE Intelligent Management
Center (iMC) PLAT 7.3 E0506. The vulnerability could be remotely exploited to
allow remote unauthorized modification.

References:

  - CVE-2004-2761 - PSRT110570

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) PLAT 7.3 E0506

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2004-2761
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided Intelligent Management Center (iMC) PLAT 7.3 E0506P07 to
resolve this vulnerability in the following products:

 + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0506P07**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU

HISTORY
Version:1 (rev.1) - 24 January 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its 

[security bulletin] HPESBHF03812 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Multiple Vulnerabilities

2018-01-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03812en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03812en_us
Version: 1

HPESBHF03812 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-25
Last Updated: 2018-01-25

Potential Security Impact: Remote: Multiple Vulnerabilities

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities have been identified in HPE Intelligent Management
Center (iMC) PLAT with Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to
8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled. The
vulnerabilities could be remotely exploited to allow unauthorized disclosure
of information, unauthorized modification, and disruption of service.

References:

  - PSRT110606
  - CVE-2017-12617

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) tbs

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-12617
  8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided Intelligent Management Center (iMC) PLAT 7.3 E0505P07 to
resolve the vulnerability in the following products:

 + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0506P07**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU

HISTORY
Version:1 (rev.1) - 25 January 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or 

[security bulletin] HPESBHF03808 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution

2018-01-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03808en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03808en_us
Version: 1

HPESBHF03808 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-24
Last Updated: 2018-01-24

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability has been identified in HPE Intelligent Management
Center (iMC) PLAT 7.3 E0504P04. The vulnerability could be exploited to allow
remote code execution.

References:

  - ZDI-CAN-4905
  - CVE-2017-8983 - Remote Code Execution, ZDI-CAN-4905

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) Plat 7.3 E0504P4

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8983
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank Steven Seeley (mr_me) of
Offensive Security working with Trend Micro's Zero Day Initiative for
reporting this vulnerability.

RESOLUTION

HPE has provided Intelligent Management Center (iMC) PLAT 7.3 E0506P07 to
resolve this vulnerability in the following products:

 + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0506P07**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU

HISTORY
Version:1 (rev.1) - 24 January 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical 

[security bulletin] HPESBHF03813 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution

2018-01-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03813en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03813en_us
Version: 1

HPESBHF03813 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-24
Last Updated: 2018-01-24

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability has been identified in IMC PLAT 7.3 E0506.  The
vulnerability could be remotely exploited to allow remote code execution.

This is an enhanced fix to ZDI-17-484.

References:

  - ZDI-17-484 - Original ZDI Issue
  - ZDI-CAN-5120
  - CVE-2017-8981 - Remote Code Execution, ZDI-CAN-5120

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Intelligent Management Center (iMC) 7.3 E0506 - Reported on Windows 

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8981
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank sztivi working with Trend
Micro's Zero Day Initiative for reporting this vulnerability.

RESOLUTION

HPE has provided Intelligent Management Center (iMC) PLAT 7.3 E0506P07 to
resolve this vulnerability in the following products:

 + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0506P07**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU

HISTORY
Version:1 (rev.1) - 25 January 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall 

[security bulletin] HPESBHF03815 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution

2018-01-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03815en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03815en_us
Version: 1

HPESBHF03815 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-24
Last Updated: 2018-01-24

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in HPE Intelligent Management Center (iMC) PLAT can
be exploited to allow remote code execution. This is an enhanced fix for
ZDI-17-162/CVE-2017-5792.



References:

  - ZDI-CAN-4067 - ZDI-17-162, Original issue
  - ZDI-CAN-4824
  - CVE-2017-5792 - Remote Code Execution, ZDI-17-162, ZDI-CAN-4824

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) 7.3 E0504P2

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5792
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank Jacob Baines of Tenable
Network Security working with Trend Micro's Zero Day Initiative for reporting
this issue.

RESOLUTION

HPE has provided Intelligent Management Center (iMC) PLAT version 7.3
E0506P07 to resolve this vulnerability in the following products:

 + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0506P07**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU

HISTORY
Version:1 (rev.1) - 24 January 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett 

[security bulletin] HPESBHF03810 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Disclosure of Information

2018-01-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03810en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03810en_us
Version: 1

HPESBHF03810 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-24
Last Updated: 2018-01-24

Potential Security Impact: Remote: Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in HPE Intelligent Management Center (iMC) PLAT 7.3
E0504P2 could allow remote disclosure of information.

References:

  - ZDI-CAN-5093
  - CVE-2017-8980 - Remote Disclosure of Information, ZDI-CAN-5093

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) iMC Plat 7.3 E0504P2

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8980
  4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank Steven Seeley (mr_me) of
Offensive Security, working with Trend Micro's Zero Day Initiative, for
reporting this vulnerability.

RESOLUTION

HPE has provided Intelligent Management Center (iMC) PLAT 7.3 E0506P07 to
resolve this vulnerability in the following products:

 + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0506P07**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU

HISTORY
Version:1 (rev.1) - 24 January 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or 

[security bulletin] HPESBHF03809 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Authentication Restriction Bypass

2018-01-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03809en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03809en_us
Version: 1

HPESBHF03809 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Authentication Restriction Bypass

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-24
Last Updated: 2018-01-24

Potential Security Impact: Remote: Authentication Bypass

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability has been identified in HPE Intelligent Management
Center (iMC) PLAT 7.3 E0504P02. This vulnerability could be remotely
exploited to allow remote authentication bypass.

References:

  - ZDI-CAN-4757
  - CVE-2017-8982 - Remote Authentication Bypass, ZDI-CAN-4757

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Intelligent Management Center (iMC) TBD

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8982
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
  6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank Steven Seeley (mr_me) of
Offensive Security, working with Trend Micro's Zero Day Initiative, for
reporting this vulnerability.

RESOLUTION

HPE has provided Intelligent Management Center (iMC) PLAT 7.3 E0506P07 to
resolve this vulnerability in the following products:

 + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0506P07**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU

HISTORY
Version:1 (rev.1) - 24 January 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard 

[security bulletin] HPESBHF03805 rev.7 - Certain HPE products using Microprocessors from Intel, AMD, and ARM, with Speculative Execution, Elevation of Privilege and Information Disclosure.

2018-01-22 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03805en_us
Version: 7

HPESBHF03805 rev.7 - Certain HPE products using Microprocessors from Intel,
AMD, and ARM, with Speculative Execution, Elevation of Privilege and
Information Disclosure.

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-23
Last Updated: 2018-01-22

Potential Security Impact: Local: Disclosure of Information, Elevation of
Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
On January 3 2018, side-channel security vulnerabilities involving
speculative execution were publicly disclosed. These vulnerabilities may
impact the listed HPE products, potentially leading to information disclosure
and elevation of privilege. Mitigation and resolution of these
vulnerabilities may call for both an operating system update, provided by the
OS vendor, and a system ROM update from HPE.


**Note:**

  * This issue takes advantage of techniques commonly used in many modern
processor architectures.  
  * For further information, microprocessor vendors have provided security
advisories:
  
- Intel:

- AMD: 
- ARM: 

References:

  - CVE-2017-5715 - aka Spectre, branch target injection
  - CVE-2017-5753 - aka Spectre,  bounds check bypass
  - CVE-2017-5754 - aka  Meltdown,  rogue data cache load, memory access
permission check performed after kernel memory read

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE ProLiant DL380 Gen10 Server  - To be delivered
  - HPE ProLiant DL180 Gen10 Server  - To be delivered
  - HPE ProLiant DL160 Gen10 Server  - To be delivered
  - HPE ProLiant DL360 Gen10 Server - To be delivered
  - HPE ProLiant ML110 Gen10 Server  - To be delivered
  - HPE ProLiant DL580 Gen10 Server  - To be delivered
  - HPE ProLiant DL560 Gen10 Server  - To be delivered
  - HPE ProLiant DL120 Gen10 Server  - To be delivered
  - HPE ProLiant ML350 Gen10 Server  - To be delivered
  - HPE ProLiant XL450 Gen10 Server  - To be delivered
  - HPE Synergy 660 Gen10 Compute Module  - To be delivered
  - HPE ProLiant DL385 Gen10 Server - prior to v1.04 
  - HPE ProLiant XL170r Gen10 Server  - To be delivered
  - HPE ProLiant BL460c Gen10 Server Blade  - To be delivered
  - HPE ProLiant XL190r Gen10 Server  - To be delivered
  - HPE ProLiant XL230k Gen10 Server  - To be delivered
  - HPE Synergy 480 Gen10 Compute Module  - To be delivered
  - HPE ProLiant XL730f Gen9 Server  - To be delivered
  - HPE ProLiant XL230a Gen9 Server  - To be delivered
  - HPE ProLiant XL740f Gen9 Server  - To be delivered
  - HPE ProLiant XL750f Gen9 Server  - To be delivered
  - HPE ProLiant XL170r Gen9 Server - To be delivered
  - HP ProLiant DL60 Gen9 Server - To be delivered
  - HP ProLiant DL160 Gen9 Server - To be delivered
  - HPE ProLiant DL360 Gen9 Server - To be delivered
  - HP ProLiant DL380 Gen9 Server - To be delivered
  - HPE ProLiant XL450 Gen9 Server - To be delivered
  - HPE Apollo 4200 Gen9 Server - To be delivered
  - HP ProLiant BL460c Gen9 Server Blade - To be delivered
  - HP ProLiant ML110 Gen9 Server - To be delivered
  - HP ProLiant ML150 Gen9 Server - To be delivered
  - HPE ProLiant ML350 Gen9 Server - To be delivered
  - HP ProLiant DL120 Gen9 Server - To be delivered
  - HPE ProLiant DL560 Gen9 Server - To be delivered
  - HP ProLiant BL660c Gen9 Server - To be delivered
  - HPE ProLiant ML30 Gen9 Server - To be delivered
  - HPE ProLiant XL170r Gen10 Server - To be delivered
  - HPE ProLiant DL20 Gen9 Server - To be delivered
  - HPE Synergy 660 Gen9 Compute Module - To be delivered
  - HPE Synergy 480 Gen9 Compute Module - To be delivered
  - HPE ProLiant XL250a Gen9 Server - To be delivered
  - HPE ProLiant XL190r Gen9 Server - To be delivered
  - HP ProLiant DL80 Gen9 Server - To be delivered
  - HPE ProLiant DL180 Gen9 Server - To be delivered
  - HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server -
To be delivered
  - HPE ProLiant WS460c Gen9 Workstation - To be delivered
  - HPE ProLiant XL260a Gen9 Server - To be delivered
  - HPE Synergy 620 Gen9 Compute Module - To be delivered
  - HPE ProLiant DL580 Gen9 Server - To be delivered
  - HP ProLiant XL220a Gen8 v2 Server - To be delivered
  - HPE Synergy 680 Gen9 Compute Module - To be delivered
  - HPE ProLiant m510 Server Cartridge - To be delivered
  - HPE ProLiant m710p Server Cartridge - To be delivered
  - HPE ProLiant m710x Server Cartridge - To be delivered
  - HP ProLiant m710 Server Cartridge - To be delivered
  - HP 

[security bulletin] HPESBHF03805 rev.5 - Certain HPE products using Microprocessors from Intel, AMD, and ARM, with Speculative Execution, Elevation of Privilege and Information Disclosure.

2018-01-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03805en_us
Version: 5

HPESBHF03805 rev.5 - Certain HPE products using Microprocessors from Intel,
AMD, and ARM, with Speculative Execution, Elevation of Privilege and
Information Disclosure.

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-18
Last Updated: 2018-01-17

Potential Security Impact: Local: Disclosure of Information, Elevation of
Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
On January 3 2018, side-channel security vulnerabilities involving
speculative execution were publicly disclosed. These vulnerabilities may
impact the listed HPE products, potentially leading to information disclosure
and elevation of privilege. Mitigation and resolution of these
vulnerabilities may call for both an operating system update, provided by the
OS vendor, and a system ROM update from HPE.


**Note:**

  * This issue takes advantage of techniques commonly used in many modern
processor architectures.  
  * For further information, microprocessor vendors have provided security
advisories:
  
- Intel:

- AMD: 
- ARM: 

References:

  - PSRT110635
  - PSRT110634
  - PSRT110633
  - PSRT110632
  - CVE-2017-5715 - aka Spectre, branch target injection
  - CVE-2017-5753 - aka Spectre,  bounds check bypass
  - CVE-2017-5754 - aka  Meltdown,  rogue data cache load, memory access
permission check performed after kernel memory read

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE ProLiant DL380 Gen10 Server prior to v1.28
  - HPE ProLiant DL180 Gen10 Server prior to v1.28
  - HPE ProLiant DL160 Gen10 Server prior to v1.28
  - HPE ProLiant DL360 Gen10 Server prior to v1.28
  - HPE ProLiant ML110 Gen10 Server prior to v1.28
  - HPE ProLiant DL580 Gen10 Server prior to v1.28
  - HPE ProLiant DL560 Gen10 Server prior to v1.28
  - HPE ProLiant DL120 Gen10 Server prior to v1.28
  - HPE ProLiant ML350 Gen10 Server prior to v1.28
  - HPE ProLiant XL450 Gen10 Server prior to v1.28
  - HPE Synergy 660 Gen10 Compute Module prior to v1.28
  - HPE ProLiant XL170r Gen10 Server prior to v1.28
  - HPE ProLiant BL460c Gen10 Server Blade prior to v1.28
  - HPE ProLiant XL190r Gen10 Server prior to v1.28
  - HPE ProLiant XL230k Gen10 Server prior to v1.28
  - HPE ProLiant DL385 Gen10 Server prior to v1.04
  - HPE Synergy 480 Gen10 Compute Module prior to v1.28
  - HPE ProLiant ML350 Gen10 Server prior to v1.28
  - HPE ProLiant XL730f Gen9 Server To be delivered
  - HPE ProLiant XL230a Gen9 Server To be delivered
  - HPE ProLiant XL740f Gen9 Server To be delivered
  - HPE ProLiant XL750f Gen9 Server To be delivered
  - HPE ProLiant XL170r Gen9 Server To be delivered
  - HP ProLiant DL60 Gen9 Server To be delivered
  - HPE ProLiant XL450 Gen9 Server To be delivered
  - HP ProLiant DL160 Gen9 Server To be delivered
  - HPE Apollo 4200 Gen9 Server To be delivered
  - HP ProLiant BL460c Gen9 Server Blade To be delivered
  - HP ProLiant ML110 Gen9 Server To be delivered
  - HP ProLiant ML150 Gen9 Server To be delivered
  - HPE ProLiant ML350 Gen9 Server To be delivered
  - HP ProLiant DL380 Gen9 Server To be delivered
  - HP ProLiant DL120 Gen9 Server To be delivered
  - HPE ProLiant DL560 Gen9 Server To be delivered
  - HP ProLiant BL660c Gen9 Server To be delivered
  - HPE ProLiant DL20 Gen9 Server To be delivered
  - HPE Synergy 660 Gen9 Compute Module To be delivered
  - HPE Synergy 480 Gen9 Compute Module To be delivered
  - HPE ProLiant ML30 Gen9 Server To be delivered
  - HPE ProLiant XL250a Gen9 Server To be delivered
  - HPE ProLiant XL190r Gen9 Server To be delivered
  - HP ProLiant DL80 Gen9 Server To be delivered
  - HPE ProLiant DL180 Gen9 Server To be delivered
  - HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server To
be delivered
  - HPE ProLiant WS460c Gen9 Workstation To be delivered
  - HPE ProLiant XL260a Gen9 Server To be delivered
  - HPE Synergy 620 Gen9 Compute Module To be delivered
  - HPE ProLiant DL580 Gen9 Server To be delivered
  - HPE Synergy 680 Gen9 Compute Module To be delivered
  - HPE ProLiant m510 Server Cartridge prior to v1.62
  - HPE ProLiant m710p Server Cartridge prior to v12/12/2017
  - HPE ProLiant m710x Server Cartridge prior to v1.60
  - HP ProLiant m710 Server Cartridge prior to 12/12/2017 (v1.60)
  - HPE Synergy Composer prior to 12/12/2017
  - HPE Integrity Superdome X with BL920s Blades prior to 8.8.6
  - HP ProLiant DL360 Gen9 Server prior to 2.3.110
  - HPE ProLiant Thin 

[security bulletin] HPESBMU03806 rev.1 - HPE IceWall Products, Multiple Remote Unauthorized Disclosure of Information, Unauthorized Modificiation

2018-01-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03806en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbmu03806en_us
Version: 1

HPESBMU03806 rev.1 - HPE IceWall Products, Multiple Remote Unauthorized
Disclosure of Information, Unauthorized Modificiation

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-12
Last Updated: 2018-01-12

Potential Security Impact: Remote: Unauthorized Disclosure of Information,
Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE IceWall
Products.  The vulnerability could be exploited remotely resulting in
unauthorized disclosure of information or unauthorized modification.

References:

  - CVE-2017-8978

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - IceWall SSO Dfw 10.0 Patch 8 (HP-UX and RHEL) and 11.0 (RHEL)
  - IceWall MCRP 4.0
  - IceWall MFA 4.0 Enterprise Edition MFA Proxy
  - IceWall MFA 4.0 Standard Edition MFA Proxy

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8978
  4.3 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
  2.1 (AV:N/AC:H/Au:S/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following updates to resolve the vulnerability in the
affected IceWall modules:

[http://www.hpe.com/jp/icewall_patchaccess](http://www.hpe.com/jp/icewall_pat
haccess)

HISTORY
Version:1 (rev.1) - 12 January 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJaWONVAAoJELXhAxt7SZai4UQIAKDoOrnq6RYksoUBSqdLXi0v
liHOf3hC6laSlO9G8pYZ9F0PJpDinLGvbBcgsSjkqMPCeIxygJRK3RRc1Nw0Z30F
YzhDFdGW64IRxf/6i0cvEN9oUZ7JKNDIkbHj8qWXoaVRX7CepKvAKu/D4s2jHBox
voF73p36Q3nltbRG9B7w3tFGigiIRMrgmX6GZlfMUHeIN+xTBkZNrVVNbGTTrAXZ
dB80vm0ODVlPuqQIwcngOKah02Dg+olQoicuwaI9SFLSAw9dJHbXCD23Ii+++iyX
kGzO4YN1SLKWjLnsqmq9FiwoITkyITsPYKdiSkjh9l+1JQsg+nsyVMaW3pSGRL8=
=njzy
-END PGP SIGNATURE-


[security bulletin] HPSBGN02925 rev.3 - HP IceWall SSO, IceWall File Manager and IceWall Federation Agent, Multiple Remote Unauthorized Access Vulnerabilities

2018-01-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c03918632

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03918632
Version: 3

HPSBGN02925 rev.3 - HP IceWall SSO, IceWall File Manager and IceWall
Federation Agent, Multiple Remote Unauthorized Access Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-12
Last Updated: 2018-01-12

Potential Security Impact: Remote: Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP IceWall SSO,
IceWall File Manager and IceWall Federation Agent. The vulnerabilities could
be exploited remotely resulting in unauthorized access.

References:

  - CVE-2013-4817
  - CVE-2013-4818
  - CVE-2013-4819
  - CVE-2013-4820

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - IceWall Federation Agent 3.0
  - IceWall File Manager 3.0
  - IceWall SSO Agent Option 8.0, 8.0(2007), and 10.0  - Included JAVA Agent
Library and SAML2 Agent Option
  - IceWall SSO certd 8.0, 8.0.1 (8.0 R1), 8.0 R2, 8.0 R3 and 10.0
  - IceWall SSO Dfw 8.0, 8.0.1 (8.0 R1), 8.0 R2, 8.0 R3 and 10.0
  - IceWall SSO Smart Device Option 10.0

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2013-4817
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE-2013-4818
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2013-4819
  4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
  3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)

CVE-2013-4820
  3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
  2.1 (AV:N/AC:H/Au:S/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates available to resolve the
vulnerabilities:

- -   IceWall SSO 10.0 DFW for Windows Patch Release 1

- -   IceWall SSO 8.0 R2 CERTD Patch Release 7

- -   IceWall SSO 8.0 R3 CERTD Patch Release 4

- -   IceWall SSO 10.0 CERTD Patch Release 5

- -   IceWall SSO 10.0 CERTD for Windows Patch Release 1

- -   IceWall SSO 10.0 Agent Option Patch Release 2 Servlet edition

- -   IceWall SSO 8.0 Agent Option 2007 Update Release 2 Patch Release 5 IIS
edition

- -   IceWall SSO 10.0 Agent Option Patch Release 1 IIS edition

- -   IceWall SSO 10.0 Smart Device Option Patch Release 1

- -   IceWall SSO 10.0 DFW Patch Release 7

- -   IceWall SSO 10.0 Agent Option Patch Release 3 Apache edition

- -   IceWall Federation Agent 3.0 Patch Release 2

- -   IceWall SSO 8.0 R1 CERTD Patch Release 2

- -   IceWall SSO 8.0 CERTD Patch Release 1

- -   IceWall SSO 10.0 JAVA Agent Library Patch Release 1

- -   IceWall SSO 8.0 JAVA Agent Library 2007 Update Release 2 Patch Release 1

HPE has provided a mitigation workaround for the vulnerabilities for the
following products:

- -   HP IceWall SSO Version 8.0

- -   HP IceWall SSO Version 8.0 Enterprise Edition R1

- -   HP IceWall SSO Version 8.0.1 Standard Edition

- -   HP IceWall SSO Version 8.0 R2 Enterprise Edition

- -   HP IceWall SSO Version 8.0 R2 Standard Edition

- -   HP IceWall SSO Version 8.0 R3 Enterprise Edition

- -   HP IceWall SSO Version 8.0 R3 Standard Edition

- -   HP IceWall SSO Version 10.0 Enterprise Edition

- -   HP IceWall SSO Version 10.0 Standard Edition

- -   HP IceWall SSO Version 8.0 Agent Option

- -   HP IceWall SSO Version 8.0 Agent Option 2007

- -   HP IceWall SSO Version 10.0 Agent Option

- -   HP IceWall SSO Version 10.0 Agent Option Update Release 1

- -   HP IceWall File Manager Version 3.0

- -   HP IceWall File Manager Version 3.0 SP1

- -   HP IceWall File Manager Version 3.0 SP2

- -   HP IceWall File Manager Version 3.0 SP3

- -   HP IceWall File Manager Version 3.0 SP4

- -   HP IceWall SSO 8.0 SAML2 Agent Option

- -   HP IceWall Federation Agent 3.0

- -   HP IceWall SSO 8.0 JAVA Agent Library

- -   HP IceWall SSO 8.0 JAVA Agent Library 2007

- -   HP IceWall SSO 10.0 JAVA Agent Library

- -   HP IceWall SSO 10.0 Smart Device Option

HPE IceWall customers can download the software updates and mitigation
workaround information by following the instructions at the following
location:

[http://www.hpe.com/jp/icewall_patchaccess](http://www.hpe.com/jp/icewall_pat
haccess)

Please note that the HPE IceWall product is only available in Japan.

HISTORY

Version:1 (rev.1) - 19 September 2013 Initial release

Version:2 (rev.2) - 27 November 2015 Updates available for IceWall SSO 10.0
Smart Device, IceWall SSO 10.0 DFW, IceWall SSO 10.0 Agent Option, IceWall
Federation Agent, IceWall SSO 

[security bulletin] HPESBHF03800 rev.1 - HPE Comware 7 MSR Routers, Remote Denial of Service and Local Elevation or Privilege

2018-01-15 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03800en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03800en_us
Version: 1

HPESBHF03800 rev.1 -  HPE Comware 7 MSR Routers, Remote Denial of Service and
Local Elevation or Privilege

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-12
Last Updated: 2018-01-12

Potential Security Impact: Local: Elevation of Privilege; Remote: Denial of
Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Remote denial of service and local elevation of privilege security
vulnerabilities have been identified in HPE Comware 7 MSR Routers running
software earlier than the R0605P20 release.

References:

  - PSRT110560
  - CVE-2017-7618 - Part of PSRT110560
  - CVE-2017-1000364 - Part of PSRT110560

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware v7 (CW7) Products Earlier than R0605P20 release - MSR Routers
Only

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-1000364
  7.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
  6.2 (AV:L/AC:H/Au:N/C:C/I:C/A:C)

CVE-2017-7618
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software updates to resolve the
vulnerabilities in Comware 7 MSR Routers:
 
 * R0605P20 release
  
  + **MSR1000 (Comware 7) - Version: Fixed in R0605P20 Release**
* HP Network Products
  - JG875A HP MSR1002-4 AC Router
  - JH060A HP MSR1003-8S AC Router

  + **MSR2000 (Comware 7) - Version: Fixed in R0605P20 Release**
* HP Network Products
  - JG411A HP MSR2003 AC Router
  - JG734A HP MSR2004-24 AC Router
  - JG735A HP MSR2004-48 Router
  - JG866A HP MSR2003 TAA-compliant AC Router
 
  + **MSR3000 (Comware 7) - Version: Fixed in R0605P20 Release**
* HP Network Products
  - JG404A HP MSR3064 Router
  - JG405A HP MSR3044 Router
  - JG406A HP MSR3024 AC Router
  - JG407A HP MSR3024 DC Router
  - JG408A HP MSR3024 PoE Router
  - JG409A HP MSR3012 AC Router
  - JG410A HP MSR3012 DC Router
  - JG861A HP MSR3024 TAA-compliant AC Router
  - JG409B HPE MSR3012 AC Router
 
  + **MSR4000 (Comware 7) - Version: Fixed in R0605P20 Release**
* HP Network Products
  - JG402A HP MSR4080 Router Chassis
  - JG403A HP MSR4060 Router Chassis
  - JG412A HP MSR4000 MPU-100 Main Processing Unit
  - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit

  + **MSR95X (Comware 7) - Version: Fixed in R0605P20 Release**
* HP Network Products
  - JH296A HPE MSR954 1GbE SFP 2GbE-WAN 4GbE-LAN CWv7 Router
  - JH297A HPE MSR954-W 1GbE SFP (WW) 2GbE-WAN 4GbE-LAN Wireless 802.11n
CWv7 Router
  - JH298A HPE MSR954-W 1GbE SFP LTE (AM) 2GbE-WAN 4GbE-LAN Wireless
802.11n CWv7 Router
  - JH299A HPE MSR954-W 1GbE SFP LTE (WW) 2GbE-WAN 4GbE-LAN Wireless
802.11n CWv7 Router
  - JH300A HPE FlexNetwork MSR958 1GbE and Combo 2GbE WAN 8GbE LAN Router
  - JH301A HPE FlexNetwork MSR958 1GbE and Combo 2GbE WAN 8GbE LAN PoE
Router
  - JH373A HPE MSR954 Serial 1GbE Dual 4GLTE (WW) CWv7 Router

HISTORY
Version:1 (rev.1) - 1 December 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard 

[security bulletin] HPESBNS03804 rev.1 - HPE NonStop Server, Local Authentication Restriction Bypass

2018-01-15 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbns03804en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbns03804en_us
Version: 1

HPESBNS03804 rev.1 - HPE NonStop Server, Local Authentication Restriction
Bypass

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-12
Last Updated: 2018-01-12

Potential Security Impact: Local: Authentication Restriction Bypass

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in HPE NonStop Server may allow local authentication
restriction bypass.

References:

  - CVE-2017-8974 - PSRT110626

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - NonStop Servers L-Series: T6533L01 through T6533L01^ADN;J-Series and
H-series: T6533H02 through T6533H04^ADF and T6533H05 through T6533H05^ADL

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8974
  3.3 CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
  2.4 (AV:L/AC:H/Au:S/C:P/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following information to resolve this vulnerability.
Please refer to Hotstuff document HS03367 for more detailed information. 

Install the appropriate SPR for your release version of HPE NonStop Server:

L-Series:

  T6533L01^ADQ (STDSEC-STANDARD SECURITY PROD) - already available.

  This SPR is already present in these RVUs: None

  This SPR is usable with the following RVUs:

L15.02.00 through L16.05.02
L17.02.00
L17.08.00

J-Series:

  T6533H05^ADO (STDSEC-STANDARD SECURITY PROD) - already available.

  This SPR is already present in these RVUs: None

  This SPR is usable with the following RVUs:

J06.18.00 through J06.19.02
J06.20.00 J06.20.01   
J06.21.00 J06.21.01


Installation impact: SYSGEN Required

HISTORY
Version:1 (rev.1) - 18 December 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJaWOk+AAoJELXhAxt7SZaixNkH/2nZOdl8aLNV3Al/hYkcD06t
Mhrl/pMNyn+sPmubO7aDby29HoHiCMc6HMmkeLGCfV4fslxJf4whH0KtalSl3jnR
V4nVd8CKqriqOubk/PU9iXrWOgUy7mUnBaKSPYBtAaTyLGBuwOZnackjlVAoIzpW
cEVGZgkZLar6EEEZKAdl3hRdZcqX7QmWz7ytXYr4lbav1OFaQLNR5b0V8J8M8Lqn
2Qvp7fn7XZhLRmpeupJAmCNc88c+6yKJlZ5yJVILlhjquFWJACC4MiX+7PRf+o7D
4gyGvKa8wxCHOXxt7vYhnC7RPYIOwfppgOTTymcoqmSMtilV0qG6QrAOLE/rKfw=
=YS+q
-END PGP SIGNATURE-


[security bulletin] HPESBHF03805 rev.4 - Certain HPE products using Microprocessors from Intel, AMD, and ARM, with Speculative Execution, Elevation of Privilege and Information Disclosure.

2018-01-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03805en_us
Version: 4

HPESBHF03805 rev.4 - Certain HPE products using Microprocessors from Intel,
AMD, and ARM, with Speculative Execution, Elevation of Privilege and
Information Disclosure.

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-10
Last Updated: 2018-01-09

Potential Security Impact: Local: Disclosure of Information, Elevation of
Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
On January 3 2018, side-channel security vulnerabilities involving
speculative execution were publicly disclosed. These vulnerabilities may
impact the listed HPE products, potentially leading to information disclosure
and elevation of privilege. Mitigation and resolution of these
vulnerabilities may call for both an operating system update, provided by the
OS vendor, and a system ROM update from HPE.


**Note:**

  * This issue takes advantage of techniques commonly used in many modern
processor architectures.  
  * For further information, microprocessor vendors have provided security
advisories:
  
- Intel:

- AMD: 
- ARM: 

References:

  - PSRT110634
  - PSRT110633
  - PSRT110632
  - CVE-2017-5715 - aka Spectre, branch target injection
  - CVE-2017-5753 - aka Spectre,  bounds check bypass
  - CVE-2017-5754 - aka  Meltdown,  rogue data cache load, memory access
permission check performed after kernel memory read

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE ProLiant DL380 Gen10 Server prior to v1.28
  - HPE ProLiant DL180 Gen10 Server prior to v1.28
  - HPE ProLiant DL160 Gen10 Server prior to v1.28
  - HPE ProLiant DL360 Gen10 Server prior to v1.28
  - HPE ProLiant ML110 Gen10 Server prior to v1.28
  - HPE ProLiant DL580 Gen10 Server prior to v1.28
  - HPE ProLiant DL560 Gen10 Server prior to v1.28
  - HPE ProLiant DL120 Gen10 Server prior to v1.28
  - HPE ProLiant ML350 Gen10 Server prior to v1.28
  - HPE ProLiant XL450 Gen10 Server prior to v1.28
  - HPE ProLiant XL170r Gen10 Server prior to v1.28
  - HPE ProLiant BL460c Gen10 Server Blade prior to v1.28
  - HPE ProLiant XL230a Gen9 Server prior to v2.54
  - HPE ProLiant XL230k Gen10 Server prior to v1.28
  - HPE ProLiant XL730f Gen9 Server prior to v2.54
  - HPE ProLiant XL740f Gen9 Server prior to v2.54
  - HPE ProLiant XL750f Gen9 Server prior to v2.54
  - HPE ProLiant XL170r Gen9 Server prior to v2.54
  - HP ProLiant DL60 Gen9 Server prior to v2.54
  - HPE ProLiant XL450 Gen9 Server prior to v2.54
  - HP ProLiant DL160 Gen9 Server prior to v2.54
  - HPE Apollo 4200 Gen9 Server prior to v2.54
  - HP ProLiant BL460c Gen9 Server Blade prior to v2.54
  - HP ProLiant ML110 Gen9 Server prior to v2.54
  - HP ProLiant ML150 Gen9 Server prior to v2.54 
  - HPE ProLiant ML350 Gen9 Server prior to v2.54
  - HP ProLiant DL380 Gen9 Server prior to v2.54
  - HP ProLiant DL120 Gen9 Server prior to v2.54
  - HPE ProLiant DL560 Gen9 Server prior to v2.54
  - HPE ProLiant XL270d Gen9 Special Server prior to v2.54
  - HP ProLiant BL660c Gen9 Server prior to v2.54
  - HPE ProLiant m710x Server Cartridge prior to v1.60
  - HPE ProLiant DL20 Gen9 Server prior to v2.52
  - HPE ProLiant DL385 Gen10 Server prior to v1.04
  - HPE Synergy 660 Gen9 Compute Module prior to v2.54
  - HPE Synergy 480 Gen10 Compute Module prior to v1.28
  - HPE Synergy 480 Gen9 Compute Module prior to v2.54
  - HPE ProLiant ML30 Gen9 Server prior to v2.52
  - HPE ProLiant XL190r Gen10 Server prior to v1.28
  - HPE ProLiant XL250a Gen9 Server prior to v2.54
  - HPE ProLiant XL190r Gen9 Server prior to v2.54
  - HP ProLiant DL80 Gen9 Server prior to v2.54
  - HPE ProLiant DL180 Gen9 Server prior to v2.54
  - HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server
prior to v2.54
  - HPE ProLiant WS460c Gen9 Workstation prior to v2.54
  - HPE ProLiant DL580 Gen9 Special Server prior to v2.54
  - HPE Synergy 680 Gen9 Compute Modules prior to v2.54
  - HPE ProLiant XL260a Gen9 Server prior to 1/22/2018
  - HPE ProLiant m510 Server Cartridge prior to 1/22/2018
  - HPE ProLiant m710p Server Cartridge prior to 12/12/2017
  - HP ProLiant m350 Server Cartridge prior to 12/12/2017
  - HP ProLiant m300 Server Cartridge prior to 12/12/2017
  - HP ProLiant ML350e Gen8 Server prior to 12/12/2017
  - HPE ProLiant ML350e Gen8 v2 Server prior to 12/12/2017
  - HP ProLiant BL460c Gen8 Server prior to 12/12/2017
  - HP ProLiant BL660c Gen8 Server prior to 12/12/2017
  - HPE ProLiant SL4540 Gen8 1 Node Server 

[security bulletin] HPESBHF03803 rev.1 - Hewlett Packard Enterprise Moonshot Provisioning Manager Appliance, Remote Denial of Service and Execution of Code

2018-01-03 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03803en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03803en_us
Version: 1

HPESBHF03803 rev.1 - Hewlett Packard Enterprise Moonshot Provisioning Manager
Appliance, Remote Denial of Service and Execution of Code

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-02
Last Updated: 2018-01-02

Potential Security Impact: Remote: Code Execution, Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in Hewlett Packard
Enterprise Moonshot Provisioning Manager Appliance v1.20 and earlier. The
vulnerability could be remotely exploited to allow denial of service and
execution of code.

References:

  - CVE-2017-8975 - remote code execution, ZDI-CAN-4943
  - CVE-2017-8976 - remote code execution, ZDI-CAN-4944
  - CVE-2017-8977 - denial of service, ZDI-CAN-4945

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Moonshot Provisioning Manager prior to and including v1.20

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8975
  10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVE-2017-8976
  10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2017-8977
  8.2 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
  8.5 (AV:N/AC:L/Au:N/C:N/I:P/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise acknowledges rgod working with Trend Micro's Zero
Day Initiative for reporting this issue to security-al...@hpe.com.

RESOLUTION

HPE has made the following software updates and mitigation information to
resolve the vulnerability in Hewlett Packard Enterprise Moonshot Provisioning
Manager Appliance.  

  * Hewlett Packard Enterprise Moonshot Provisioning Manager Appliance v1.22

HISTORY
Version:1 (rev.1) - 2 January 2018 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJaTSwjAAoJELXhAxt7SZai3AMIALvem4kQyGWGAOP+cpF3HP8e
HKe1qzy473ZcL2hu+2vPE/dAB5rFrFwF0vr7owpHZPxSHpnG00BpPjb615xTOj1R
IHmjQ8co2+ViO6rnMSBRaX7ZpWQ+sPxiOQZXM2SSfsQ9DR7CeT1qMvnGH5hCEruU
I5Kt5ItrgWNYDPTe8jPfC6xZGBgKp1tnJ+P/VGRJwFPPc2bMM18yfiSGhk3WOO8w
2iQSXMmChcQTnktOhO2U4qGwNANbC3vJ/iA2bDFljVjOkTbPKvLu7DzmYGiU5Gb1
XruXe56c4rEFJ6l7DbZ90M+jAQMki11XxKg5iHSbuE5naomNyJzv4879kA56qJM=
=9V85
-END PGP 

[security bulletin] HPESBHF03798 rev.1 - HPE Proliant Gen10 Servers, DL20 Gen9, ML30 Gen9 and Certain Apollo Servers Using Intel Server Platform Service (SPS) v4.0, Local Denial of Service and Executi

2017-11-21 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03798en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03798en_us
Version: 1

HPESBHF03798 rev.1 - HPE Proliant Gen10 Servers, DL20 Gen9, ML30 Gen9 and
Certain Apollo Servers Using Intel Server Platform Service (SPS) v4.0, Local
Denial of Service and Execution of Arbitrary Code

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-11-21
Last Updated: 2017-11-21

Potential Security Impact: Local: Denial of Service (DoS), Execution of
Arbitrary Code

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A vulnerability in HPE certain Gen10 Servers, DL20 Gen9, ML30 Gen9 and
certain Apollo servers with Intel Server Platform Service (SPS) v4.0 are
vulnerable to local Denial of Service and execution of arbitrary code.

**Note:** Intel has identified security vulnerabilities which could
potentially place impacted platforms at risk. An issue impacts Intel Server
Platform Service (SPS) v4.0 used in certain HPE servers. The SPS/ME firmware
used in Intels architecture can be compromised with physical access such
that non-authenticated code may be executed in the SPS environment outside of
the visibility of the user and operating system administrator. Intel has
released new revisions of the Intel Server Platform Service (SPS) firmware to
address this vulnerability.

References:

  - CVE-2017-5706 - Intel  server platform service
  - CVE-2017-5709 - Intel  server platform service

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Apollo 2000 System ROM firmware prior to v1.26
  - HPE Apollo 4510 System ROM firmware prior to v1.26
  - HPE Apollo 6000 DLC System ROM firmware prior to v1.26
  - HPE ProLiant BL460c Gen10 Server Blade ROM firmware prior to v1.26
  - HPE ProLiant DL20 Gen9 Server SPS Firmware prior to v4.01.04.054
  - HPE ProLiant DL360 Gen10 Server ROM firmware prior to v1.26
  - HPE ProLiant DL380 Gen10 Server ROM firmware prior to v1.26
  - HPE ProLiant DL560 Gen10 Server ROM firmware prior to v1.26
  - HPE ProLiant DL580 Gen10 Server ROM firmware prior to v1.26
  - HPE ProLiant m710x Server Cartridge ROM firmware prior to v1.26
  - HPE ProLiant ML30 Gen9 Server SPS Firmware prior to 4.01.04.054
  - HPE ProLiant ML110 Gen10 Server ROM firmware prior to v1.26
  - HPE ProLiant ML350 Gen10 Server ROM firmware prior to v1.26
  - HPE ProLiant XL170r Gen10 Server ROM firmware prior to v1.26
  - HPE ProLiant XL190r Gen10 Server ROM firmware prior to v1.26
  - HPE ProLiant XL230k Gen10 Server ROM firmware prior to v1.26
  - HPE ProLiant XL450 Gen10 Server ROM firmware prior to v1.26
  - HPE Synergy 660 Gen10 Compute Module ROM firmware prior to v1.26, SPS
firmware prior to 04.00.04.28
  - HPE Synergy 480 Gen10 Compute Module ROM firmware prior to v1.26, SPS
firmware prior to 04.00.04.28

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5706
  7.4 CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVE-2017-5709
  7.4 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
  5.6 (AV:L/AC:H/Au:N/C:C/I:C/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following response to resolve the vulnerabilities in
SPS. HPE is working closely with Intel to ensure timely resolution of this
issue on HPE systems. HPE will resolve this vulnerability in our servers in
the following ways.

* For customers that currently have impacted HPE ProLiant and Synergy servers
at their locations, are available for download from HPEs support site.
Customers should refer to the Customer Bulletin HPE Servers:
  
  * [Some Systems Using Certain Intel Processors Are Vulnerable to Local
Denial of Service and Execution of Arbitrary Code for detailed
instructions](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a0
036596en_us)

HISTORY
Version:1 (rev.1) - 21 November 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a 

[security bulletin] HPESBMU03794 rev.1 - HPE Insight Control, Multiple Remote Vulnerabilities

2017-11-17 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03794en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbmu03794en_us
Version: 1

HPESBMU03794 rev.1 - HPE Insight Control, Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-11-15
Last Updated: 2017-11-15

Potential Security Impact: Remote: Indirect Vulnerabilities

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities have been identified in HPE Insight Control that
could be exploited remotely.

References:

  - PSRT110608
  - CVE-2017-8969 - Improper Input Validation (PMP)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Insight Control 7.6 LR1

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8969
  2.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
  3.5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has released the following software update kit to resolve these
vulnerabilities in HPE Insight Control. 

 * The HPE Insight Control 7.6 LR1 Update kit is available on HPE Support
Center.

HISTORY
Version:1 (rev.1) - 14 November 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJaDGq6AAoJELXhAxt7SZaiCM8IAJaxGgdFUTuhioz98JS8rWip
QYJhAboiE1ZTuf6dNJ6uqbPVWh0UhotLStQnaBimEAEJKeUVagNuAChWoQ35p0fe
/C4Z2FAmnI8xkb69QElIhDJ4Ud79JvKYpdan5qI+rBGPYCuVYQxopy9vETOOpgpk
enNSOPiY/rANgY/AnHEED7V0E8hZDTCIuH99+DxUZdB9jl1g33T6Eri8iJ6FKc6Y
hOC35gM32hUYMc9lYJNqlJ6/qG/qgMeqt1wv5aFj17dJbexsgx+/Kxta6+APdp9v
QWnjVzNutbjiiSmqfxgGrUqlKlhh0Oc6mqSS/LXYySaCDzZuV/odW18GDLDvRFQ=
=f101
-END PGP SIGNATURE-


[security bulletin] HPESBMU03795 rev.1 - HPE Matrix Operating Environment, Multiple Remote Vulnerabilities

2017-11-17 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03795en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbmu03795en_us
Version: 1

HPESBMU03795 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-11-15
Last Updated: 2017-11-15

Potential Security Impact: Remote: Indirect Vulnerabilities, Unauthenticated
Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities have been identified in HPE Matrix Operating
Environment (MOE) on Windows. The vulnerabilities could be exploited remotely
resulting in Unauthenticated Disclosure of Information and indirect
vulnerabilities.

References:

  - PSRT110609
  - CVE-2017-8970 - Remote Unauthenticated Disclosure of Information (MSSW)
  - CVE-2017-8971 - Clickjacking (VSE) 
  - CVE-2017-8972 - Clickjacking (MSSW) 
  - CVE-2017-8973 - Improper Input Validation (IO)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Matrix Operating Environment Software 7.6 LR1

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8970
  4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE-2017-8971
  2.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
  3.5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVE-2017-8972
  2.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
  3.5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVE-2017-8973
  2.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
  3.5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software update kit to resolve these
vulnerabilities in HPE Matrix Operating Environment (MOE) 7.6 LR1. 

* Please obtain the HPE MOE 7.6 LR1 Update kit from HPE Support Center.

HISTORY
Version:1 (rev.1) - 13 November 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJaDG5pAAoJELXhAxt7SZaiMMkIAJFjZnfr9YPBo+GNr2lFpz42
xzTzlJa0sOKG40IqxkbxVtFc1A7ZgYZpEU8kXtCoQxv39dq9pHyinYNvD+kLFcRj
RgNBCaL0+WWptuQj+yWkY7ALoDtVI0PiuYtD+adRtn/jDkJqyeZBwAj0axixO47V
/ifrEmVJjffMC0xvGqbuiwNCG6w0jHA489b7rckHpTquBFkYLnx2mtJOGe6RBP0B
1nSUkaE/rmI81M62GMwLwOxmnJWNakevpoe50PRAZFi6deWNYHvDTk+/u8kBTsCM
23RnhmSOGEYZZzw7CX226UPTgHlK2/vjVMG9bsUDpRqORv76NOYLYrDC6MBo3jY=
=Af7G
-END PGP SIGNATURE-


[security bulletin] HPESBHF03705 rev.4 - HPE Integrated Lights-Out 4, 3, 2 and Moonshot Remote Console Administrator (iLO 4 and MRCA) Remote Disclosure of Information

2017-11-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-HPESBHF03705en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: HPESBHF03705en_us
Version: 4

HPESBHF03705 rev.4 - HPE Integrated Lights-Out 4, 3, 2 and Moonshot Remote
Console Administrator (iLO 4 and MRCA) Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-11-16
Last Updated: 2017-11-15

Potential Security Impact: Remote: Authentication Bypass

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE iLO 4, 3, 2 and
Moonshot RCA. The vulnerability could be exploited remotely to allow
disclosure of information.

References:

  - CVE-2017-12543

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Moonshot Remote Console Administrator Prior to 2.50
  - HP Integrated Lights-Out 4 (iLO 4), Prior to 2.53
  - HP Integrated Lights-Out 3 (iLO 3), Firmware for ProLiant G7 Servers
Prior to v1.89
  - HP Integrated Lights-Out 2 (iLO 2) Firmware for ProLiant G6 Servers Prior
to v2.30

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-12543
  2.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
  2.1 (AV:N/AC:H/Au:S/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank Daniel Lawson of MWR
InfoSecurity for reporting this vulnerability.

RESOLUTION

HPE has provided the following software updates to resolve the vulnerability
in HPE Integrated Lights-out 4 and Moonshot Remote Console Administrator (iLO
4 and mRCA) products:


 * Upgrade to iLO 4 firmware version 2.55 or subsequent
 
 * Upgrade to HPE Moonshot RCA 2.50 or subsequent
 
 * Upgrade to iLO 3 v1.89 or subsequent
 
 * Upgrade to iLO 2 v2.30 or subsequent

HISTORY

Version:1 (rev.1) - 24 August 2017 Initial Release

Version:2 (rev.2) - 19 September 2017 Removed references to iLO 2 and iLO 3

Version:3 (rev.3) - 10 November 2017 added iLO 3, and iLO 2, changed ilo4
recommendation to 2.55

Version:4 (rev.4) - 15 November 2017 Updated for publishing


Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJaDHQHAAoJELXhAxt7SZaiQsYIALtKp1+vrltYOYNv2S9b7HTq
fxEjthat+dGnIfekvFuDZ4uhUwda82BwOsIcbpRlSS5sN2BV6lCLyiNI8A5tIRAx
OVz7aCixmmmGo4HYIh5Ngixl6/HeDJHMchj9cUQqrCErQd+SGa+y2J08Glnr5LBm
7ndQRzA0A8PP2wxV5AZgTl1zaMUp87PYzsWmT3vbNfyd7pXRDrDiUE8fd/SOiryo

[security bulletin] HPESBHF03787 rev.1 - Hewlett Packard Enterprise Intelligent Management Center (iMC) PLAT, Deserialization of Untrusted Data, Remote Code Execution

2017-11-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03787en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03787en_us
Version: 1

HPESBHF03787 rev.1 - Hewlett Packard Enterprise Intelligent Management Center
(iMC) PLAT, Deserialization of Untrusted Data, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-10-27
Last Updated: 2017-10-27

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in HPE Intelligent Management Center (iMC) PLAT
products could be exploited to allow Remote Code Execution.

References:

  - CVE-2017-8962 - ZDI-CAN-4810, PSRT110446
  - CVE-2017-8963 -  ZDI-CAN-4811, PSRT110447
  - CVE-2017-8964 - ZDI-CAN-4812, PSRT110448 
  - CVE-2017-8965 - ZDI-CAN-4814, PSRT110450  
  - CVE-2017-8966 - ZDI-CAN-4815, PSRT110451
  - CVE-2017-8967 - ZDI-CAN-4813, PSRT110449

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) iMC Plat 7.3 E0504P2

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8962
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVE-2017-8963
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVE-2017-8964
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVE-2017-8965
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVE-2017-8966
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVE-2017-8967
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank Steven Seeley (mr_me) of
Offensive Security, working with Trend Micro's Zero Day Initiative, for
reporting these security vulnerabilities in Intelligent Management Center
(iMC) PLAT to security-al...@hpe.com.

RESOLUTION

HPE has provided the following software updates and mitigation information to
resolve the vulnerabilities in HPE Intelligent Management Center (iMC) PLAT. 
HPE Intelligent Management Center (iMC) PLAT 7.3 E0506P03 fixes the
vulnerabilities in the following products:

 + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0506P03**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU

HISTORY
Version:1 (rev.1) - 27 October 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support 

[security bulletin] HPESBHF03789 rev.2 - Certain HPE Gen9 Systems with HP Trusted Platform Module v2.0 Option, Unauthorized Access to Data

2017-10-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03789en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03789en_us
Version: 2

HPESBHF03789 rev.2 - Certain HPE Gen9 Systems with HP Trusted Platform Module
v2.0 Option, Unauthorized Access to Data

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-10-18
Last Updated: 2017-10-17

Potential Security Impact: Local: Unauthorized Access to Data; Remote:
Unauthorized Access to Data

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in the "HP Trusted
Platform Module 2.0 Option" kit. This optional kit is available for HPE Gen9
systems with firmware version 5.51. The vulnerability in TPM firmware 5.51 is
that new mathematical methods exist such that RSA keys generated by the TPM
2.0 with firmware 5.51 are cryptographically weakened. This vulnerability
could lead to local and remote unauthorized access to data.

**Note:**  

 * The "HP Trusted Platform Module Option" (TPM 1.2) for HPE Gen6 through
Gen9 systems is not affected.

References:

  - PSRT110605
  - PSRT110598
  - CVE-2017-15361

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Trusted Platform Module 2.0 Kit FW 5.51 - TPM 2.0 FW 5.62 is not
affected.  This is the Gen9 TPM 2.0 option (only Gen9 servers could have this
option). The TPM 2.0 Option for Gen9 servers is not standard on Gen9 servers
- - it is an option.
  - HP ProLiant BL460c Gen9 Server Blade n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant BL660c Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL120 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL160 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL360 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL380 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL388 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL580 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL60 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL80 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant ML110 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant ML150 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE Apollo 4200 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant DL180 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant DL180 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant DL20 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant DL560 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant ML10 Gen9 E3-1225 v5 3.3GHz 4-core 8GB-R 1TB Non-hot Plug
4LFF SATA 300W AP Svr/Promo n/a - only if "HPE Trusted Platform Module 2.0
Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant ML10 Gen9 E3-1225 v5 4GB-R 1TB Non-hot Plug 4LFF SATA 300W
Svr/S-Buy n/a - only if "HPE Trusted Platform Module 2.0 Kit" w/ FW version
5.51 is installed.
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 1TB Non-hot Plug 4LFF SATA 300W
Perf Svr n/a - only if "HPE Trusted Platform Module 2.0 Kit" w/ FW version
5.51 is installed.
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W
Svr/GO n/a - only if "HPE Trusted Platform Module 2.0 Kit" w/ FW version 5.51
is installed.
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W
Svr/TV n/a - only if "HPE Trusted Platform Module 2.0 Kit" w/ FW version 5.51
is installed.
  - HPE ProLiant ML10 Gen9 G4400 4GB-R Non-hot Plug 4LFF SATA 300W Entry Svr
n/a - only if "HPE Trusted Platform Module 2.0 Kit" w/ FW version 5.51 is
installed.
  - HPE ProLiant ML30 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant ML350 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant ML350 

[security bulletin] HPESBHF03776 rev.1 - HPE Intelligent Management Center (iMC) Service Operation Management (SOM), Remote Arbitrary File Download

2017-10-03 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03776en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03776en_us
Version: 1

HPESBHF03776 rev.1 - HPE Intelligent Management Center (iMC) Service
Operation Management (SOM), Remote Arbitrary File Download

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-10-03
Last Updated: 2017-10-03

Potential Security Impact: Remote: Arbitrary File Download, Disclosure of
Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in  HPE Intelligent
Management Center (iMC) Service Operation Management (SOM). The vulnerability
could be remotely exploited to allow arbitrary file download and disclosure
of information.

References:

  - CVE-2017-12555 - Remote Arbitrary File Download

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) IMC SOM 7.3 E0501

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-12555
  9.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  9.4 (AV:N/AC:L/Au:N/C:C/I:C/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank Tenable Inc. for reporting
this vulnerability to security-al...@hpe.com.

RESOLUTION

HPE has made the following software updates to resolve the vulnerability in
Intelligent Management Center Service Operation Management.  The updates that
address the vulnerability are in version 7.3 E0501P01.  

 + **iMC SOM - Version: Fixed in IMC SOM 7.3 E0501P01**
* HP Network Products
  - JG139A HPE IMC Service Operation Management Software Module License
  - JG139AAE HPE IMC Service Operation Management Software Module E-LTU

HISTORY
Version:1 (rev.1) - 3 October 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZ09hOAAoJELXhAxt7SZaiJTYIALGkb0x8mU+bTTPNdP6dKFQo
a/nTh1aE043DGvQnWJ1w2MxXA+Nrobi86ezh3XZ96ncRwbHR5GcBK2b+OE198UMp
6EBcc5FqPX2zW1Hz/3qMDIiLFLIZTDlTDwnQQKjW3gN8o/GpidGOMbwKHA3e1i+F
+T0ze5R0ZzOfOophgmosrVlarCJdYUzwLP5SIC+D61frDCJR779cDxN6vZ6cG3OS
GNp9UY6LttQBNDyTdueWXgbkIdJxnHBx+hCN2+0t8Km7XwXYcryMIFtQ6QhVM/0z
hQH2/5m8LRgPMu4qK4w3X6Oeo0akQ82aIIqAenksG0/x+jIFnf8aawnz7orcUbo=
=WkVx
-END PGP SIGNATURE-


[security bulletin] HPESBUX03772 rev.1 - HP-UX BIND Service Running Named, Multiple Vulnerabilities

2017-09-06 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux03772en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbux03772en_us
Version: 1

HPESBUX03772 rev.1 - HP-UX BIND Service Running Named, Multiple
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-09-05
Last Updated: 2017-09-05

Potential Security Impact: Remote: Denial of Service (DoS), Unauthorized Read
Access to Data

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in the HP-UX BIND
service running named. These vulnerabilities could be exploited remotely to
allow Denial of Service (DoS), and unauthorized read access to data.

References:

  - CVE-2017-3140 - BIND 9.11.1
  - CVE-2017-3142 - BIND 9.11.1, 9.9.4
  - CVE-2017-3143 - BIND 9.11.1, 9.9.4

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP-UX DNS and BIND Software B.11.31 - BIND 9.9.4 prior to C.9.9.4.11.0
and BIND 9.11.1 prior to C.9.11.1.2.0

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-3140
  3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
  2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)

CVE-2017-3142
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE-2017-3143
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software updates to resolve the
vulnerabilities in the HP-UX BIND service running named.

* For BIND 9.9.4:

  - BIND 9.9.4 for HP-UX Release B.11.31 (PA and IA)
  - Depot: HP_UX_11.31_HPUX-NameServer_C.9.9.4.11.0_HP-UX_B.11.31_IA_PA.depot

* For BIND 9.11.1:
  - BIND 9.11.1 for HP-UX Release B.11.31 (PA and IA)
  - Depot: HP_UX_11.31_HPUX-NameServer_C.9.11.1.2.0_HP-UX_B.11.31_IA_PA.depot

**Note:** The depot files can be found here: 

 *


MANUAL ACTIONS: Yes - Update 
Download and install the software update 

PRODUCT SPECIFIC INFORMATION 
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application

that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins 
issued by HPE and lists recommended actions that may apply to a specific
HP-UX 
system. It can also download patches and create a depot automatically. For
more information see: 
 
 *


The following text is for use by the HP-UX Software Assistant. 

AFFECTED VERSIONS
HP-UX B.11.31 IA/PA 
=== 
NameService.BIND-AUX 
NameService.BIND-RUN 
Action 
For 9.9.4 : install C.9.9.4.11.0 or subsequent
For 9.11.1 : install C.9.11.1.2.0 or subsequent

Note: HPE recommends to migrate to 9.11.1

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 5 September 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for

[security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information

2017-08-31 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03765en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03765en_us
Version: 2

HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote
Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-08-30
Last Updated: 2017-08-29

Potential Security Impact: Remote: Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in the DES/3DES block ciphers used in the TLS
protocol could potentially impact HPE LoadRunner and HPE Performance Center
resulting in remote disclosure of information. This is also known as the
SWEET32 attack.

References:

  - CVE-2016-2183 - OpenSSL, disclosure of information, SWEET32

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Performance Center - All versions
  - HP LoadRunner - All versions

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-2183
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates and mitigation information to
resolve the vulnerability in HPE LoadRunner and HPE Performance Center.

*


HISTORY

Version:1 (rev.1) - 9 August 2017 Initial release

Version:2 (rev.2) - 30 August 2017 Version update


Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZpfUuAAoJELXhAxt7SZai0dcH/3Q/hO8ddb7Tewbr7tljO5K7
sf7EC5TCg303Ii/ULw2nNdD7PoP4cQAnaV55HeSlMKTMddM8qj2qd7mxFQss7RXq
koxZmuwe1bRMG1zBDRJdpnQZZDIOyBGmPRv1Ot4p9p/8PSMV16RZXVKQoxGdqkNU
+Iw1vjOvHqUu0wXmm8ll3qR0rCtx62Iwif/Hi/k4qn4Ff8TcyNL8jqLmKO5X+A4s
BB4yqBXxSyqSm8O4tQt4MFl+ZTbj1QJkvvvcv+jPQGmjoEuEp0b7NRVckzVaYr2C
6jqIzCMBQDSH3hgEqV+DtIw06qHBSrjXi8jOYDDFw8pUebMDatJnffLx8FVMrx0=
=4FHD
-END PGP SIGNATURE-


[security bulletin] HPESBGN03767 rev.1 - HPE Operations Orchestration, Remote Code Execution

2017-08-31 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03767en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03767en_us
Version: 1

HPESBGN03767 rev.1 - HPE Operations Orchestration, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-08-29
Last Updated: 2017-08-29

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Operations
Orchestration product. The vulnerability could be exploited remotely to allow
execution of code.

References:

  - CVE-2017-8994 - Remote Code Execution

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Operations Orchestration - All versions prior to 10.80

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8994
  7.5 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Jacob Baines of Tenable Network Security
working with Trend Micro's Zero Day Initiative (ZDI) for reporting this
vulnerability to security-al...@hpe.com

RESOLUTION

HPE has made the following software updates and mitigation information to
resolve the vulnerability in HPE Operations Orchestration.


* Please upgrade to HPE Operations Orchestration version 10.80

HISTORY
Version:1 (rev.1) - 30 August 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZpfW+AAoJELXhAxt7SZaihwEIALdUBpFGis3gBi/HsPEigm0p
azouv5o/fq0TEksFJsZ5GYm80wT4nMV5i8rFNOsOUv1effqHD48cPhtRl0gQ3S25
OZncUocKvMsGObRSorkC2zL5ZQoCDjbaI7/Z3QvfEEK2Z6edmKsbGA6DROMW9eSg
HeVZ/17a0YEHk0YFy/yWogy5W/po4wfrO53yxmGi4EPw2tN5MOVv9r7L1dlGQmk2
EeoWGIrpvhG1bhpMq45tePbFs+Q2CTD6hc7RxDxyYDANSftiHWJxDCa8utQC7eYw
QPn/O4tJ0d0AwaXhyodt//g0d/HC0hGMeq/sU0f1UqeCWHoMQ3SczHhK10M913E=
=hDkF
-END PGP SIGNATURE-


[security bulletin] HPESBHF03769 rev.1 - HPE Integrated Lights-out 4 (iLO 4) Multiple Remote Vulnerabilities

2017-08-24 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03769en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03769en_us
Version: 1

HPESBHF03769 rev.1 - HPE Integrated Lights-out 4 (iLO 4) Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-08-23
Last Updated: 2017-08-23

Potential Security Impact: Remote: Authentication Bypass, Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Integrated
Lights-out (iLO 4). The vulnerability could be exploited remotely to allow
authentication bypass and execution of code.

References:

  - CVE-2017-12542

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Integrated Lights-Out 4 (iLO 4), Prior to 2.53

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-12542
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank Fabien Perigaud of Airbus
Defense and Space CyberSecurity for reporting this vulnerability.

RESOLUTION

HPE has provided software updates to resolve the vulnerability in HPE
Integrated Lights-out 4 (iLO 4).  Please upgrade to HPE Integrated Lights-out
4 (iLO 4) firmware version 2.53 or newer.

* The firmware is available at 

HISTORY
Version:1 (rev.1) - 24 August 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZnewMAAoJELXhAxt7SZaiW6QH/3Zf7Af6Z/yTdD3x5CkgrHX/
FGwCyI+kMFa081Cikv3doscxkrWkTB+Y1TMusixocCEJGDdbSrRKxhE/akaaR22T
kLnFrl5AlMEYqZp/szjuU8EldoBSH3cZq4KPqwLa6EbD40ibexV/MjzfUaT5vVeU
/PrvKA0s1KNVosueJ1M7CXk59C1zJ0weJS3A+4tXp61A58m+31qYRSdAtcgUFhqe
K1sgJ+mYALgqV7QCxc1hDR32m+oekty8CbyUElYk6Jy+izwXIFFc7n7O1nixFbiJ
TGt+VLcl3reQv5xzelsaTxUyj8ZmSzTrpA9Ly0uf+xYObwSZ9RTrRWcDQC73Fww=
=/mQI
-END PGP SIGNATURE-


[security bulletin] HPESB3P03762 rev.1 - HPE C Switch Software using Cisco Prime Data Center Network Manager (DCNM), Remote Code Execution

2017-08-11 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesb3p03762en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesb3p03762en_us
Version: 1

HPESB3P03762 rev.1 - HPE C Switch Software using Cisco Prime Data Center
Network Manager (DCNM), Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-08-10
Last Updated: 2017-08-10

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HPE StoreFabric C-series Switch Software uses Ciscos Prime Data Center
Network Manager (DCNM). Cisco has identified a remote code execution
vulnerability in two versions of Cisco Prime Data Center Network Manager
(DCNM) which HPE had included for download for customers under contract from
the HPE Support Center. The affected versions of DCNM are 10.1(1) and
10.1(2). HPE bundled these DCNM versions with the following MDS and Nexus
firmware downloads:

 * MDS 7.3(0)DY(1), released February 2017
 * MDS 7.3(1)DY(1), released April 2017
 * Nexus 5.2(1)N1(9b), released May 2017

**Note:** A vulnerability in the role-based access control (RBAC)
functionality of Cisco Prime Data Center Network Manager (DCNM) could allow
an unauthenticated, remote attacker to access sensitive information or
execute arbitrary code with root privileges on an affected system. The
vulnerability is due to the lack of authentication and authorization
mechanisms for a debugging tool that was inadvertently enabled in the
affected software. An attacker could exploit this vulnerability by remotely
connecting to the debugging tool via TCP. A successful exploit could allow
the attacker to access sensitive information about the affected software or
execute arbitrary code with root privileges on the affected system.

References:

  - CVE-2017-6639

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP C-series Switch Software Data Center Network Manager Version 10.1(1),
10.1(2)

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-6639
  10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

There are no workarounds that address this vulnerability. Cisco has released
software updates that address this vulnerability with DCNM 10.2(1). HPE has
made the updates available to customers under contract through HPE Support
Center:

 *  

**It is essential that all HPE customers who had previously downloaded any of
the firmware and DCNM packages above download again with the updated packages
from the HPE Support Center.** All packages have been updated to include DCNM
10.2(1), and they are listed here:

 * MDS 7.3(0)DY(1), released June 2017
 * MDS 7.3(1)DY(1), released June 2017
 * Nexus 5.2(1)N1(9b), released June 2017

HISTORY
Version:1 (rev.1) - 11 August 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages 

[security bulletin] HPESB3P03767 rev.1 - HPE Proliant ML10 Gen9 servers using Intel Xeon E3-1200M v5 and 6th Generation Intel Core Processors, Unauthorized Write to Filesystem

2017-08-04 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesb3p03767en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesb3p03767en_us
Version: 1

HPESB3P03767 rev.1 - HPE Proliant ML10 Gen9 servers using Intel Xeon E3-1200M
v5 and  6th Generation Intel Core Processors, Unauthorized Write to
Filesystem

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-08-03
Last Updated: 2017-08-03

Potential Security Impact: Local: Unauthorized Write Access to the File
System; Remote: Unauthorized Write Access to the File System

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security problem has been identified in HPE Proliant ML10 Gen9
server using Intel Xeon E3-1200M v5 and 6th Generation Intel Core Processors.
The vulnerability could allow a remote unauthorized attacker to write to file
systems.

References:

  - CVE-2017-5691 - Intel SGX Update and Attestation Key Recovery

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE ProLiant ML10 Gen9 E3-1225 v5 3.3GHz 4-core 8GB-R 1TB Non-hot Plug
4LFF SATA 300W AP Svr/Promo SP
  - HPE ProLiant ML10 Gen9 E3-1225 v5 4GB-R 1TB Non-hot Plug 4LFF SATA 300W
Svr/S-Buy SP
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 1TB Non-hot Plug 4LFF SATA 300W
Perf Svr SP
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W
Svr/GO SP
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W
Svr/TV SP
  - HPE ProLiant ML10 Gen9 G4400 4GB-R Non-hot Plug 4LFF SATA 300W Entry Svr
SP

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5691
  8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following update:  

 * Update to ML10 Gen 9 BIOS 1.07, which contains the 0xBA microcode update,
will patch the SGX security issue. Available for download at this link:

  - 
  
 
**Note:** Please contact HPE Technical Support if any assistance is needed
with this information.

HISTORY
Version:1 (rev.1) - 4 August 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZg4xWAAoJELXhAxt7SZaijWIH/1bWATsLRK3sL2+urTNKGBnG
gvVj0Oej02UmL1NY2sOeRJGV5ZO7NOvHlw7/+xgVEWaAOnlMgU22FEFOz7pMaSst
MSgLWpraxYkh6uyncQjlaXQKgm+icOT6R/zDOYgw3Wm+GdyTO1eFXVpKGgCiTb24

[security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)

2017-08-02 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03763en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03763en_us
Version: 1

HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote
Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-08-01
Last Updated: 2017-08-01

Potential Security Impact: Remote: Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in Comware 7, IMC, VCX
products using OpenSSL. The vulnerability could be remotely exploited to
allow a denial of service.

References:

  - CVE-2016-2177 - OpenSSL

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware v7 (CW7) Products See resolution section for impacted versions
  - HP Intelligent Management Center (iMC) See resolution section for
impacted versions
  - VCX Products 9.8.19

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-2177
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software updates to resolve the vulnerability
in Comware 7, IMC PLAT, and VCX.  

**Note:** The following products are impacted by this issue

**COMWARE 7 Products**

  + **12500 (Comware 7) - Version: R7377P02**
* HPE Branded Products Impacted
  - JC072B HP 12500 Main Processing Unit
  - JC085A HP A12518 Switch Chassis
  - JC086A HP A12508 Switch Chassis
  - JC652A HP 12508 DC Switch Chassis
  - JC653A HP 12518 DC Switch Chassis
  - JC654A HP 12504 AC Switch Chassis
  - JC655A HP 12504 DC Switch Chassis
  - JF430A HP A12518 Switch Chassis
  - JF430B HP 12518 Switch Chassis
  - JF430C HP 12518 AC Switch Chassis
  - JF431A HP A12508 Switch Chassis
  - JF431B HP 12508 Switch Chassis
  - JF431C HP 12508 AC Switch Chassis
  - JG497A HP 12500 MPU w/Comware V7 OS
  - JG782A HP FF 12508E AC Switch Chassis
  - JG783A HP FF 12508E DC Switch Chassis
  - JG784A HP FF 12518E AC Switch Chassis
  - JG785A HP FF 12518E DC Switch Chassis
  - JG802A HP FF 12500E MPU
   
 
  + **10500 (Comware 7) - Version: R7184**
* HPE Branded Products Impacted
  - JC611A HP 10508-V Switch Chassis
  - JC612A HP 10508 Switch Chassis
  - JC613A HP 10504 Switch Chassis
  - JC748A HP 10512 Switch Chassis
  - JG608A HP FlexFabric 11908-V Switch Chassis
  - JG609A HP FlexFabric 11900 Main Processing Unit
  - JG820A HP 10504 TAA Switch Chassis
  - JG821A HP 10508 TAA Switch Chassis
  - JG822A HP 10508-V TAA Switch Chassis
  - JG823A HP 10512 TAA Switch Chassis
  - JG496A HP 10500 Type A MPU w/Comware v7 OS
  - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating
System
  - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System
Main Processing Unit
   
 
  + **5900/5920 (Comware 7) - Version: R2432**
* HPE Branded Products Impacted
  - JC772A HP 5900AF-48XG-4QSFP+ Switch
  - JG296A HP 5920AF-24XG Switch
  - JG336A HP 5900AF-48XGT-4QSFP+ Switch
  - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
  - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
  - JG555A HP 5920AF-24XG TAA Switch
  - JG838A HP FF 5900CP-48XG-4QSFP+ Switch
  - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
  - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
  - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
   
 
  + **MSR1000 (Comware 7) - Version: R0306P80**
* HPE Branded Products Impacted
  - JG875A HP MSR1002-4 AC Router
  - JH060A HP MSR1003-8S AC Router
   
 
  + **MSR2000 (Comware 7) - Version: R0306P80**
* HPE Branded Products Impacted
  - JG411A HP MSR2003 AC Router
  - JG734A HP MSR2004-24 AC Router
  - JG735A HP MSR2004-48 Router
  - JG866A HP MSR2003 TAA-compliant AC Router
   
 
  + **MSR3000 (Comware 7) - Version: R0306P80**
* HPE Branded Products Impacted
  - JG404A HP MSR3064 Router
  - JG405A HP MSR3044 Router
  - JG406A HP MSR3024 AC Router
  - JG407A HP MSR3024 DC Router
  - JG408A HP MSR3024 PoE Router
  - JG409A HP MSR3012 AC Router
  - JG410A HP MSR3012 DC Router
  - JG861A HP MSR3024 TAA-compliant AC Router
   
 
  + **MSR4000 (Comware 7) - Version: R0306P80**
* HPE Branded Products Impacted
  - JG402A HP MSR4080 Router Chassis
  - JG403A HP MSR4060 Router Chassis
  - JG412A HP MSR4000 MPU-100 

[security bulletin] HPESBGN03766 rev.1 - HPE Project and Portfolio Management (PPM), Remote Cross-Site Scripting

2017-08-02 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03766en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03766en_us
Version: 1

HPESBGN03766 rev.1 - HPE Project and Portfolio Management (PPM), Remote
Cross-Site Scripting

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-08-01
Last Updated: 2017-08-01

Potential Security Impact: Remote: Cross-Site Scripting (XSS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Project and
Portfolio Management(PPM) product. The vulnerability could be exploited to
allow remote cross-site scripting (XSS).

References:

  - CVE-2017-8993 - Remote Cross-Site Scripting (XSS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Project and Portfolio Management Center -v9.30, v9.31, v9.32, v9.40

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8993
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank David Shanahan for reporting
this issue to security-al...@hpe.com

RESOLUTION

HPE has made the following software updates and mitigation information to
resolve this vulnerability in the impacted versions of HPE Project and
Portfolio Management (PPM).

* Please upgrade HPE PMM version 9.3x to HPE PPM version 9.32.0005. Please
refer to KM02781066 article for information on resolving this issue:


* Please upgrade HPE PMM version 9.40 to HPE PPM  to version 9.41. Please
refer to KM02753942 article for information on resolving this issue:


HISTORY
Version:1 (rev.1) - 2 August 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZgNdTAAoJELXhAxt7SZai7kgH/iM2gQxXO7jmfwUWpwXZLzDw
rqqk6PSjeuWutYqtWnJI7u9+2421CEa1Vk5a/twL2erpc5Tw5vg5MLAl9Q+TOpu4
4bJG9HybSHIfQigoGxY26WyD0uwWQvMwf3DwziO2Cx5TULsMoQaG+QVdzGmbPAbk
M6QO+d2r1qN90LVG5mUWWdFpTFzi7QW52Z06GQUHXMJhnUXdTQjMan2KeoduB5wn
+KhKwfcVdA9JueBRYqeTch5bCvmCeIzbcBMaobFLYfiXQBh4n8o8/cl0symcFga2
eTNxKHqw5lTCUa38Oy20yToAd66rg9GieqGIuYnFqYd1S+/lEy8doRzbNdpdPgQ=
=tCRO
-END PGP SIGNATURE-


[security bulletin] HPESBHF03745 rev.3 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution

2017-07-24 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03745en_us
Version: 3

HPESBHF03745 rev.3 - HPE Intelligent Management Center (iMC) PLAT, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-07-22
Last Updated: 2017-07-21

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HPE Intelligent
Management Center (iMC) PLAT. The vulnerabilities could be exploited remotely
to allow execution of code.

References:

  - CVE-2017-5816
  - CVE-2017-5817
  - CVE-2017-5818
  - CVE-2017-5819
  - CVE-2017-8956 - ZDI-CAN-4368

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Intelligent Management Center (iMC) All versions prior to IMC PLAT 7.3
E0504P04 - Please refer to the RESOLUTION below for a list of impacted
products. 

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5816
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2017-5817
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2017-5818
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVE-2017-5819
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2017-8956
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks sztivi for working with Trend Micro's Zero
Day Initiative (ZDI) for reporting these vulnerabilities to
security-al...@hpe.com

RESOLUTION

HPE has made the following software update available to resolve the
vulnerabilities in the iMC PLAT network products listed. 

  + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0504P04**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU

**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY

Version:1 (rev.1) - 11 May 2017 Initial release

Version:2 (rev.2) - 26 June 2017 Adding ZDI-CAN-4368 to Security Bulletin.

Version:3 (rev.3) - 21 July 2017 Amended incorrect CVE number


Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com


[security bulletin] HPESBHF03766 rev.1 - HPE ConvergedSystem 700 Solution with Comware v5 Switches using NTP, Remote Denial of Service (DoS), Unauthorized Modification and Local Denial of Service (DoS

2017-07-21 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03766en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03766en_us
Version: 1

HPESBHF03766 rev.1 - HPE ConvergedSystem 700 Solution with Comware v5
Switches using NTP, Remote Denial of Service (DoS), Unauthorized Modification
and Local Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-07-20
Last Updated: 2017-07-20

Potential Security Impact: Local: Denial of Service (DoS); Remote: Denial of
Service (DoS), Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities with NTP have been addressed for HPE
network products including Comware 5 used in certain ConvergedSystem 700
solutions. The vulnerabilities could be remotely exploited resulting in
Denial of Service (DoS) or unauthorized modification, or locally exploited
resulting in Denial of Service (DoS).

References:

  - CVE-2015-7973 - ntp
  - CVE-2015-7974 - ntp
  - CVE-2015-7975 - ntp
  - CVE-2015-7979 - ntp
  - CVE-2015-8138 - ntp
  - CVE-2015-8158 - ntp

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP ConvergedSystem 700 1.0
  - HP ConvergedSystem 700 for Virtualization 1.0
  - HP ConvergedSystem 700x 1.0
  - HP ConvergedSystem 700x for Microsoft Solution Kit 1.0
  - HP ConvergedSystem 700x for VMware Solution Kit 1.0
  - HP ConvergedSystem 700x Solution Kit 1.0

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-7973
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)

CVE-2015-7974
  3.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
  2.1 (AV:N/AC:H/Au:S/C:N/I:P/A:N)

CVE-2015-7975
  4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-7979
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-8138
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVE-2015-8158
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE recommends upgrading your network switches to Comware v5 Version R2221P30
that are part of the HP ConvergedSystem 700 Solution as listed below:

* CS700/CS700x  1.0:

  + HPN 5120 EI Switch (JE068A)

* HPE has provided the following Customer Notice that includes links to
documentation to assist you in maintaining your HPE ConvergedSystem 700
solution:

  +


**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 21 July 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages 

[security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege

2017-06-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03761en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03761en_us
Version: 1

HPESBGN03761 rev.1 -  HPE Virtualization Performance Viewer (VPV)/ Cloud
Optimizer using Linux, Remote Escalation of Privilege

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-06-15
Last Updated: 2017-06-15

Potential Security Impact: Remote: Escalation of Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in Linux kernel, also known as "Dirty COW", has been
addressed in HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer 
Virtual appliance. This vulnerability could be exploited remotely to allow
escalation of privilege.

References:

  - CVE-2016-5195 - Linux kernel vulnerability, "Dirty COW" 

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Cloud Optimizer - v1.10,  v1.20, v2.0, v2.01, v2.10, v2.20/ CO 
v3.0, v3.01

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-5195
  7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE Virtualization Performance
Viewer (VPV)/ Cloud Optimizer  Virtual appliance:

1. Login to the system, execute the following commands with root privileges:
2. Stop ovc processes: ovc stop
3. Stop vertica db: su pv_vertica -c "/opt/vertica/bin/adminTools -t stop_db
- -d pv -i -F"
4. Update the system: yum update kernel
5. Reboot the server: /sbin/shutdown -r now

HISTORY
Version:1 (rev.1) - 15 June 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZQweXAAoJELXhAxt7SZaikrcH+wZHrLkGoqCudUrO+VrUuNQU
UO3wgX156G/CaS+YDaW88FMzKCh0dJt24+eAR3ldSqoxH+SOJvtYAwG4wFr9h9Bg
jUbkZufOUmrumMTmdtC5j0u6iKnb8CzjBqJkzo63RZCkiNCcdZDxPqpScazLLH53
m7ZJyUTMLZcDACGM6lGVy68B47lJXWVYuxemasja+raQnWGDyLQCEF3GbyJDzgIZ
S/oDDL7UkLuCzY2XftXAub1NIEzVoOcY4NGd/whk30827jh+LtpGo+3vzcsr/a9u
hct16bQLLLBaI8gwI4mzeATERaGNKNu6ONwnML99gridZhEMPlUIiJzwrkuk0CM=
=dNr0
-END PGP SIGNATURE-


[security bulletin] HPESBHF03730 rev.2 - HPE Aruba ClearPass Policy Manager, Multiple Vulnerabilities

2017-06-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03730en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03730en_us
Version: 2

HPESBHF03730 rev.2 - HPE Aruba ClearPass Policy Manager, Multiple
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-06-09
Last Updated: 2017-06-09

Potential Security Impact: Remote: Access Restriction Bypass, Arbitrary
Command Execution, Cross-Site Scripting (XSS), Disclosure of Information,
Escalation of Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HPE Aruba
ClearPass Policy Manager. The vulnerabilities could be remotely exploited to
allow access restriction bypass, arbitrary command execution, cross site
scripting (XSS), escalation of privilege and disclosure of information.

References:

  - PSRT110521
  - CVE-2017-5824 - unauthenticated remote Code Execution
  - CVE-2017-5825 - privilege escalation
  - CVE-2017-5826 - authenticated Remote Code Execution
  - CVE-2017-5827 - reflected XSS
  - CVE-2017-5828 - arbitrary command execution via Xml External entity (XXE)
  - CVE-2017-5829 - access restriction bypass
  - CVE-2017-5647 - Apache Tomcat, information disclosure

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Aruba ClearPass Enterprise Software  - All ClearPass 6.6.x versions
without hotfix patch for CVE-2017-5647/CVE-2017-5824/CVE-2017-5829 applied

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5647
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE-2017-5824
  8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

CVE-2017-5825
  5.0 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)

CVE-2017-5826
  5.0 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)

CVE-2017-5827
  4.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
  4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)

CVE-2017-5828
  4.2 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
  3.6 (AV:N/AC:H/Au:S/C:P/I:P/A:N)

CVE-2017-5829
  3.6 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
  2.6 (AV:L/AC:H/Au:N/C:P/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank the following researchers for
reporting issues to security-al...@hpe.com:  

 * Luke Young (@TheBoredEng) for reporting CVE-2017-5824 through the BugCrowd
managed bug bounty program.
 * Luke Young (@TheBoredEng) for reporting CVE-2017-5825 through the BugCrowd
managed bug bounty program.
 * "fmast" for reporting CVE-2017-5826 through the BugCrowd BugCrowd managed
bug bounty program.
 * Phil Purviance (@superevr) of Bishop Fox for reporting CVE-2017-5827.
 * V. Harishkumar (@harishkumar0394) for reporting CVE-2017-5828 through the
BugCrowd managed bug bounty program.
 * Luke Young (@TheBoredEng) for reporting CVE-2017-5829 through the BugCrowd
managed bug bounty program.

RESOLUTION

HPE Aruba has provided the following resolution - Upgrade to ClearPass Policy
Manager version 6.6.5 and then apply an additional hotfix. ClearPass 6.6.5
was released on March 30, 2017 and an updated version was released April 12,
2017. The additional hotfix is applicable to both versions of ClearPass 6.6.5
and was released on May 24, 2017.  All future releases of ClearPass will
include these fixes when released. 

Installing the Patch Online Using the Software Updates Portal:  

  1. Open ClearPass Policy Manager and go to `Administration - Agents and
Software Updates - Software Updates`.  
  2. In the Firmware and Patch Updates area, find the "ClearPass Cumulative
Patch 5 for 6.6.0, 6.6.1, 6.6.2, 6.6.3 and 6.6.4" and click the Download
button in its row.  
  3. Click Install.  
  4. When the installation is complete and the status is shown as "Needs
Restart", proceed to restart ClearPass. After reboot, the status for the
patch will be shown as Installed in `Administration - Agents and Software
Updates - Software Updates page`.  
  5. While in the Firmware and Patch Updates area, find the "ClearPass 6.6.5
Hotfix Patch for CVE-2017-5647, CVE-2017-5824, and CVE-2017-5829" and click
the Download button in its row.  
  6. Click Install.  
  7. When the installation is complete and the status is shown as "Needs
Restart", proceed to restart ClearPass. After reboot, the status for the
patch will be shown as Installed. The ClearPass Policy Manager version number
will not change.  

Installing the 

[security bulletin] HPESBUX03759 rev.1 - HP-UX CIFS Sever using Samba, Multiple Remote Vulnerabilities

2017-06-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux03759en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbux03759en_us
Version: 1

HPESBUX03759 rev.1 - HP-UX CIFS Sever using Samba, Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-06-09
Last Updated: 2017-06-09

Potential Security Impact: Remote: Authentication Bypass, Code Execution,
Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HPE HP-UX CIFS
server using Samba. The vulnerabilities can be exploited remotely to allow
authentication bypass, code execution, and unauthorized access.

References:

  - CVE-2017-7494 - Samba, remote code execution

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP-UX Common Internet File System (CIFS), Client/Server Software HPE CIFS
SERVER B.04.05.03.00 and all versions of HPE CIFS SERVER A.03.02.xx

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-7494
  8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following mitigation:

* Add the below parameter to the [global] section of smb.conf file and
restart smbd. This prevents clients from accessing any named pipe endpoints.

nt pipe support = no

**Note:** This can disable some expected functionality for Windows clients.

HISTORY
Version:1 (rev.1) - 9 June 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZOtOHAAoJELXhAxt7SZai2kYIAIq5f+yi5ZDesQLzJ7L/btL6
G4f42v5ucL9E2SIoUp3kZ5zGxg5XupjBHYVS8e2toWIC9ha758zyFWwQUxY+0DTn
KCd9+GztfySDnXVluTDd+or90ikVImEYcQBtrsB1TwhF14GIVOkVupyaGeGeQR3/
DL33h3r04ELLxswKTPc76esasvOcPgV25oEUhgqK3k74qGknEXPakjBSAhl+MGKl
HSpc5cjJYg4RJ3/UeZ9A72Z16lj3ipTWAJtma2VaPYcjRYwS9PTHiXqZV2ZLwo9Y
yN1w3u+tVzYHebbEj8q1IfS3u50wOFJLSrpy54AdpTw9T58e/ALmIx7svDQ6Q+s=
=hhpe
-END PGP SIGNATURE-


[security bulletin] HPESBUX03747 rev.1 - HP-UX running BIND, Remote Denial of Service

2017-06-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux03747en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbux03747en_us
Version: 1

HPESBUX03747 rev.1 - HP-UX running BIND, Remote Denial of Service

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-06-08
Last Updated: 2017-06-08

Potential Security Impact: Remote: Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in the HP-UX BIND
service running named. These vulnerabilities could be exploited remotely to
create a Denial of Service (DoS).

References:

  - CVE-2017-3135 - BIND
  - CVE-2017-3136 - BIND

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP-UX DNS and BIND Software B.11.31 - BIND 9.9.4 prior to C.9.9.4.10.0

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-3135
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVE-2017-3136
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  5.4 (AV:N/AC:H/Au:N/C:N/I:N/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software updates to resolve the vulnerability
in the HP-UX BIND service running named.

BIND 9.9.4 for HP-UX Release B.11.31 (PA and IA)
Depot: HP_UX_11.31_HPUX-NameServer_C.9.9.4.10.0_HP-UX_B.11.31_IA_PA.depot  

**Note:**

 * The depot files can be found here:


MANUAL ACTIONS: Yes - Update 
Download and install the software update 
PRODUCT SPECIFIC INFORMATION 
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application

that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins 
issued by HPE and lists recommended actions that may apply to a specific
HP-UX 
system. It can also download patches and create a depot automatically. For
more information 
see:


The following text is for use by the HP-UX Software Assistant.   


AFFECTED VERSIONS
HP-UX B.11.31 IA/PA 
=== 
NameService.BIND-AUX 
NameService.BIND-RUN 
action: install C.9.9.4.10.0 or subsequent
END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 8 June 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1


[security bulletin] HPESBGN03758 rev.1 - HPE UCMDB, Remote Code Execution

2017-06-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03758en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03758en_us
Version: 1

HPESBGN03758 rev.1 - HPE UCMDB, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-06-07
Last Updated: 2017-06-07

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE UCMDB. The
vulnerability could be remotely exploited to allow execution of code.

References:

  - CVE-2017-8947 - Remote Code Execution

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP UCMDB Configuration Manager Software - v10.10, v10.11, v10.20, v10.21,
v10.22, v10.30, v10.31

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8947
  10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates and mitigation information to
resolve the vulnerability in HPE UCMDB:

*


HISTORY
Version:1 (rev.1) - 7 June 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZOGFgAAoJELXhAxt7SZaipIIH/1lZSyggi7jUTT/o6x9yTQ5Y
ff4ezjZuNNLl54SxUUPcEUbW/3+eyEQp7aMkCIoq3bDbitqxC8hcnlltIDqIFubf
cKqLJ/il+UaexMU9aVIxyL0l8mf0pG8oGRmOy8PLGo8a/vEelorSoBdpz7O1Mjzs
waFuQPNrDSqnfTOd8EiSz6CSzAdMfZFiAjI4ZWPdtuSIqXtwpX6qSktSlWcV3mNT
F653ZIfJmmbPwjcXC3+8V7CN63Kn22FXDtLU+prCU8BPHjQTeN7g+f0pmmUisIsK
crG8wQHzZjQG/A90L6kogXYtRcFes0bvTJ6RS2gLzUh1VJ+F/IiAABE4ZIyUezw=
=eRh7
-END PGP SIGNATURE-


[security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)

2017-06-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03757en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03757en_us
Version: 1

HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7
running NTP, Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-06-07
Last Updated: 2017-06-07

Potential Security Impact: Remote: Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities with NTP have been addressed for HPE
network products including Comware 5 and Comware 7. The vulnerabilities could
be remotely exploited resulting in Denial of Service (DoS).

References:

  - CVE-2016-4953 - Remote Denial of Service (DoS)
  - CVE-2016-4954 - Remote Denial of Service (DoS)
  - CVE-2016-4956 - Remote Denial of Service (DoS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware v7 (CW7) Products All versions - Please refer to the RESOLUTION
below for a list of updated products. 
  - Comware v5 (CW5) Products All versions - Please refer to the RESOLUTION
below for a list of updated products. 

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4953
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2016-4954
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2016-4956
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates available to resolve the
vulnerabilities in Comware 5 and Comware 7 products running NTP.

**COMWARE 5 Products**

  + 8800 - Version: R3627P06
* HP Network Products
  - JC137A HP 8805/8808/8812 (2E) Main Control Unit Module
  - JC138A HP 8805/8808/8812 (1E) Main Control Unit Module
  - JC141A HP 8802 Main Control Unit Module
  - JC147A HP 8802 Router Chassis
  - JC147B HP 8802 Router Chassis
  - JC148A HP 8805 Router Chassis
  - JC148B HP 8805 Router Chassis
  - JC149A HP 8808 Router Chassis
  - JC149B HP 8808 Router Chassis
  - JC150A HP 8812 Router Chassis
  - JC150B HP 8812 Router Chassis
  - JC596A HP 8800 Dual Fabric Main Processing Unit
  - JC597A HP 8800 Single Fabric Main Processing Unit
* CVEs
  - CVE-2016-4954
  + A6600 (Comware 5) - Version: R3303P31
* HP Network Products
  - JC165A HP 6600 RPE-X1 Router Module
  - JC177A HP 6608 Router
  - JC177B HP 6608 Router Chassis
  - JC178A HP 6604 Router Chassis
  - JC178B HP 6604 Router Chassis
  - JC496A HP 6616 Router Chassis
  - JC566A HP 6600 RSE-X1 Router Main Processing Unit
  - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
  - JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit
* CVEs
  - CVE-2016-4954
  + HSR6602 (Comware 5) - Version: R3303P31
* HP Network Products
  - JC176A HP 6602 Router Chassis
  - JG353A HP HSR6602-G Router
  - JG354A HP HSR6602-XG Router
  - JG355A HP 6600 MCP-X1 Router Main Processing Unit
  - JG356A HP 6600 MCP-X2 Router Main Processing Unit
  - JG776A HP HSR6602-G TAA-compliant Router
  - JG777A HP HSR6602-XG TAA-compliant Router
  - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
* CVEs
  - CVE-2016-4954
  + HSR6800 (Comware 5) - Version: R3303P31
* HP Network Products
  - JG361A HP HSR6802 Router Chassis
  - JG361B HP HSR6802 Router Chassis
  - JG362A HP HSR6804 Router Chassis
  - JG362B HP HSR6804 Router Chassis
  - JG363A HP HSR6808 Router Chassis
  - JG363B HP HSR6808 Router Chassis
  - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
  - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
* CVEs
  - CVE-2016-4954
  + MSR20 (Comware 5) - Version: R2516P06
* HP Network Products
  - JD432A HP A-MSR20-21 Router
  - JD662A HP MSR20-20 Router
  - JD663A HP A-MSR20-21 Router
  - JD663B HP MSR20-21 Router
  - JD664A HP MSR20-40 Router
  - JF228A HP MSR20-40 Router
  - JF283A HP MSR20-20 Router
* CVEs
  - CVE-2016-4954
  + MSR20-1X  (Comware 5) - Version: R2516P06
* HP Network Products
  - JD431A HP MSR20-10 Router
  - JD667A HP MSR20-15 IW Multi-Service Router
  - JD668A HP MSR20-13 Multi-Service Router
  - JD669A HP MSR20-13 W Multi-Service Router
  - JD670A HP MSR20-15 A Multi-Service Router
  - 

[security bulletin] HPESBGN03752 rev.1 - HPE IceWall using OpenSSL, remote Denial of Service (DoS)

2017-06-06 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03752en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03752en_us
Version: 1

HPESBGN03752 rev.1 - HPE IceWall using OpenSSL, remote Denial of Service
(DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-26
Last Updated: 2017-05-26

Potential Security Impact: Remote: Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability in the OpenSSL Library may impact HPE
IceWall products. The vulnerability could be remotely exploited to allow
denial of service (DoS).

References:

  - CVE-2016-7055 - OpenSSL

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - IceWall SSO Dfw 10.0 (HP-UX 11i v3) - using OpenSSL
  - IceWall SSO certd 10.0 (HP-UX 11i v3) - using OpenSSL
  - IceWall MCRP 3.0 (HP-UX 11i v3) - using OpenSSL

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-7055
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE recommends applying the latest OS vendor security patches for OpenSSL
package to resolve the vulnerability in the impacted versions of the IceWall
products.

For questions about this resolution, please contact product support.

HISTORY
Version:1 (rev.1) - 26 May 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZKGuGAAoJELXhAxt7SZai/f4IAL6MXZdojEXvjslwCb5HmO1M
fNNbzUoWjDvUPOt31NtO35z8ZywyLoMuoumaTthWhDDxYmRWiWaaOykBrWxgsboB
EX1gUIRTn49ahvyNpIWTVHwcrK9WqbZh19Q77VrVdZp2FskRVCgUAFKCFLRbRU+1
KvaOcujHc1EJc2CsyVwrs3D3EAoJQszzvZfknfh+lNKDh+jA7w0K3q1YTj+UkqRg
xXBHd6h3ULVRu0r5IzvTWoHGTuafbxMAutAFTIg2ByzET8uCzEXGZ7VQ2JruvgLQ
RZXaJILEQ8ydsuWxxNUMyN1WFHImtkB4s6uhkuKU8TwsKkflpGyMMo+q+joWXYk=
=x9+3
-END PGP SIGNATURE-


[security bulletin] HPESBHF03756 rev.1 - HPE Network Products including Comware 7, iMC, and VCX running OpenSSL, Remote Denial of Service (DoS), Disclosure of Sensitive Information

2017-06-06 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03756en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03756en_us
Version: 1

HPESBHF03756 rev.1 -  HPE Network Products including Comware 7, iMC, and VCX
running OpenSSL, Remote Denial of Service (DoS), Disclosure of Sensitive
Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-06-05
Last Updated: 2017-06-05

Potential Security Impact: Remote: Denial of Service (DoS), Disclosure of
Sensitive Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities with OpenSSL have been addressed for HPE
network products including Comware 7, iMC, and VCX. The vulnerabilities could
be remotely exploited resulting in Denial of Service (DoS) or disclosure of
sensitive information.

References:

  - CVE-2016-2105 - Remote Denial of Service (DoS)
  - CVE-2016-2106 - Remote Denial of Service (DoS)
  - CVE-2016-2107 - Remote disclosure of sensitive information
  - CVE-2016-2108 - Remote Denial of Service (DoS)
  - CVE-2016-2109 - Remote Denial of Service (DoS)
  - CVE-2016-2176 - Remote Denial of Service (DoS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - VCX Products All versions - Please refer to the RESOLUTION below for a
list of updated products. 
  - Comware v7 (CW7) Products All versions - Please refer to the RESOLUTION
below for a list of updated products. 
  - HP Intelligent Management Center (iMC) All versions - Please refer to the
RESOLUTION below for a list of updated products. 

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-2105
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-2106
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-2107
  3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVE-2016-2108
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2016-2109
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVE-2016-2176
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
  6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates available to resolve the
vulnerabilities in the Comware 7, iMC and VCX products running OpenSSL. 

**COMWARE 7 Products**

  + 12500 (Comware 7) - Version: R7377P02
* HP Network Products
  - JC072B HP 12500 Main Processing Unit
  - JC085A HP A12518 Switch Chassis
  - JC086A HP A12508 Switch Chassis
  - JC652A HP 12508 DC Switch Chassis
  - JC653A HP 12518 DC Switch Chassis
  - JC654A HP 12504 AC Switch Chassis
  - JC655A HP 12504 DC Switch Chassis
  - JF430A HP A12518 Switch Chassis
  - JF430B HP 12518 Switch Chassis
  - JF430C HP 12518 AC Switch Chassis
  - JF431A HP A12508 Switch Chassis
  - JF431B HP 12508 Switch Chassis
  - JF431C HP 12508 AC Switch Chassis
  - JG497A HP 12500 MPU w/Comware V7 OS
  - JG782A HP FF 12508E AC Switch Chassis
  - JG783A HP FF 12508E DC Switch Chassis
  - JG784A HP FF 12518E AC Switch Chassis
  - JG785A HP FF 12518E DC Switch Chassis
  - JG802A HP FF 12500E MPU
* CVEs
  - CVE-2016-2105
  - CVE-2016-2106
  - CVE-2016-2107
  - CVE-2016-2108
  - CVE-2016-2109
  - CVE-2016-2176
  + 10500 (Comware 7) - Version: R7184
* HP Network Products
  - JC611A HP 10508-V Switch Chassis
  - JC612A HP 10508 Switch Chassis
  - JC613A HP 10504 Switch Chassis
  - JC748A HP 10512 Switch Chassis
  - JG608A HP FlexFabric 11908-V Switch Chassis
  - JG609A HP FlexFabric 11900 Main Processing Unit
  - JG820A HP 10504 TAA Switch Chassis
  - JG821A HP 10508 TAA Switch Chassis
  - JG822A HP 10508-V TAA Switch Chassis
  - JG823A HP 10512 TAA Switch Chassis
  - JG496A HP 10500 Type A MPU w/Comware v7 OS
  - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating
System
  - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System
Main Processing Unit
* CVEs
  - CVE-2016-2105
  - CVE-2016-2106
  - CVE-2016-2107
  - CVE-2016-2108
  - CVE-2016-2109
  - CVE-2016-2176
  + 5900/5920 (Comware 7) - Version: R2422P02
* HP Network Products
  - JC772A HP 5900AF-48XG-4QSFP+ Switch
  - JG296A HP 5920AF-24XG Switch
  - JG336A HP 5900AF-48XGT-4QSFP+ Switch
 

[security bulletin] HPESBHF03754 rev.1 - HPE ML10 Gen 9 Server using Intel Xeon E3-1200 v5 Processor, Remote Access Restriction Bypass

2017-05-26 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03754en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03754en_us
Version: 1

HPESBHF03754 rev.1 -  HPE ML10 Gen 9 Server using Intel Xeon E3-1200 v5
Processor, Remote Access Restriction Bypass

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-26
Last Updated: 2017-05-26

Potential Security Impact: Remote: Access Restriction Bypass

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE ML10 Gen 9
Server using Intel Xeon E3-1200 v5 Processor. The vulnerability could be
remotely exploited to allow access restriction bypass.

**Note:**
On May 1st, 2017, Intel disclosed a new vulnerability with their Intel
Manageability Firmware which is utilized on some systems containing Intel
processors. This vulnerability allows an unprivileged network or local
attacker to gain control of the remote manageability features of Intel Active
Management Technology (AMT), Intel Standard Manageability (ISM), and Intel
Small Business Technology (SBT) platforms.  Do not attempt to upgrade the ME
FW without following the instructions detailed in the Resolution section.
Refer to the "Platform Specific Information" section in the Resolution for
more specific information on upgrades for specific ProLiant servers.

References:

  - CVE-2017-5689

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE ProLiant ML10 Gen9 E3-1225 v5 3.3GHz 4-core 8GB-R 1TB Non-hot Plug
4LFF SATA 300W AP Svr/Promo Gen9
  - HPE ProLiant ML10 Gen9 E3-1225 v5 4GB-R 1TB Non-hot Plug 4LFF SATA 300W
Svr/S-Buy Gen9
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 1TB Non-hot Plug 4LFF SATA 300W
Perf Svr Gen9
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W
Svr/GO Gen9
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W
Svr/TV Gen9

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5689
  8.1 CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
  6.2 (AV:L/AC:H/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following resolution for this issue:   

**Note:** Only the ProLiant Gen9 server detailed in the impacted product
information above can be upgraded using the procedure described in this
document. Before beginning the upgrade process, the server must have Intel
Xeon E3-1200 v5 processors installed. See below for further instructions.  

Upgrade to the latest System ROM available for the platform prior to
upgrading the ME is required. System ROM will need 1.06 version or later to
support this ME firmware.   

The system ROM toolkit and firmware image can be found at:

 * BIOS 1.06 (Windows)
  

* BIOS 1.06 (Linux 6)
  

 * BIOS 1.06 (Linux 7)


The ME toolkit and firmware image can be found at:

 * ME 11.6.27.3264 (Windows)


* ME 11.6.27.3264 (UEFI)


HISTORY
Version:1 (rev.1) - 26 May 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following 

[security bulletin] HPESBHF03750 rev.1 - HPE Network Products including Comware 5, Comware 7 and VCX running NTP, Remote Denial of Service (DoS), Unauthorized Modification, Local Denial of Service (Do

2017-05-26 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03750en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03750en_us
Version: 1

HPESBHF03750 rev.1 - HPE Network Products including Comware 5, Comware 7 and
VCX running NTP, Remote Denial of Service (DoS), Unauthorized Modification,
Local Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-25
Last Updated: 2017-05-25

Potential Security Impact: Local: Denial of Service (DoS); Remote: Denial of
Service (DoS), Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities with NTP have been addressed for HPE
network products including Comware 5, Comware 7 and VCX. The vulnerabilities
could be remotely exploited resulting in Denial of Service (DoS) or
unauthorized modification, or locally exploited resulting in Denial of
Service (DoS).

References:

  - CVE-2015-7973 - Remote unauthorized modification, Denial of Service (DoS)
  - CVE-2015-7974 - Remote unauthorized modification 
  - CVE-2015-7975 - Local Denial of Service (DoS)
  - CVE-2015-7979 - Remote Denial of Service (DoS)
  - CVE-2015-8138 - Remote unauthorized modification 
  - CVE-2015-8158 - Remote Denial of Service (DoS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware v5 (CW5) Products All versions  - Please refer to the RESOLUTION
below for a list of updated products. 
  - Comware v7 (CW7) Products All versions  - Please refer to the RESOLUTION
below for a list of updated products. 
  - VCX Products All versions  - Please refer to the RESOLUTION below for a
list of updated products. 

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-7973
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)

CVE-2015-7974
  3.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
  2.1 (AV:N/AC:H/Au:S/C:N/I:P/A:N)

CVE-2015-7975
  4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-7979
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-8138
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVE-2015-8158
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates available to resolve the
vulnerabilities in the Comware and VCX products running NTP. 

**COMWARE 5 Products**

  + A6600 (Comware 5) - Version: R3303P31
* HP Network Products
  - JC165A HP 6600 RPE-X1 Router Module
  - JC177A HP 6608 Router
  - JC177B HP 6608 Router Chassis
  - JC178A HP 6604 Router Chassis
  - JC178B HP 6604 Router Chassis
  - JC496A HP 6616 Router Chassis
  - JC566A HP 6600 RSE-X1 Router Main Processing Unit
  - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
  - JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit
* CVEs
  - CVE-2015-7973
  - CVE-2015-7974
  + HSR6602 (Comware 5) - Version: R3303P31
* HP Network Products
  - JC176A HP 6602 Router Chassis
  - JG353A HP HSR6602-G Router
  - JG354A HP HSR6602-XG Router
  - JG355A HP 6600 MCP-X1 Router Main Processing Unit
  - JG356A HP 6600 MCP-X2 Router Main Processing Unit
  - JG776A HP HSR6602-G TAA-compliant Router
  - JG777A HP HSR6602-XG TAA-compliant Router
  - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
* CVEs
  - CVE-2015-7973
  - CVE-2015-7974
  + HSR6800 (Comware 5) - Version: R3303P31
* HP Network Products
  - JG361A HP HSR6802 Router Chassis
  - JG361B HP HSR6802 Router Chassis
  - JG362A HP HSR6804 Router Chassis
  - JG362B HP HSR6804 Router Chassis
  - JG363A HP HSR6808 Router Chassis
  - JG363B HP HSR6808 Router Chassis
  - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
  - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
* CVEs
  - CVE-2015-7973
  - CVE-2015-7974
  + MSR20 (Comware 5) - Version: R2516P06
* HP Network Products
  - JD432A HP A-MSR20-21 Router
  - JD662A HP MSR20-20 Router
  - JD663A HP A-MSR20-21 Router
  - JD663B HP MSR20-21 Router
  - JD664A HP MSR20-40 Router
  - JF228A HP MSR20-40 Router
  - JF283A HP MSR20-20 Router
* CVEs
  - CVE-2015-7973
  - CVE-2015-7974
  + MSR20-1X  (Comware 5) - Version: R2516P06
* HP Network 

[security bulletin] HPESBHF03751 rev.1 - HPE Aruba AirWave Glass, Remote Code Execution

2017-05-24 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03751en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03751en_us
Version: 1

HPESBHF03751 rev.1 - HPE Aruba AirWave Glass, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-24
Last Updated: 2017-05-24

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential vulnerability in HPE Aruba AirWave Glass 1.0.0 and 1.0.1 could be
remotely exploited to allow remote code execution.

References:

  - CVE-2017-8946 - remote code execution

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Aruba Airwave Software Glass v1.0.0 and 1.0.1 - Only AirWave Glass is
affected; standard AirWave is not

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8946
  7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:H
  6.6 (AV:N/AC:H/Au:N/C:P/I:P/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE Aruba has provided the resolution to the vulnerability via AirWave Glass
version 1.0.1-1. 

A new OVA file is available from , or the
system may be upgraded within the application through the administrative
interface.  Because an existing compromise may be difficult to detect,
**Aruba strongly recommends downloading the OVA file and deploying a fresh
installation of the product.**

 **Note:** Please contact product support for questions about this
resolution.

HISTORY
Version:1 (rev.1) - 25 May 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZJf+qAAoJELXhAxt7SZai+J4H/jPoUjnB/wIUrNGEcVSsXHeD
rnic9ssIXsVT3mO3u/d5aKOyUCcBY7GRxbl3UMLe+SOOCB5uo2gAtcdbwOMN3N6N
xHcg7M+B30C9oTG3gFTtHOm3bQmYSfzn6UwyfLXztPUaI7T0ixZRMatGVKh1N45D
t6kkm0qePRt9RYjtxZAlbJIzW9GgtLUdYaK/EXZLsZEYTFTGF9iLAR2mCKiolQdv
jjUW7erZnzawGaIJXEWMwkdUrI+vTqVAmQzkXlbHuMTb/4mLAv0L+/n86IaDB2Yh
kc5UBuUQIXfvVr1Ojuzz9YAvgVUoo29SG8FGDp9A+LVIBAZu06BkaR1oBN9zqrY=
=Yz/6
-END PGP SIGNATURE-


[security bulletin] HPESBGN03748 rev.1 - HPE Cloud Optimizer, Remote Disclosure of Information

2017-05-19 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03748en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03748en_us
Version: 1

HPESBGN03748 rev.1 - HPE Cloud Optimizer, Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-18
Last Updated: 2017-05-18

Potential Security Impact: Remote: Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Cloud
Optimizer. The vulnerability could be remotely exploited resulting in
disclosure of information.

References:

  - CVE-2017-8944 - remote disclosure of information

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Cloud Optimizer v3.0x

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-8944
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Company thanks rgod working with Trend Micro's Zero Day
Initiative for reporting this issue to security-al...@hpe.com

RESOLUTION

HPE has made the following software updates and mitigation information
available to resolve the vulnerability in the impacted versions of HPE Cloud
Optimizer.

Please upgrade to Cloud Optimizer v3.01 and then install to latest patch
using the links below:
 
* For Installer:

 
* Using Specified Repository (using .zip) for Virtual Appliance:

 
* Using CD-ROM Updates (using .iso) for Virtual Appliance:

 
*Note:* For versions prior to v3.01, please first upgrade to v3.01 as
mentioned in the Chapter 4 of the product installation guide - "Upgrading
Earlier Versions to HPE Cloud Optimizer 3.01".

HISTORY
Version:1 (rev.1) - 18 May 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZHfGvAAoJELXhAxt7SZaiuSkH/0AwC9HdLkZMwggcr/5rF+yW
czeLZc6JU3MUNg1pzNSIF8vA7lUlS9WJSgby4v0/MO0FL3wbZovvffA8kNiZPI2T
12Ep3/MWDaRwPab8gtqeHEF4bq+WFu+7YLQkY8PpHajByJc7x8gpJ2JVKkF3/LPq
FUqNO+dx7agVpshdKVTYfZMfCo2SZV9/FKPwm851TpB4167uLcuU7qjsaW5uCddh

[security bulletin] HPESBHF03745 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution

2017-05-15 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03745en_us
Version: 1

HPESBHF03745 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-14
Last Updated: 2017-05-14

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HPE Intelligent
Management Center (iMC) PLAT. The vulnerabilities could be exploited remotely
to allow execution of code.

References:

  - CVE-2017-5816
  - CVE-2017-5817
  - CVE-2017-5818
  - CVE-2017-5819

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Intelligent Management Center (iMC) All version prior to IMC PLAT 7.3
E0504P04 - Please refer to the RESOLUTION below for a list of impacted
products. 

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5816
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2017-5817
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2017-5818
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVE-2017-5819
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks sztivi for working with Trend Micro's Zero
Day Initiative (ZDI) for reporting these vulnerabilities to
security-al...@hpe.com

RESOLUTION

HPE has made the following software update available to resolve the
vulnerabilities in the iMC PLAT network products listed. 

  + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0504P04**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU

**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 11 May 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive


[security bulletin] HPESBST03739 rev.1 - HPE StoreFabric B-series Switches, Remote Elevation of Privilege

2017-05-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbst03739en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbst03739en_us
Version: 1

HPESBST03739 rev.1 - HPE StoreFabric B-series Switches, Remote Elevation of
Privilege

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-04
Last Updated: 2017-05-04

Potential Security Impact: Remote: Elevation of Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability with Brocade Fabric OS (FOS) has been
addressed in HPE StoreFabric B-series Switches. The vulnerability could be
remotely exploited to allow an authenticated attacker to elevate the
privileges of user accounts.

References:

  - Brocade Security Advisory ID: BSA-2017-208 - All Brocade Fibre Channel
SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d
and v8.0.1b.
  - CVE-2016-8202

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - StoreFabric B-series Switches - All versions prior to FOS v7.4.1d and
v8.0.1b

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-8202
  8.3 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
  8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software update information available to resolve
the vulnerability in HPE StoreFabric B-series Switches running Brocade Fabric
OS (FOS).

- - FOS v7.4.1d and FOS v8.0.1b or later have hardened the command line
interfaces by tightening access permissions and removed commands that
potentially can be used to poke and exploit the CLI to gain unauthorized
privileges.
- - HPE StoreFabric B-series Switches should update to FOS v7.4.1d, v8.0.1b or
later.
   
**NOTE:** The B-series switch streams list all the currently active FOS
versions. For the latest productsupport information, see the HPE Single
Point of Connectivity Knowledge (SPOCK) website. A valid HPE Passport account
is required to access this website:



HISTORY
Version:1 (rev.1) - 4 May 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZC2djAAoJELXhAxt7SZaiWE4H/2rXH73B6pVmM09pZyef8yZM
x5/bkITU4wxjxfV+h8LWFZMsOj7WL7g/Wgq+qJKc7QPOj31E1viTp0s+es1eiF5U
72vPzOR39cqEUALYXFB9qPGTg3TS+NtkxMJnY20iE08E5sQZGX3hqBecrPOL93f2
BQlHvJb0JJ/Jy+J76JLwiYtr2sjguBCJL1qUKhZCJJ/H05qOdCBW5u0ukbWi4Bq8

[security bulletin] HPESBHF03736 rev.1 - HPE Aruba and HPE ProVision network switches using Diffie Hellman Group1 Sha1 Exchange Algorithm, Remote Disclosure of Information

2017-05-05 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03736en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03736en_us
Version: 1

HPESBHF03736 rev.1 - HPE Aruba and HPE ProVision network switches using
Diffie Hellman Group1 Sha1 Exchange Algorithm, Remote Disclosure of
Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-04
Last Updated: 2017-05-04

Potential Security Impact: Remote: Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in certain legacy
versions of HPE Aruba and HPE ProVision network switches. The vulnerability
could be remotely exploited to allow remote disclosure of information.

References:


SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Provision Network Switches xx.16.01.0006, xx.15.18.0007,
xx.15.16.0012m and previous versions
  - HPE Aruba Network Switches xx.16.01.0006, xx.15.18.0007, xx.15.16.0012m
and previous versions

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following updates to resolve this issue.  Upgrade the
switch firmware to one of these versions or later and then configure their
secure client applications to use DH group14-sha1 to communicate with the
switch. 

**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates
 
  + A - Version: A.15.16.0012m (and all previous versions)
* Updated Firmware Version
  - A.15.16.0013m (and all subsequent versions)
* HPE Networking impacted products
  - J9565A Aruba 2615-8-PoE Switch
  - J9562A Aruba 2915-8G-PoE Switch


  + K - Version: K.16.01.0006 (and all previous versions), K.15.18.0010 (and
all previous versions), K.15.16.0012m (and all previous versions)
* Updated Firmware Version
  - K.16.01.0007 (and all subsequent versions)
  - K.15.18.0011 (and all subsequent versions)
  - K.15.16.0013m (and all subsequent versions)
* HPE Networking impacted products
  - J8692A  ProCurve 3500-24G-PoE yl Switch, J8693A  ProCurve
3500-48G-PoE yl Switch
  - J9310A  ProCurve 3500-24G-PoE+ yl Switch, J9311A  ProCurve
3500-48G-PoE+ yl Switch
  - J9470A  ProCurve 3500-24 Switch, J9471A  ProCurve 3500-24-PoE Switch
  - J9472A  ProCurve 3500-48 Switch, J9473A  ProCurve 3500-48-PoE Switch
  - J8697A  ProCurve E5406 zl Switch Chassis, J8699A ProCurve  HP
5406-48G zl Switch
  - J9447A  ProCurve 5406-44G-PoE+-4SFP zl Switch
  - J9533A  HP 5406-44G-PoE+-2XG v2 zl Swch w Pm SW, J9539A  HP
5406-44G-PoE+-4G v2 zl Swch w Prm SW
  - J9642A  HP 5406 zl Switch with Premium Software, J9866A  HP 5406
8p10GT 8p10GE Swch and Psw
  - J8698A  ProCurve E5412 zl Intellegent Edge,J8700A  ProCurve 5412-96G
zl Intellegent Edge
  - J9448A  HP ProCurve 5412zl-96G-PoE Plus Switch , J9532A  HP
5412-92G-PoE+-2XG v2 zl Swch w Pm SW
  - J9540A  HP 5412-92G-PoE+-4G v2 zl Swch w Prm SW
  - J9643A  HP 5412 zl Switch with Premium Software



  + KA - Version: KA 16.01.0006 (and all previous versions), KA 15.18.0010
(and all previous versions), KA 15.16.0012m (and all previous versions), KA
15.10.0018m (and all previous versions)
* Updated Firmware Version
  - KA 16.01.0007 (and all subsequent versions)
  - KA 15.18.0011 (and all subsequent versions)
  - KA 15.16.0013m (and all subsequent versions)
  - KA 15.10.0019m (and all subsequent versions)
* HPE Networking impacted products
  - J9573A  Aruba 3800-24G-PoE+-2SFP+ Switch
  - J9574A  Aruba 3800-48G-PoE+-4SFP+ Switch
  - J9575A  Aruba 3800-24G-2SFP+ Switch
  - J9576A  Aruba 3800-48G-4SFP+ Switch
  - J9584A  Aruba 3800-24SFP-2SFP+ Switch
  - J9585A  Aruba 3800-24G-2XG Switch
  - J9586A  Aruba 3800-48G-4XG Switch
  - J9587A  Aruba 3800-24G-PoE+-2XG Switch
  - J9588A  Aruba 3800-48G-PoE+-4XG Switch


  + KB - Version: KB.16.01.0006 (and all previous versions), KB.15.18.0010
(and all previous versions), KB.15.16.0012m (and all previous versions)
* Updated Firmware Version
  - KB 16.01.0007 (and all subsequent versions)
  - KB 15.18.0008 (and all subsequent versions)
  - KB 15.16.0013m (and all subsequent versions)
* HPE Networking impacted products
  - J9821A  Aruba 5406R zl2 Switch
  - J9822A  Aruba 5412R zl2 Switch
  - J9823A  HP 5406R-Gig-T-PoE+/SFP+ v2 zl2 Swch
  - J9824A  HP 5406R-Gig-T-PoE+/SFP v2 zl2 Swch
  - J9825A  HP 5412R-Gig-T-PoE+/SFP+ v2 zl2 Swch
  - 

[security bulletin] HPESBGN03740 rev.1 - HPE Network Automation, Multiple Remote Vulnerabilities

2017-05-05 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03740en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03740en_us
Version: 1

HPESBGN03740 rev.1 - HPE Network Automation, Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-04
Last Updated: 2017-05-04

Potential Security Impact: Local: Authentication Bypass; Remote: Code
Execution, Elevated Privileges, SQL Injection

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HPE Network
Automation. The vulnerabilities could be remotely exploited to allow SQL
injection, code execution, information disclosure, authentication bypass,
elevated privilege execution, and invalid session management.

References:

  - CVE-2017-5810 - SQL injection
  - CVE-2017-5811 - remote code execution
  - CVE-2017-5812 - remote information disclosure
  - CVE-2017-5813 -  remote unauthenticated access
  - CVE-2017-5814 - remote authentication bypass, elevated privilege
execution

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Network Automation Software 9.1x, 9.2x, 10.0x, 10.1x and 10.2x

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5810
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)

CVE-2017-5811
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)

CVE-2017-5812
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE-2017-5813
  4.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
  6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVE-2017-5814
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks the following for reporting security issues
to security-al...@hpe.com:  
 
  * CVE-2017-5810 rgod working with Trend Micro's Zero Day Initiative
  * CVE-2017-5811 rgod working with Trend Micro's Zero Day Initiative
  * CVE-2017-5812 rgod working with Trend Micro's Zero Day Initiative
  * CVE-2017-5814 Christophe Schleypen of NATO NCIRC

RESOLUTION

HPE has made the following software updates and mitigation information
available to resolve the vulnerabilities in HPE Network Automation:

Customers on version 9.1x or 9.2x need to upgrade to a patched version of
10.0x, or 10.1x or 10.2x noted below

For 10.0x, first patch to 10.00.021, and then apply the patch 10.00.022:

  *


  * Please follow SPECIAL INSTALL INSTRUCTIONS section mentioned under
Installation Instructions

  * In addition, follow the procedures described in the following sections in
the NA Hardening Guide available at:


 - Enable Secure Communication with Satellites
 - Enable SSL Communications over RMI

For 10.10, customers should first upgrade to 10.11:
 and then apply the 10.11 patch below. 

  * For 10.11, apply the patch 10.11.03:
 -
  

  * Please follow SPECIAL INSTALL INSTRUCTIONS section mentioned under
Installation Instructions.

  * In addition, follow the procedures described in the following sections in
the NA Hardening Guide available at:


- Enable Secure Communication with Satellites
- Enable SSL Communications over RMI

For NA 10.20, customers should first upgrade to 10.21
 and then apply the 10.21 patch below:

  * For 10.21, apply the patch 10.21.01: 
-


  * Please follow SPECIAL INSTALL INSTRUCTIONS section mentioned under
Installation Instructions

  * In addition, follow the procedures described in the following sections in
the NA Hardening Guide (available at:


- Enable Secure Communication with Satellites
- Enable SSL Communications over RMI

HISTORY
Version:1 (rev.1) - 4 May 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running 

[security bulletin] HPESBHF03741 rev.1 - HPE Network products including Comware 7, IMC, and VCX running OpenSSL, Local Unauthorized Disclosure of Information, Remote Denial of Service (DoS), Unauthori

2017-05-03 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03741en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03741en_us
Version: 1

HPESBHF03741 rev.1 - HPE Network products including Comware 7, IMC, and VCX
running OpenSSL, Local Unauthorized Disclosure of Information, Remote Denial
of Service (DoS), Unauthorized Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-05-02
Last Updated: 2017-05-02

Potential Security Impact: Local: Unauthorized Disclosure of Information;
Remote: Denial of Service (DoS), Unauthorized Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities with OpenSSL have been addressed for HPE
Network products including Comware 7, IMC, and VCX. The vulnerabilities could
be remotely exploited resulting in Denial of Service (DoS) or disclosure of
sensitive information, or locally exploited resulting in unauthorized
disclosure of information.

References:

  - CVE-2016-0702 - Local unauthorized disclosure of information
  - CVE-2016-0703 - Remote unauthorized disclosure of information
  - CVE-2016-0704 - Remote unauthorized disclosure of information
  - CVE-2016-0705 - Remote Denial of Service (DoS)
  - CVE-2016-0797 - Remote Denial of Service (DoS)
  - CVE-2016-0798 - Remote Denial of Service (DoS)
  - CVE-2016-0799 - Remote Denial of Service (DoS)
  - CVE-2016-0800 - Remote unauthorized disclosure of information
  - CVE-2016-2842 - Remote Denial of Service (DoS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware v7 (CW7) Products Products All versions - Please refer to the
RESOLUTION below for a list of updated products. 
  - HPE Intelligent Management Center (iMC) Products All versions - Please
refer to the RESOLUTION below for a list of updated products. 
  - VCX Products Products All versions - Please refer to the RESOLUTION below
for a list of updated products. 

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-0702
  5.1 CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-0703
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-0704
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-0705
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2016-0797
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-0798
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVE-2016-0799
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2016-0800
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-2842
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates to resolve the vulnerabilities in
the Comware, IMC and VCX products running OpenSSL. 

**IMC Products**

  + **IMC UAM_TAM - Version: 7.2 E0408**
* HP Network Products
  - JD144A HPE A-IMC User Access Management Software Module with 200-user
License
  - JF388A HP IMC UAM S/W MODULE W/200-USER LICENSE
  - JF388AAE HP IMC UAM S/W MODULE W/200-USER E-LTU
  - JG752AAE HP IMC UAM SW MOD W/ 50-USER E-LTU
  - JG483A HP IMC TAM S/W MODULE W/100-NODE LIC
  - JG483AAE HP IMC TAM S/W MODULE W/100-NODE E-LTU
  - JG764AAE HP IMC TAM SW MOD W/ 50-NODE E-LTU
* CVEs
  - CVE-2016-0702
  - CVE-2016-0703
  - CVE-2016-0704
  - CVE-2016-0705
  - CVE-2016-0797
  - CVE-2016-0798
  - CVE-2016-0799
  - CVE-2016-0800


**VCX Products**

  + **VCX - Version: 9.8.19**
* HP Network Products
  - J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr
  - J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr
  - JC517A HP VCX V7205 Platform w/DL 360 G6 Server
  -  JE355A HP VCX V6000 Branch Platform 9.0
  - JC516A HP VCX V7005 Platform w/DL 120 G6 Server
  - JC518A HP VCX Connect 200 Primry 120 G6 Server
  - J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr
  - JE341A HP VCX Connect 100 Secondary
  - JE252A HP VCX Connect Primary MIM Module
  - JE253A HP VCX Connect Secondary MIM Module
  - JE254A HP VCX Branch MIM Module
  - JE355A HP VCX V6000 Branch Platform 9.0
  - 

[security bulletin] HPESBHF03738 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution

2017-04-28 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03738en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03738en_us
Version: 1

HPESBHF03738 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-04-27
Last Updated: 2017-04-27

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HPE Intelligent
Management Center (iMC) PLAT. These vulnerabilities could be exploited
remotely to allow code execution.

References:

  - CVE-2017-5804 - ZDI-CAN-4507
  - CVE-2017-5805 - ZDI-CAN-4539
  - CVE-2017-5806 - ZDI-CAN-4538

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) 7.2

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5804
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2017-5805
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2017-5806
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise would like to thank Trend Micro's Zero Day
Initiative for reporting this vulnerability.

RESOLUTION

HPE has provided the following software updates to resolve the
vulnerabilities in Intelligent Management Center (iMC) PLAT:

Fixed in HPE Intelligent Management Center (iMC) PLAT E0504.

Please contact HPE Technical Support if any assistance is needed acquiring
the software updates.

HISTORY
Version:1 (rev.1) - 27 April 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJZAkmjAAoJELXhAxt7SZaiF/YH+wYz3qmyVSsIFILUNE+mVgSN
PIJZDX04G9YbJTyIoDFwyiNgtPIkdSVvYkckChfLkklrMDwmKukFm+O8V+/a3cl/
R2ZMIFgJGcEyYVvWYcZKd1DGReKOH0v8bj6zxBDJH+DbiD8l0bJko7tt5QLLfMvy
RhsHgYt2+fba41v+i5Hhmbo2czFLDjFrWwyF874psLzoSGSvaQDa4lI91aEnoAaw
A2t0T3Sk3McuoIqnLQuIDusrriaJxzRNGDF1KNd9i5ecYnu8EQPA35BdmI6Jn0Ce
gI5fy7LUhX0Oazk0j4Nsbe2TgV4CjGV6V7se8M9tMlBBfiL6njxUBl+vzt7cyls=
=tYCx
-END PGP SIGNATURE-


[security bulletin] HPESBGN03728 rev.1 - HPE Operations Agent using OpenSSL, Remote Denial of Service (DoS), Unauthorized Access to Data

2017-04-14 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03728en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03728en_us
Version: 1

HPESBGN03728 rev.1 - HPE Operations Agent using OpenSSL, Remote Denial of
Service (DoS), Unauthorized Access to Data

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-04-07
Last Updated: 2017-04-07

Potential Security Impact: Remote: Denial of Service (DoS), Unauthorized
Access to Data

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities in OpenSSL have been addressed in HPE
Operations Agent. These vulnerabilities could be remotely exploited resulting
in Denial of Service (DoS) and/or Unauthorized Access to Data.

References:

  - CVE-2017-3733 - OpenSSL, Remote Denial of Service (DoS)
  - CVE-2016-2107 - OpenSSL, Padding oracle in AES-NI CBC MAC check

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Operations Agent  - v11.15, v11.14

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-2107
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVE-2017-3733
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates available to resolve these
vulnerabilities in the impacted versions of Operations Agent.

Operations Agent v11.16 patch id is available for the following platforms:

* Windows-OAWIN_00044
* Solaris-OASOL_00044
* Linux-OALIN_00044
* HPUX-OAHPUX_00044
* AIX-OAAIX_00044

**Note:**Please contact HPETechnicalSupportif any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 7 April 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJY5872AAoJELXhAxt7SZainOIIAKS70nsxmh8SzsTGC9wcMbKk
8oK64Jndvv8bEWIA/cvgJXRgWHMxdgJYFIIImkuK5tvzCeqx9IazLCqiA0SR1ZMM
oJSkc6yctK9CsoDHeIT/HwDCTlVdehkkmy2n2jHbajsh0X9zOXCviTCmkw59JysM
C77M3B1n2r+UytJhta61MKrUWvsCOdEbL17l2XTTrOzLjJWeDCIGT7VWHJRjuF4V
ZaGUOxZUWuzzLsA4tLfMCDZDGh7Tl356ZTLwi8hCzI4gzVVGKVvCqqgOoB7r0ku0
Zd5qfuIIc2LIBmYReQTZVynBiN9C3HQCSOvpeYckpA0SwSarrnMLcADpIcQvMUM=
=K3jU
-END PGP SIGNATURE-


[security bulletin] HPESBGN03733 rev.1 - HPE Universal CMDB using Apache Struts, Remote Code Execution

2017-04-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03733en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03733en_us
Version: 1

HPESBGN03733 rev.1 - HPE Universal CMDB using Apache Struts, Remote Code
Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-04-07
Last Updated: 2017-04-07

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability in Jakarta Multipart parser in Apache
Struts has been addressed in HPE Universal CMDB. This vulnerability could be
remotely exploited to allow code execution via mishandled file upload.

References:

  - CVE-2017-5638 - Vulnerability in Apache Struts 2, Remote Code Execution

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Universal CMDB Foundation Software - v10.22 CUP5

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5638
  10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE Universal CMDB.

*


HISTORY
Version:1 (rev.1) - 7 April 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJY58khAAoJELXhAxt7SZair4cH/28pTPF/Zd2+2pMHo1+zunk9
XsoYuewIRE3X81eJsyHdGedEvQIPFZAzpXtvSU78LGBU7afbEDSFunpyfe4Xu/op
SwTH1N4d+F9r25vsVQkiS7sA5mCAdybRmBGzf29cWeO8pImwe5YTsY2uG3wC8Ljm
EHCQVjmIC9UmnXs9FEzc8wRyDI969hOsicGnTNlY7KJxlNL6a5rqmRJRhXezH4N+
3OS1TVEvlwlGcQtHZ3C1Lb2xzmMSypRkm7Ev7u3KpsnkWjH6PTvR9fVMrwpjxqwD
0pr/r53EsK+wktSdpbWFflu2QCqxJaaWEeEuiFdJTu4Eicnd4CQRjhNvSSXs2+0=
=9S2v
-END PGP SIGNATURE-


[security bulletin] HPESBGN03727 rev.1 - HPE Business Process Monitor, Remote Unauthorized Access to Data

2017-04-04 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03727en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03727en_us
Version: 1

HPESBGN03727 rev.1 - HPE Business Process Monitor, Remote Unauthorized Access
to Data

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-04-04
Last Updated: 2017-04-04

Potential Security Impact: Remote: Unauthorized Access to Data

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in the HPE Business
Process Monitor. This vulnerability could be remotely exploited to allow
Unauthorized Access to Data.

References:

  - CVE-2017-5801 - Remote Unauthorized Access to Data

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Business Process Monitor Ultimate Edition Software  - v09.2x, v09.30

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5801
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE Business Process Monitor:



HISTORY
Version:1 (rev.1) - 4 April 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJY4/AHAAoJELXhAxt7SZai9EcIAIwW8XhcRafkhCvvmpqYFVkf
x4rTID6fK+9fTlnDL952Tfo9O4yvec9QkMelnwqpi2S56pwnqnzcd5pK3QWknS60
Y4aTDDgr+e762UOA5c5Gdd7+KSgaH9XPKCqtKmAHUmL3bwqy4t8YHzSH6m6EVufB
3ujOM3Tgte0P1W2XO5rvDxp4gGWasR0PFgURhn3odawp2hC9O8WV+gDE63A+x3+c
kd5qE29pRGoVgIEmW2h2/dEKipL6/ICjkeqyvo7+zAo1ZJZpNndZHFIWz1XnE52k
72XN8F6Cx19STGH+fQY4hQjepIpvVDGsXOTX+LhXAHUrtosQaJs68y6/TnytHdc=
=DALJ
-END PGP SIGNATURE-


[security bulletin] HPESBGN03721 rev.1 - HPE Operations Bridge Analytics, Remote Cross-Site Scripting (XSS)

2017-04-04 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03721en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03721en_us
Version: 1

HPESBGN03721 rev.1 - HPE Operations Bridge Analytics, Remote Cross-Site
Scripting (XSS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-31
Last Updated: 2017-03-31

Potential Security Impact: Remote: Cross-Site Scripting (XSS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential vulnerability has been identified in HPE Operations Bridge
Analytics. The vulnerability could be exploited to allow remote cross-site
scripting (XSS).

References:

  - CVE-2017-5800 - Remote Cross-Site Scripting (XSS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Operations Analytics Software -  Operations Bridge Analytics v3.0

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5800
  6.4 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
  6.1 (AV:N/AC:H/Au:S/C:P/I:C/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software update to resolve this vulnerability
in the impacted version of Operations Analytics. 

* Operations Analytics 3.0 IP1:


HISTORY
Version:1 (rev.1) - 31 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJY3qd2AAoJELXhAxt7SZaifiYIAKH7Bk6z0kW4BV0qqoDXXc78
7Ptsuk08n4AhS6GZC+8XxNhZyUZ+u2sx88UYZNq1Ty8WcYRYUtdFcK9hv9ZBghN/
BRMb/N1dsNgmkjhZjDD8W0JoxK1TH+d6+pFKgEP/YmV0QRFE0q6SEG7HqYtSB0b6
qrHhCMqF9eAnV73RJV4uk8Rc6Bb/+B/X5HL6UcdQjPuE8N/2p6VeDbkjzFVk83m7
CPUCch8x0FARKAz/WWOVmA25IqY9+sdLlxmmUIr940H6791dl+YvARczTP5jWHI0
sUjSfST/GoPXttXDV9L6FmJ4f5wTNzq2IYGZFJPCzofwcSqnt5VXGwomh6IEHGM=
=xKnz
-END PGP SIGNATURE-


[security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege

2017-03-31 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03722en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03722en_us
Version: 1

HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-30
Last Updated: 2017-03-30

Potential Security Impact: Local: Escalation of Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in Linux kernel, also known as "Dirty COW", has been
addressed in HPE Operations Agent. This vulnerability could be exploited
locally to allow escalation of privilege.

References:

  - CVE-2016-5195 - Linux kernel vulnerability, Dirty "COW" 

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Operations agent software - v11.11, v11.12, v11.13, v11.14

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-5195
  7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation steps available to resolve the
vulnerability in the impacted versions of HPE Operations Agent.

1. Login to the Operations Agent system with root privileges  
2. Update the system using 'yum update kernel' command
3. Reboot the server using '/sbin/shutdown -r now' command

Please contact HPE Technical Support if any assistance is needed regarding
the mitigation steps.

HISTORY
Version:1 (rev.1) - 30 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJY3X5sAAoJELXhAxt7SZaiw5UIAKxcLWb6Mo1KIOjbIyMLOJd4
+BQjfbZpA5ILOIZHHZPhbyciIU5BHfTYBO0OySlbGN9cdiLcxHTUwTd+iy2cPSv9
9ndR3RyTawAehbFTyWO8PeQ1VNJWI6/TO6zpIkD0Ax81KMIDfReJgXjME3a7dsly
zbhvqfhrmuk/jS3ORwKsw/9JxYVb1DtRcSgVw/GgCdwDYNi8PUfadhFv2kMCtlFw
PMa+vXbxtYZqwsASJm6QJS87Z63DIdjk8rJLt2IM/FfsGLVtPM4DUhciI85tQmru
pGiLfZqcAxeuxsvZkmeFuD299Ba6EDZkO2wcx1ngDF1D2w+BnBs54jN62DXhFPM=
=LbQ7
-END PGP SIGNATURE-


[security bulletin] HPESBHF03723 rev.1 - HPE Aruba ClearPass Policy Manager, using Apache Struts, Remote Code Execution

2017-03-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03723en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03723en_us
Version: 1

HPESBHF03723 rev.1 - HPE Aruba ClearPass Policy Manager, using Apache Struts,
Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-29
Last Updated: 2017-03-29

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Aruba ClearPass
Policy Manager. The vulnerability could be remotely exploited to allow
execution of code. 

**Note:** The ClearPass Policy Manager administrative Web interface is
affected by the vulnerability. ClearPass Guest, Insight, and Graphite are NOT
impacted.

References:

  - CVE-2017-5638 - Apache Struts, remote code execution

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Aruba ClearPass Policy Manager All versions prior to 6.6.5

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5638
  9.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
  9.7 (AV:N/AC:L/Au:N/C:C/I:C/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE Aruba has provided hotfixes for ClearPass 6.6.5, 6.6.4, and 6.5.7. Use
one of the following methods to install the appropriate hotfix:

Install the Hotfix Online Using the Software Updates Portal:
 
   1. Open ClearPass Policy Manager and go to Administration - Agents and
Software
   Updates - Software Updates.  
   
   2. In the Firmware and Patch Updates area, find the "ClearPass 6.5.7
Hotfix
   Patch for CVE-2017-5638" or "ClearPass 6.6.4 Hotfix Patch for
CVE-2017-5638"
   patch and click the Download button in its row. 

   3. Click Install.  
   
   4. When the installation is complete and the status is shown as "Needs
   Restart", proceed to restart ClearPass. After reboot, the status for the
   patch will be shown as Installed. The ClearPass Policy Manager version
   number will not change.  

   
Installing the hotfix Offline Using the Patch File from
support.arubanetworks.com:
 
   1. Download the "ClearPass 6.5.7 Hotfix Patch for CVE-2017-5638" or
   "ClearPass 6.6.4 Hotfix Patch for CVE-2017-5638" patch from the Support
site.
 
   2. Open the ClearPass Policy Manager Admin UI and go to Administration -
   Agents and Software Updates - Software Updates.  
   3. At the bottom of the Firmware and Patch Updates area, click Import
Updates
   and browse to the downloaded patch file. The name and description once
   imported may differ from the name and remark on the support site
   as these were adjusted after posting. This is purely a cosmetic
discrepancy.  
   
   4. Click Install.  
   
   5. When the installation is complete and the status is shown as Needs
Restart,
   proceed to restart ClearPass. After reboot, the status for the patch will
   be shown as Installed. The ClearPass Policy Manager version number will
   not change.  


Workarounds
- --- 
Restrict access to the Policy Manager Admin Web Interface. This can be
accomplished by navigating to Administration - Server Manager -
Server Configuration - Server-Name - Network - Restrict Access and
only allowing non-public or network management networks.

**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 29 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU 

[security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities

2017-03-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux03725en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbux03725en_us
Version: 1

HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-29
Last Updated: 2017-03-29

Potential Security Impact: Remote: Denial of Service (DoS), Unauthorized Read
Access to Data

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP-UX Web Server
Suite running Apache on HP-UX 11iv3. These vulnerabilities could be exploited
remotely to create a Denial of Service (DoS), Unauthorized Read Access to
Data and other impacts including:

  * Padding Oracle attack in Apache mod_session_crypto  
  * Apache HTTP Request Parsing Whitespace Defects

References:

  - CVE-2016-8740 - Apache http server, Denial of Service (DoS) 
  - CVE-2016-2161 - Apache http server, Denial of Service (DoS)
  - CVE-2016-0736 - Apache http server, disclosure of information, padding
oracle attack
  - CVE-2016-8743 - Apache http server, request corruption, request parsing
white space
  - CVE-2016-2183 - OpenSSL, disclosure of information, SWEET32

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP-UX Apache-based Web Server B.11.31 - httpd prior to B.2.4.18.02

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-0736
  0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
  4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)

CVE-2016-2161
  0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
  4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)

CVE-2016-2183
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE-2016-8740
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-8743
  0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
  4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software updates to resolve the
vulnerabilities with HP-UX Web Server Suite running Apache.

Apache 2.4.18.02 for HP-UX Release B.11.31 (PA and IA):

  * 32 bit Depot: HP-UX 11.31(HPUXWS24ATW-B503-11-31-64.depot)
  * 64 bit Depot: HP-UX 11.31(HPUXWS24ATW-B503-11-31-32.depot)

**Note:** The depot files can be found here:


MANUAL ACTIONS: Yes - Update 
Download and install the software update   

PRODUCT SPECIFIC INFORMATION 
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application

that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins 
issued by HPE and lists recommended actions that may apply to a specific
HP-UX 
system. It can also download patches and create a depot automatically. For
more information see: 


AFFECTED VERSIONS 


HP-UX B.11.31 IA/PA
===

hpuxws24APACHE.APACHE
hpuxws24APACHE.APACHE2
hpuxws24APACHE.AUTH_LDAP
hpuxws24APACHE.AUTH_LDAP2
hpuxws24APACHE.MOD_JK
hpuxws24APACHE.MOD_JK2
hpuxws24APACHE.MOD_PERL
hpuxws24APACHE.MOD_PERL2
hpuxws24APACHE.WEBPROXY
hpuxws24APACHE.WEBPROXY2

action: install B.2.4.18.02 or subsequent

END AFFECTED VERSIONS


HISTORY
Version:1 (rev.1) - 29 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM

[security bulletin] HPSBUX03596 rev.2 - HPE HP-UX running CIFS Server (Samba), Remote Access Restriction Bypass, Unauthorized Access

2017-03-20 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05121842

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05121842
Version: 2

HPSBUX03596 rev.2 - HPE HP-UX running CIFS Server (Samba), Remote Access
Restriction Bypass, Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-09
Last Updated: 2017-03-08

Potential Security Impact: Remote: Access Restriction Bypass, Gain
Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in Samba was addressed by HPE HP-UX running CIFS
Server (Samba). The vulnerability could be exploited resulting in remote
access restriction bypass and unauthorized access.

References:

  - CVE-2015-7560 - Vulnerability in SMB1 implementation in smbd in Samba 

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP-UX Common Internet File System (CIFS), Client/Server Software -
CIFS-SERVER versions prior to B.04.05.03.00 on IPF system and upto
B.04.05.03.00 on PA-RISC

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-7560
  6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following mitigation to resolve the vulnerability in the
HP-UX CIFS-SERVER

**For IPF system** 

Please download and install HP-UX CIFS SERVER B.04.05.03.00 for HP-UX Release
B.11.31 on IPF systems from the following location:



**For PA-RISC system** 

Apply either one of the following workarounds:

  **Workaround 1:**
Add the parameter:
**unix extensions = no** to the [global] section of smb.conf and restart
smbd.

  **Workaround 2:** Prohibit the use of SMB1 by setting the parameter:
**server min protocol = SMB2** to the [global] section of smb.conf and
restart smbd.

HISTORY

Version:1 (rev.1) - 9 May 2016 Initial release

Version:2 (rev.2) - 8 March 2017 Update after release of new version


Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYwGjcAAoJELXhAxt7SZaim+EIAIteW0oGx3enBAVQuDG4r4CP
RCuWi1gLwR0NvA1lnv0V9utN8yFplqTy+otFpJXc7sqcf2xrThk1BTyp6zgu/fx/
k5FB2SlQp88KpQNh0Wa6llWJnuRriVJe24H6VMXII+VQM0KhhiBu2jjIL25kZiEb
NByEFpEGblv1A6KKI5tCFenw90TNhASVwojXSinQ0ALsf5WKZRO9F831JLpfAJuf
i6qjn9S1VdF4z3NJcjK2/EyUXfMqwGm2h9vsw75elEz+KEAuZ/SYsvsMtYgUJlcR

[security bulletin] HPESBUX03706 rev.1 - HP-UX NTP service running ntpd, Multiple Vulnerabilities

2017-03-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux03706en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbux03706en_us
Version: 1

HPESBUX03706 rev.1 - HP-UX NTP service running ntpd, Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-10
Last Updated: 2017-03-10

Potential Security Impact: Remote: Access Restriction Bypass, Denial of
Service (DoS), Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in the HP-UX-NTP
service running ntpd. These vulnerabilities could be exploited remotely to
allow a denial of service (DoS), unauthorized modification, and access
restriction bypass.

References:

  - CVE-2016-7426
  - CVE-2016-7427
  - CVE-2016-7428
  - CVE-2016-7429
  - CVE-2016-7431
  - CVE-2016-7433
  - CVE-2016-7434
  - CVE-2016-9310
  - CVE-2016-9311

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP-UX 11i v3 HPUX-NTP B.11.31 - NTP 4.2.8  prior to C.4.2.8.2.0

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-7426
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2016-7427
  4.3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  3.3 (AV:A/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-7428
  4.3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  3.3 (AV:A/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-7429
  3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2016-7431
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVE-2016-7433
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-7434
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-9310
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
  6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

CVE-2016-9311
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.1 (AV:N/AC:M/Au:N/C:N/I:N/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software update to resolve the vulnerabilities
in HP-UX ntp:  

* ntp 4.2.8 C.4.2.8.2.0 or subsequent version  
  * **Note:** The depot file can be found here:  
  *


MANUAL ACTIONS: Yes - Update  
 
Download and install the software update  

PRODUCT SPECIFIC INFORMATION  
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application

that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins 
issued by HPE and lists recommended actions that may apply to a specific
HP-UX 
system. It can also download patches and create a depot automatically. For
more information see:  

  *
  
  
The following text is for use by the HP-UX Software Assistant. 

AFFECTED VERSIONS
HP-UX B.11.31 IA/PA 
=== 
NTP.NTP-AUX 
NTP.NTP-RUN 
action: install C.4.2.8.2.0 or subsequent
END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 11 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard 

[security bulletin] HPESBHF03711 rev.1 - HPE 2620 Series Network Switches, Remote Cross Site Request Forgery (CSRF)

2017-03-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03711en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03711en_us
Version: 1

HPESBHF03711 rev.1 - HPE 2620 Series Network Switches, Remote Cross Site
Request Forgery (CSRF)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-10
Last Updated: 2017-03-10

Potential Security Impact: Local: Cross-Site Request Forgery (CSRF); Remote:
Cross-Site Request Forgery (CSRF)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE 2620 Series
Network Switches. The vulnerability could be remotely exploited to execute a
cross site request forgery (CSRF).

References:

  - CVE-2017-5796

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP MSR2000 Router Series RA.15.05.0006

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5796
  9.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates and mitigation information to
resolve the vulnerability in HPE 2620 Series Network Switches:  

  * Install RA.15.15.0014 or a subsequent version.
  
**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates

HISTORY
Version:1 (rev.1) - 10 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYwvKVAAoJELXhAxt7SZaiEN4H/jo7Yam0hzb8p5LC8Ug88Tl/
aq+9WnL/ABCM8MWZG22fel7EPJaaudseVTCnBOshBcBhSX79xbTnzWUguOAPstaY
VIZ8w+rNNm0d8Z6gNF/prLahHGbkLLczvBiOm0YHk7Z7PdmvV7CUpY3go3FKcdbu
kgvZGDDvoztyoVeuvbTn7YONALQevJSvu4SvCjHFWyVTJNs6cwBBHwVp4uY/vPfZ
PqwE1+scT10Y3NeQyv1H+LyyV5px4HK37PTwJ8NoAx0jPHDCqfuST6HXfWhJvVeb
AejMcDPWDxvhwn7H6mkG4Q7EJNMdE8ZawAUcoVFCzGl70AxTyWr8cZaykA8vS2s=
=nJ3A
-END PGP SIGNATURE-


[security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege

2017-03-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03707en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03707en_us
Version: 1

HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase
of Privilege

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-10
Last Updated: 2017-03-10

Potential Security Impact: Remote: Increase of Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
HPE has identified two VMware security advisories affecting the HPE
ConvergedSystem 700 2.0 VMware Kit. The vulnerability could be exploited
remotely to allow an increase of privilege.

References:

  - CVE-2016-5195 - VMWare vROps, VMSA-2016-0018.3
  - CVE-2016-7457 - VMWare vROps, VMSA-2016-0016.1

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP ConvergedSystem 700 1.0 or 1.1  - Customers running the HPE
ConvergedSystem 700 Firmware and Software Compatibility Matrix -June 2016 
  - HP ConvergedSystem 700 Virtualization 2.0 VMware Kit 2.0  - HPE
ConvergedSystem 700 Firmware and Software Compatibility Matrix -June 2016 

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-5195
  7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVE-2016-7457
  10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  8.0 (AV:N/AC:L/Au:S/C:P/I:P/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE recommends applying the following vROps patches from VMWARE to HPE
ConvergedSystem 700 Firmware and Software Compatibility Matrix - June 2016 on
CS700 2.0 solutions:   

* VMSA-2016-0016.1

* VMSA-2016-0018.3


HISTORY
Version:1 (rev.1) - 10 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYwvBvAAoJELXhAxt7SZair88IALuf2VNK90uafggFWnMZhNEy
BCvhBHZVG/uxJc1f8FYfyjbzBJbjv7tNzagAgVpysaGJi9Imf/yqXuPS9RvNo5rX
DVwAhL6V9j45PrhWtI65OxlI20g7VFAi2b1oBs8rFcJhWxeFjHLLH2lQPVW2OlCT
lDMSMOcToG+PPc7X509vg+9hVVeabNXs8NmRFCflVDkcGspOl88A2xhaH37cSXDg
Zp66YHHZRg4MZFj28yeMAqqmn/Eo6rTdzZleu+GG+Zx/5tDHnz5iHxbyMg4AT2WY
kJv7Z0Hj9/nBC27DlGF2vjDzTZnVhNIwXnIinyhmzNhFVf7uXf73kihqAyNjByU=
=BJbQ
-END PGP SIGNATURE-


[security bulletin] HPESBHF03716 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Remote Authentication Bypass

2017-03-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03716en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03716en_us
Version: 1

HPESBHF03716 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Remote
Authentication Bypass

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-10
Last Updated: 2017-03-10

Potential Security Impact: Remote: Authentication Bypass

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in IMC PLAT. The
vulnerability could be remotely exploited to bypass authentication.

References:

  - CVE-2017-5791

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) iMC PLAT 7.2 E0403P06

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5791
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks rgod, working with Trend Micro's Zero Day
Initiative, for reporting this issue.

RESOLUTION

HPE has made the following software updates to resolve the vulnerability in
Intelligent Management Center (IMC) PLAT 7.2 E0403P06.  

+ **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0504P02**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU
  
**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 7 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial

[security bulletin] HPESBHF03714 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Local Arbitrary File Download

2017-03-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03714en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03714en_us
Version: 1

HPESBHF03714 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Local
Arbitrary File Download

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-08
Last Updated: 2017-03-08

Potential Security Impact: Local: Arbitrary File Download

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Intelligent
Management Center (IMC) PLAT that could be remotely exploited to allow the
arbitrary reading of files without authentication or authorization.

References:

  - CVE-2017-5795

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) iMC PLAT 7.2 E0403P06

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5795
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
  6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks rgod,  working with Trend Micro's Zero Day
Initiative for reporting this issue.

RESOLUTION

HPE has made the following software updates to resolve the vulnerability in
Intelligent Management Center (IMC) PLAT 7.2 E0403P06. 

 + **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0504P02**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU
  
 **Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 8 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard 

[security bulletin] HPESBHF03713 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Deserialization of Untrusted Data, Remote Code Execution

2017-03-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03713en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03713en_us
Version: 1

HPESBHF03713 rev.1 - HPE Intelligent Management Center (IMC) PLAT,
Deserialization of Untrusted Data, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-08
Last Updated: 2017-03-08

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Intelligent
Management Center (IMC) PLAT. The vulnerability could be remotely exploited
to allow code execution.

References:

  - CVE-2017-5792

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) iMC PLAT 7.2 E0403P06

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5792
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Jacob Baines of Tenable Network Security
working with Trend Micro's
Zero Day Initiative for reporting this issue.

RESOLUTION

HPE has made the following software updates to resolve the vulnerability in
Intelligent Management Center (IMC) PLAT 7.2 E0403P06.

+ **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0504P02**
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  - JH704AAE  Aruba IMC Std SW Plat w/50-node E-LTU
  - JH705AAE  Aruba IMC Ent SW Plat w/50-node E-LTU
  
 **Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 8 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard 

[security bulletin] HPESBGN03712 rev.1 - HPE LoadRunner and Performance Center, Remote Code Execution

2017-03-08 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03712en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03712en_us
Version: 1

HPESBGN03712 rev.1 - HPE LoadRunner and Performance Center, Remote Code
Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-07
Last Updated: 2017-03-07

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE LoadRunner and
Performance Center. This vulnerability could be remotely exploited to allow
remote code execution.

References:

  - CVE-2017-5789 - Remote Code Execution

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE LoadRunner - v12.53.0 and earlier
  - HPE Performance Center - v12.53.0 and earlier

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5789
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Tenable Network Security working with Trend
Micro's Zero Day Initiative (ZDI) for reporting this issue to
security-al...@hpe.com

RESOLUTION

HPE has provided the following software updates to resolve the vulnerability
in the impacted versions of HPE LoadRunner and Performance Center. 

**LoadRunner** - Please download and install v12.53 Patch 4 using following
links:

* LoadRunner Full:


* Load Generator SA:


* VuGen SA:


* Analysis SA:


* TruClient SA:


Release notes for the LoadRunner patch is available at:


**Performance Center** - Please download and install v12.53 Patch 4 using
following link:

* Performance Center Server and Host:


Release notes for the Performance Center patch is available at:


HISTORY
Version:1 (rev.1) - 7 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard 

[security bulletin] HPESBHF03710 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Multiple Remote Vulnerabilities

2017-03-07 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03710en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03710en_us
Version: 1

HPESBHF03710 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Multiple
Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-03-07
Last Updated: 2017-03-07

Potential Security Impact: Remote: Multiple Vulnerabilities

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Intelligent
Management Center (IMC) PLAT. The vulnerability could be exploited remotely
to allow deserialization of untrusted data.

References:

  - CVE-2017-5790

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Intelligent Management Center (iMC) 7.2 E0403P06

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5790
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Jacob Baines of Tenable Network Security,
working with Trend Micro's Zero Day Initiative, for reporting this issue.

RESOLUTION

HPE has made the following software updates (7.3 E0504) to resolve the
vulnerability in IMC PLAT:

* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU
  
**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 7 March 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the 

[security bulletin] HPESBHF03709 rev.1 - HPE Network products including Comware, IMC, and VCX running OpenSSL, Remote Denial of Service (DoS), Disclosure of Sensitive Information

2017-02-21 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05398322

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05398322
Version: 1

HPESBHF03709 rev.1 - HPE Network products including Comware, IMC, and VCX
running OpenSSL, Remote Denial of Service (DoS), Disclosure of Sensitive
Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-02-21
Last Updated: 2017-02-21

Potential Security Impact: Remote: Denial of Service (DoS), Disclosure of
Sensitive Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities with OpenSSL have been addressed for HPE
Network products including Comware 5, Comware 7, IMC, and VCX. The
vulnerabilities could be remotely exploited resulting in Denial of Service
(DoS) or disclosure of sensitive information.

References:

  - CVE-2015-1794 - Remote Denial of Service (DoS)
  - CVE-2015-3193 - Remote disclosure of sensitive information
  - CVE-2015-3194 - Remote Denial of Service (DoS)
  - CVE-2015-3195 - Remote disclosure of sensitive information
  - CVE-2015-3196 - Remote Denial of Service (DoS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware 5 (CW5) Products All versions - Please refer to the RESOLUTION
below for a list of updated products. 
  - Comware 7 (CW7) Products All versions - Please refer to the RESOLUTION
below for a list of updated products. 
  - HPE Intelligent Management Center (iMC) All versions - Please refer to
the RESOLUTION below for a list of updated products.
  - VCX Products All versions - Please refer to the RESOLUTION below for a
list of updated products.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-1794
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-3193
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE-2015-3194
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-3195
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-3196
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates to resolve the vulnerabilities in
the Comware, IMC and VCX products running OpenSSL. 


**COMWARE 5 Products**

  + **A6600 (Comware 5) - Version: R3303P28**
* HP Network Products
  - JC165A HP 6600 RPE-X1 Router Module
  - JC177A HP 6608 Router
  - JC177B HP 6608 Router Chassis
  - JC178A HP 6604 Router Chassis
  - JC178B HP 6604 Router Chassis
  - JC496A HP 6616 Router Chassis
  - JC566A HP 6600 RSE-X1 Router Main Processing Unit
  - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
  - JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit
  + **HSR6602 (Comware 5) - Version: R3303P28**
* HP Network Products
  - JC176A HP 6602 Router Chassis
  - JG353A HP HSR6602-G Router
  - JG354A HP HSR6602-XG Router
  - JG355A HP 6600 MCP-X1 Router Main Processing Unit
  - JG356A HP 6600 MCP-X2 Router Main Processing Unit
  - JG776A HP HSR6602-G TAA-compliant Router
  - JG777A HP HSR6602-XG TAA-compliant Router
  - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
  + **HSR6800 (Comware 5) - Version: R3303P28**
* HP Network Products
  - JG361A HP HSR6802 Router Chassis
  - JG361B HP HSR6802 Router Chassis
  - JG362A HP HSR6804 Router Chassis
  - JG362B HP HSR6804 Router Chassis
  - JG363A HP HSR6808 Router Chassis
  - JG363B HP HSR6808 Router Chassis
  - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
  - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
  + **MSR20 (Comware 5) - Version: R2516**
* HP Network Products
  - JD432A HP A-MSR20-21 Router
  - JD662A HP MSR20-20 Router
  - JD663A HP A-MSR20-21 Router
  - JD663B HP MSR20-21 Router
  - JD664A HP MSR20-40 Router
  - JF228A HP MSR20-40 Router
  - JF283A HP MSR20-20 Router
  + **MSR20-1X  (Comware 5) - Version: R2516**
* HP Network Products
  - JD431A HP MSR20-10 Router
  - JD667A HP MSR20-15 IW Multi-Service Router
  - JD668A HP MSR20-13 Multi-Service Router
  - JD669A HP MSR20-13 W Multi-Service Router
  - JD670A HP MSR20-15 A Multi-Service Router
  - JD671A HP MSR20-15 AW Multi-Service Router
  - JD672A HP MSR20-15 I Multi-Service Router
  - JD673A HP 

[security bulletin] HPESBHF03703 rev.1 - HPE Network Products including Comware v7 and VCX using OpenSSL, Remote Unauthorized Disclosure of Information

2017-02-14 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05390893

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05390893
Version: 1

HPESBHF03703 rev.1 -  HPE Network Products including Comware v7 and VCX using
OpenSSL, Remote Unauthorized Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-02-14
Last Updated: 2017-02-14

Potential Security Impact: Remote: Unauthorized Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities with OpenSSL have been addressed in HPE
Network Products including Comware v7 and VCX. The vulnerabilities could be
remotely exploited resulting in disclosure of information.

References:

  - CVE-2015-3197 - OpenSSL, Remote unauthorized disclosure of information
  - CVE-2016-0701 - OpenSSL, Remote unauthorized disclosure of information

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - VCX Products all prior versions - impacted by CVE-2015-3197 only. Please
refer to the RESOLUTION below for a list of updated products.
  - Comware 7 (CW7) Products all prior versions - impacted by CVE-2015-3197
and CVE-2016-0701. Please refer to the RESOLUTION below for a list of updated
products.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-3197
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-0701
  3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates to resolve the vulnerability in
the Comware v7 and VCX products.

**COMWARE 7 Products**

  + **12500 (Comware 7) - Version: R7377P01**
* HP Network Products
  - JC072B HP 12500 Main Processing Unit
  - JC085A HP A12518 Switch Chassis
  - JC086A HP A12508 Switch Chassis
  - JC652A HP 12508 DC Switch Chassis
  - JC653A HP 12518 DC Switch Chassis
  - JC654A HP 12504 AC Switch Chassis
  - JC655A HP 12504 DC Switch Chassis
  - JF430A HP A12518 Switch Chassis
  - JF430B HP 12518 Switch Chassis
  - JF430C HP 12518 AC Switch Chassis
  - JF431A HP A12508 Switch Chassis
  - JF431B HP 12508 Switch Chassis
  - JF431C HP 12508 AC Switch Chassis
  - JG497A HP 12500 MPU w/Comware V7 OS
  - JG782A HP FF 12508E AC Switch Chassis
  - JG783A HP FF 12508E DC Switch Chassis
  - JG784A HP FF 12518E AC Switch Chassis
  - JG785A HP FF 12518E DC Switch Chassis
  - JG802A HP FF 12500E MPU
* CVEs
  - CVE-2015-3197
  - CVE-2016-0701
  + **10500 (Comware 7) - Version: R7183**
* HP Network Products
  - JC611A HP 10508-V Switch Chassis
  - JC612A HP 10508 Switch Chassis
  - JC613A HP 10504 Switch Chassis
  - JC748A HP 10512 Switch Chassis
  - JG608A HP FlexFabric 11908-V Switch Chassis
  - JG609A HP FlexFabric 11900 Main Processing Unit
  - JG820A HP 10504 TAA Switch Chassis
  - JG821A HP 10508 TAA Switch Chassis
  - JG822A HP 10508-V TAA Switch Chassis
  - JG823A HP 10512 TAA Switch Chassis
  - JG496A HP 10500 Type A MPU w/Comware v7 OS
  - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating
System
  - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System
Main Processing Unit
* CVEs
  - CVE-2015-3197
  - CVE-2016-0701
  + **12900 (Comware 7) - Version: R1150**
* HP Network Products
  - JG619A HP FlexFabric 12910 Switch AC Chassis
  - JG621A HP FlexFabric 12910 Main Processing Unit
  - JG632A HP FlexFabric 12916 Switch AC Chassis
  - JG634A HP FlexFabric 12916 Main Processing Unit
  - JH104A HP FlexFabric 12900E Main Processing Unit
  - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
  - JH263A HP FlexFabric 12904E Main Processing Unit
  - JH255A HP FlexFabric 12908E Switch Chassis
  - JH262A HP FlexFabric 12904E Switch Chassis
  - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
  - JH103A HP FlexFabric 12916E Switch Chassis
* CVEs
  - CVE-2015-3197
  - CVE-2016-0701
  + **5900 (Comware 7) - Version: R2432P01**
* HP Network Products
  - JC772A HP 5900AF-48XG-4QSFP+ Switch
  - JG296A HP 5920AF-24XG Switch
  - JG336A HP 5900AF-48XGT-4QSFP+ Switch
  - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
  - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
  - JG555A HP 5920AF-24XG TAA Switch
  - JG838A HP FF 5900CP-48XG-4QSFP+ Switch
  - JH036A HP FlexFabric 5900CP 48XG 

[security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information

2017-02-14 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05390849

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05390849
Version: 1

HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure
of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-02-14
Last Updated: 2017-02-14

Potential Security Impact: Remote: Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in DES/3DES block ciphers used in the TLS protocol
could potentially impact HPE Business Service Management 9.2x and Application
Performance Management (APM) 9.30 resulting in remote disclosure of
information, also known as the SWEET32 attack.

References:

  - CVE-2016-2183

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Business Service Management Software 9.2x
  - Application Performance Management 360 Software 9.30

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-2183
  4.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following mitigation information to resolve the
vulnerability for impacted versions of HPE BSM 9.2x and APM 9.30:



HISTORY
Version:1 (rev.1) - 14 February 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYo17DAAoJELXhAxt7SZaiKUMIAJcZAPwhgXe0DdC9PQKxSsID
2XVCszdYBbY/OLSstRiPa9ifR9+ICsL+7bMiE+xahRLZp4+SMBk9Llv+sE8OsICa
pdJAOnhG5gZCUamJTtcQKZ52F8jx6/qfa7lC3qKo/+u8uK+NGOFWcJXUqCHD/GjM
kGNXr6gC6AzSbGDFxzvEgtrxq5z52MJx2IjGZnvYqaXFeT9Fh8/d3exCVk6V+/cQ
zuE8HW4Gx9v9LzymqQllOI01A+PDfEBsz+Cj/zAAUfbB+KLNr8yvjNRKhseHld6u
ugjFZyf0ZPu2DashwNEnpyeRLpJB5vqEVDwWPaqcqR9H65fM65v3og7Ne/AN31w=
=k8aJ
-END PGP SIGNATURE-


[security bulletin] HPSBMU03691 rev.1 - HPE Insight Control, Multiple Remote Vulnerabilities

2017-02-14 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05390722

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05390722
Version: 1

HPSBMU03691 rev.1 - HPE Insight Control, Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-02-14
Last Updated: 2017-02-14

Potential Security Impact: Local: Denial of Service (DoS); Remote: Access
Restriction Bypass, Cross-Site Request Forgery (CSRF), Cross-Site Scripting
(XSS), Denial of Service (DoS), Disclosure of Sensitive Information,
Execution of Arbitrary Commands, Unauthorized Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Several potential security vulnerabilities have been identified in HPE
Insight Control. The vulnerabilities could be exploited remotely resulting in
remote denial of Service (DoS), cross-site request forgery (CSRF), remote
execution of arbitrary commands, disclosure of sensitive information,
cross-site scripting (XSS), bypass access restriction or unauthorized
modification.

References:

  - CVE-2009-5028 - Namazu Remote Denial of Service
  - CVE-2011-4345 - Namazu Cross-site Scripting
  - CVE-2014-0050 - Apache Commons Collection Unauthorized Disclosure of
Information
  - CVE-2014-4877 - GNU Wget, Unauthorized Disclosure of Information
  - CVE-2015-5125 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5127 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5129 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5130 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5131 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5132 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5133 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5134 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5539 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5540 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5541 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5544 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5545 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5546 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5547 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5548 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5549 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5550 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5551 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5552 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5553 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5554 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015- - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5556 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5557 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5558 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5559 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5560 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5561 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5562 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5563 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5564 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5565 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5566 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5567 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5568 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5570 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5571 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5572 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5573 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5574 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5575 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5576 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5577 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5578 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5579 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5580 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5581 - Adobe Flash, Unauthorized Disclosure of Information
  - CVE-2015-5582 - Adobe Flash, 

[security bulletin] HPESBGN03698 rev.1 - HPE DDMi using OpenSSL, Remote Arbitrary Code Execution, Bypass Security Restrictions, Denial of Service (DoS)

2017-02-13 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05386804

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05386804
Version: 1

HPESBGN03698 rev.1 - HPE DDMi using OpenSSL, Remote Arbitrary Code Execution,
Bypass Security Restrictions, Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-02-06
Last Updated: 2017-02-06

Potential Security Impact: Remote: Arbitrary Code Execution, Bypass Security
Restrictions, Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Following security vulnerabilities in OpenSSL have been addressed in HPE
DDMi. 

* Multiple OpenSSL vulnerabilities which could be remotely exploited
resulting in Bypass Security Restrictions and Denial of Service (DoS) 
* The Cross-protocol attack on TLS using SSLv2 also known as "DROWN" which
could be exploited remotely resulting in disclosure of information.

References:

  - CVE-2016-2107 - OpenSSL vulnerability, Padding oracle in AES-NI CBC MAC
check
  - CVE-2016-2108 - OpenSSL vulnerability - Memory corruption in ASN.1
encoder
  - CVE-2016-0800 - "DROWN" SSLv2 vulnerability, disclosure of information

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE DDMI (Discovery and Dependency Mapping Inventory) v9.3x

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-0800
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-2107
  5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVE-2016-2108
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerabilities for the impacted versions of HPE DDMI:

* For CVE-2016-2017 and CVE-2016-2018 -


* For CVE-2016-0800 - 


HISTORY
Version:1 (rev.1) - 6 February 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYmKJ3AAoJELXhAxt7SZaig98H/AwjBw9BblbjWweLvs59jT06
uqWQIE3Dryv9cbC8JVc1B7KaMVqmrBnnnpIqz/2jckRyBlFW/Lm7DcjsP4UX+01l
y5hyCyaTyqr6DKaGPsqTnESpavzCPojz11nl08yuxA+Xp+5T6MITqLsb9sPrtZUW

[security bulletin] HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote Vulnerabilities

2017-02-13 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05385680
Version: 1

HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-02-03
Last Updated: 2017-02-03

Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.

References:

  - CVE-2016-8531 - Information Disclosure  - VSE
  - CVE-2016-8532 - XSS - VCEM
  - CVE-2016-8533 - Priviledge Escalation - VCEM
  - CVE-2016-8534 - Privilege Elevation - VSE
  - CVE-2016-8535 - Http Parameter Pollution - VCEM
  - CVE-2017-5780 - Clickjacking - MRM
  - CVE-2017-5781 - CSRF - VSE
  - CVE-2017-5782 - HSTS Header Missing - IO
  - CVE-2017-5783 - Clickjacking - SPM
  - CVE-2017-5784 - HSTS Header Missing - SPM
  - CVE-2017-5785 -  Information Disclosure - SPM
  - CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information 
  - CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015- - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
  - CVE-2015-5568 - Adobe Flash - unauthorized 

[security bulletin] HPESBHF03704 rev.1 - HPE OfficeConnect Network Switches, Local Unauthorized Data Modification

2017-02-13 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05388948

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05388948
Version: 1

HPESBHF03704 rev.1 - HPE OfficeConnect Network Switches, Local Unauthorized
Data Modification

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-02-10
Last Updated: 2017-02-10

Potential Security Impact: Local: Unauthorized Data Modification

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE OfficeConnect
Network Switches. The vulnerability could be exploited locally to allow
unauthorized data modification.

References:

  - CVE-2017-5786 - Local Unauthorized Data Modification

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE OfficeConnect 1820 8G Switch J9979A - all software versions prior to
PT.02.01 including: PT.01.03 through PT.02.01
  - HPE OfficeConnect 1820 24G PoE+ (185W) Switch J9983A - all software
versions prior to PT.02.01 including: PT.01.03 through PT.02.01
  - HPE OfficeConnect 1820 24G Switch J9980A - all software versions prior to
PT.02.01 including: PT.01.03 through PT.02.01
  - HPE OfficeConnect 1820 48G PoE+ (370W) Switch J9984A - all software
versions prior to PT.02.01 including: PT.01.03 through PT.02.01
  - HPE OfficeConnect 1820 48G Switch J9981A - all software versions prior to
PT.02.01 including: PT.01.03 through PT.02.01
  - HPE OfficeConnect 1820 8G PoE+ (65W) Switch J9982A - all software
versions prior to PT.02.01 including: PT.01.03 through PT.02.01

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2017-5786
  4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

The Hewlett-Packard Enterprise Company thanks Pekka Jrvinen (raspi) for
reporting this vulnerability to security-al...@hpe.com

RESOLUTION

HPE has made the following software update available to resolve the
vulnerability in the impacted versions of HPE OfficeConnect Network Switch.

Please install version PT.02.01 from the following location:


HISTORY
Version:1 (rev.1) - 10 February 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYnjhQAAoJELXhAxt7SZai9rEH/0Dkt5wBcTqXFqVJ1Rj5wjiP
fr2BnjYMt7YO47zxQMMGMePhz081YKVaGdK3zmXc/Hlvi3fOlnikyPJF/Kse9QV+

[security bulletin] HPESBNS03702 rev.1 - HPE NonStop OSS Core Utilities with Bash Shell, Local Arbitrary Command Execution, Elevation of Privilege

2017-02-13 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05388115

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05388115
Version: 1

HPESBNS03702 rev.1 - HPE NonStop OSS Core Utilities with Bash Shell, Local
Arbitrary Command Execution, Elevation of Privilege

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-02-09
Last Updated: 2017-02-09

Potential Security Impact: Local: Arbitrary Command Execution, Elevation of
Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Several potential security vulnerabilities have been discovered in the Bash
Shell in NonStop OSS Core Utilities. The vulnerabilities allow local users to
execute arbitrary commands with root privileges.

References:

  - CVE-2016-7543

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - NonStop Bash L series: T1202L01 - T1202L01^AAI; J and H series: T1202H01
- - T1202H01^AAG

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-7543
  8.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following updates to resolve these vulnerabilities in
the Bash Shell in HPE NonStop OSS Core Utilities:

 * L Series: T1202L01^AAJ (OSS Core Utilities)
 * J Series: T1202H01^AAK (OSS Core Utilities)
 * H Series: T1202H01^AAK (OSS Core Utilities)

Refer to NonStop Hotstuff HS03345 for additional details.

HISTORY
Version:1 (rev.1) - 9 February 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYnJUYAAoJELXhAxt7SZaiGLMH/0rCNFe3Zf5yqOz+cVG8fl1H
44nw3YHqfsYW3hCViwcJscMrqGRiuRnyQfXiLoIbDRgrG3GDiBzPQHEAUkk0lc+w
R5V/20m0GD/BWHYeBFVBEm38GSKaaVqj87sb5ZxMuFq2rDS4i55PXi8qjtKwb7Iq
FPnOhn943cFcJRF0RNZTEPknb8I8xYJVB5CS/m8XC2iLUDoRokLxCBhae34nIYof
DvGq/tPO8B1OwJS+2GVKt1jc+MxKfcLjoxMOS3NB5giYyUQAefntwWKHrbNLb+x8
tScQ1/lpk4be7clBwfPn4+5vJn4JEXOi1U4wYty2chZePybzA3reku8RCPxNzpM=
=mc9A
-END PGP SIGNATURE-


[security bulletin] HPSBST03588 rev 1. - HPE StoreVirtual 4000 Storage and StoreVirtual VSA Software running LeftHand OS, Remote Arbitrary Command Execution

2017-02-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05382958

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05382958
Version: 1

HPSBST03588 rev 1. - HPE StoreVirtual 4000 Storage and StoreVirtual VSA
Software running LeftHand OS, Remote Arbitrary Command Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-31
Last Updated: 2017-01-31

Potential Security Impact: Remote: Arbitrary Command Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE StoreVirtual
4000 Storage and StoreVirtual VSA Software running LeftHand OS. The
vulnerability could be remotely exploited resulting in arbitrary command
execution.

References:

  - CVE-2016-8529 - Remote Arbirtary Command Execution

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP StoreVirtual VSA Software Licenses - LeftHand OS v12.5 and earlier
  - HPE P4000 G2 SAN Solutions - LeftHand OS v12.5 and earlier
  - HP LeftHand P4000 Virtual SAN Appliance Software - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4130 600GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4130 600GB China SAS Storage - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 1TB MDL SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 450GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 900GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4330 1TB MDL China SAS Storage - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 450GB China SAS Storage - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 900GB China SAS Storage - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 FC 900GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4330 FC 900GB China SAS Storage - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4335 China Hybrid Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4335 Hybrid Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4530 2TB MDL SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4530 3TB MDL SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4530 4TB MDL SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4530 450GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4530 600GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4630 900GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4730 600GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4730 900GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4730 FC 900GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4130 600GB China SAS Storage - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4130 600GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4330 1TB MDL China SAS Storage - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 1TB MDL SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 450GB China SAS Storage - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 450GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 900GB China SAS Storage - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 900GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 FC 900GB China SAS Storage - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4330 FC 900GB SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4335 China Hybrid SAN Solution - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4335 Hybrid Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4335 China Hybrid Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4335 Hybrid SAN Solution - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4530 2TB MDL SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4530 3TB MDL SAS Storage - LeftHand OS v12.5 and earlier
  - HP StoreVirtual 4530 600GB SAS Storage/S-Buy - LeftHand OS v12.5 and
earlier
  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy - LeftHand OS v12.5 and
earlier
  - HP 

[security bulletin] HPESBHF03700 rev.1 - HPE iMC PLAT, Remote Disclosure of Information, Denial of Service (DoS)

2017-01-31 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05382418

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05382418
Version: 1

HPESBHF03700 rev.1 - HPE iMC PLAT, Remote Disclosure of Information, Denial
of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-31
Last Updated: 2017-01-31

Potential Security Impact: Remote: Denial of Service (DoS), Disclosure of
Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in iMC PLAT. The
vulnerability could be exploited remotely resulting in disclosure of
information or Denial of Service (DoS).

References:

  - CVE-2016-8525

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Intelligent Management Center (iMC)  - v7.2 E0403P06 and earlier

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-8525
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
  6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Jacob Baines of Tenable Network Security
for reporting this issue to security-al...@hpe.com

RESOLUTION

HPE has made the following software updates to resolve the vulnerability in
IMC PLAT.

 + **iMC PLAT - Version: Fixed in iMC PLAT 7.3 E0504**

  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A   HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU 
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU 
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU   
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU  
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU 
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU

HISTORY
Version:1 (rev.1) - 31 January 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers 

[security bulletin] HPESBGN03696 rev.1 - HPE Helion Eucalyptus, Remote Escalation of Privilege

2017-01-31 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05382868

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05382868
Version: 1

HPESBGN03696 rev.1 - HPE Helion Eucalyptus, Remote Escalation of Privilege

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-31
Last Updated: 2017-01-31

Potential Security Impact: Remote: Escalation of Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in certain HPE Helion
Eucalyptus services. The vulnerability allows a remote user to escalate
privileges in Eucalyptus EC2, AutoScaling, CloudWatch, and Load Balancing
services.

References:

  - CVE-2016-8528

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Helion Eucalyptus versions 3.3.0 through 4.3.1

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-8528
  8.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
  6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided a resolution to this security vulnerability:  
 
  * HPE Helion Eucalyptus version 4.3.1.1 resolves this issue.

HISTORY
Version:1 (rev.1) - 31 January 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYkN/YAAoJELXhAxt7SZaivpYH+QHumrLXcq+fvWmsQRtyfi3q
ojW/eYXhesKuveTs3xYpWbgttaAL/CQGEGSEHqrYSGH3umy8kli28G4N7Cz6A9EU
pdVAITMetvpxU4hTC4CWFlZ56I7g1XNpYAZnemUQYQ4pLFqSqw7NC5qww5lVVfk1
12sKvSrXhxTAH9X2iREKR877p3yUzGdCNCrdTsbdIJYIyAKiRXG4psTYYDJb9JdV
VTRaoyi3pXZQd80WXwmPehM7D0//uMOgtYGoF28tG5S0+jLmXgN/02Vmp5ssq1fi
qsJiVefDFMDE4tN7ODFIlKRPwWb6t2VwTezz5sg7XuCA8jQoqFyj87u/twYdFL4=
=cX8N
-END PGP SIGNATURE-


[security bulletin] HPSBHF03693 rev.1 - HPE iMC PLAT Network Products running Microsoft SQL Server, Remote Elevation of Privilege

2017-01-31 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05382740

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05382740
Version: 1

HPSBHF03693 rev.1 -  HPE iMC PLAT Network Products running Microsoft SQL
Server, Remote Elevation of Privilege

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-31
Last Updated: 2017-01-31

Potential Security Impact: Remote: Elevation of Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability identified with Microsoft SQL Server has
been addressed by HPE iMC PLAT network products. The vulnerability could be
exploited remotely by an authenticated user resulting in elevation of
privilege.

References:

  - CVE-2015-1761 - aka "SQL Server Elevation of Privilege Vulnerability"

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Intelligent Management Center (iMC) prior to 7.3 E0504 -  Please refer
to the RESOLUTION below for a list of impacted products. All product versions
are impacted prior to the fixed version listed.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2015-1761
  6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software update available to resolve the
vulnerability in the iMC PLAT network products listed.

  + iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0504
* HP Network Products
  - JD125A  HP IMC Std S/W Platform w/100-node
  - JD126A  HP IMC Ent S/W Platform w/100-node
  - JD808A  HP IMC Ent Platform w/100-node License
  - JD814A  HP A-IMC Enterprise Edition Software DVD Media
  - JD815A  HP IMC Std Platform w/100-node License
  - JD816A  HP A-IMC Standard Edition Software DVD Media
  - JF288AAE  HP Network Director to Intelligent Management Center
Upgrade E-LTU
  - JF289AAE  HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
  - JF377A  HP IMC Std S/W Platform w/100-node Lic
  - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU
  - JF378A  HP IMC Ent S/W Platform w/200-node Lic
  - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU
  - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU
  - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
  - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU
  - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU
  - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU
  - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade
50-node and 150-AP E-LTU
  - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point
E-LTU
  - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
  - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance
Edition E-LTU
  - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with
200-node E-LTU

**Note:** Please contact HPE Technical Support if any assistance is needed
acquiring the software updates.

HISTORY
Version:1 (rev.1) - 31 January 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall 

[security bulletin] HPSBST03642 rev.3 - HPE StoreVirtual Products running LeftHand OS using OpenSSL and OpenSSH, Remote Arbitrary Code Execution, Denial of Service (DoS), Disclosure of Sensitive Infor

2017-01-24 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05301946

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05301946
Version: 3

HPSBST03642 rev.3 - HPE StoreVirtual Products running LeftHand OS using
OpenSSL and OpenSSH, Remote Arbitrary Code Execution, Denial of Service
(DoS), Disclosure of Sensitive Information, Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-24
Last Updated: 2017-01-24

Potential Security Impact: Remote: Arbitrary Code Execution, Denial of
Service (DoS), Disclosure of Sensitive Information, Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Security vulnerabilities in OpenSSL and OpenSSH were addressed in HPE
StoreVirtual products using LeftHand OS. These vulnerabilities include: 

* The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy
Encryption" also known as "POODLE", which could be exploited remotely
resulting in disclosure of information. 

* Additional OpenSSL and OpenSSH vulnerabilities which could be remotely
exploited resulting in arbitrary code execution, unauthorized access,
disclosure of information, or Denial of Service (DoS).

References:

  - CVE-2016-0705 - Double-free in DSA private key parsing
  - CVE-2014-0224 - SSL/TLS man-in-the-middle (MITM) vulnerability
  - CVE-2014-0221 - Denial of Service (DoS)
  - CVE-2014-0195 - Buffer overflow via DTLS invalid fragment
  - CVE-2014-0198 - SSL_MODE_RELEASE_BUFFERS NULL pointer dereference
  - CVE-2014-3470 - Client-side denial of service when using anonymous ECDH
  - CVE-2014-0076 - ECDSA nonces susceptible to Yarom/Benger flush+reload
cache side-channel attack
  - CVE-2014-3566 - POODLE - SSLv3 vulnerability
  - CVE-2010-5298 - SSL_MODE_RELEASE_BUFFERS session injection or denial of
service

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP StoreVirtual VSA Software 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4335 China Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5
  - HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5
  - 

[security bulletin] HPSBHF03695 rev.1 - HPE Ethernet Adaptors, Remote Denial of Service (DoS)

2017-01-24 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05368378

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05368378
Version: 1

HPSBHF03695 rev.1 - HPE Ethernet Adaptors, Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-24
Last Updated: 2017-01-24

Potential Security Impact: Remote: Denial of Service (DoS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability with the Ethernet Non-Volatile Flash Memory (NVM)
image in Intel Forteville-based adapters has been addressed by certain HPE
Ethernet Adaptors. The vulnerability could be remotely exploited resulting in
Denial of Service (DoS).

References:

  - CVE-2016-8106 - Remote Denial of Service (DoS)
  - INTEL-SA-00063 - Intel Ethernet Controller X710/XL710 NVM Security
Vulnerability 

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE ProLiant XL260a G9 Server - All versions
  - HPE Ethernet 10Gb 2-port 562FLR-SFP+ Adapter - All versions
  - HPE Ethernet 10Gb 2-port 562SFP+ Adapter - All versions
  - HPE Ethernet 10Gb 4-port 563SFP+ Adapter - All versions

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-8106
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following updates to resolve the vulnerability with the
impacted HPE Ethernet Adaptors.

Intel NVM image version 5.05 or later is recommended. The HPE Ethernet
Adaptor images use NVM version 4.x and have been updated with the HotFix
which are available at the following locations:

  - 32-bit
Linux:
  - 64-bit
Linux:
  - 32-bit
Windows:
  - 64-bit
Windows: 
  - VMware:


  **Note:** For more details, please refer to the *Intel Security Advisory*
INTEL-SA-00063 about this vulnerability:
.

HISTORY
Version:1 (rev.1) - 24 January 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1


[security bulletin] HPSBHF03441 rev.2 - HPE iLO 3, iLO 4 and iLO 4 mRCA, Remote Multiple Vulnerabilities

2017-01-24 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05236950

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05236950
Version: 2

HPSBHF03441 rev.2 - HPE iLO 3, iLO 4 and iLO 4 mRCA, Remote Multiple
Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-25
Last Updated: 2017-01-24

Potential Security Impact: Remote: Multiple Vulnerabilities

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HPE Integrated
Lights Out 3, HPE Integrated Lights Out 4, and Integrated Lights Out 4 mRCA.
The vulnerabilities are remotely exploitable.

References:

  - CVE-2016-4375

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Integrated Lights-Out 3 (iLO 3), Firmware for ProLiant G7 Servers
prior to v1.88
  - HP Integrated Lights-Out 4 (iLO 4), prior to v2.44
  - HP iLO 4 mRCA prior to v2.32

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-4375
  5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided firmware updates to resolve the vulnerabilities. 

* iLO 3 version v1.88 or subsequent
* iLO 4 version v2.44 or subsequent
* iLO 4 version v2.32 for mRCA Moonshot cartridge or subsequent

The updates are available at the following locations.

The updates for iLO 3 (v1.88) are available at the following locations: 

Online ROM Flash Component for Windows x86

 * 

Online ROM Flash Component for Windows x64

 * 

Online ROM Flash Component for Linux

 * 


Online ROM Flash Component for VMware ESXi

 * 
 
 

The updates for iLO 4 (v2.44) are available at the following locations:  

Online ROM Flash Component for Windows x64

  *


Online ROM Flash Component for Windows x86

  *


Online ROM Flash Component for Linux 

  *


Online ROM Flash Component for VMware ESXi

  * 


The mRCA firmware is available in the Moonshot Component Pack 2016.07.0. The
service pack is available at the following location:

  *


HISTORY

Version:1 (rev.1) - 12 August 2016 Initial release

Version:2 (rev.2) - 24 January 2017 removed FTP URL links, updated https
links, simplified title, vulnerability description


Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for

[security bulletin] HPSBGN03690 rev.1 - HPE Real User Monitor (RUM), Remote Disclosure of Information

2017-01-24 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05369415

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05369415
Version: 1

HPSBGN03690 rev.1 - HPE Real User Monitor (RUM), Remote Disclosure of
Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-18
Last Updated: 2017-01-18

Potential Security Impact: Remote: Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in DES/3DES block ciphers used in the TLS protocol,
could potentially impact HPE Real User Monitor (RUM) resulting in remote
disclosure of information also known as the SWEET32 attack.

References:

  - CVE-2016-2183 - SWEET32

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Real User Monitor Software Series v9.2x, v9.30

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-2183
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following mitigation information to resolve the
vulnerability for impacted versions of HPE Real User Monitor (RUM):  

  *


HISTORY
Version:1 (rev.1) - 18 January 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYf9SAAAoJELXhAxt7SZaiFLwIAI61pEW1oeg9E0YZ1n2uDcR8
XNm/totEWGZisCQQ4mfd3lAti7Jz6/AjkxTNmhQZdetsiCJ289Aq6Fy+GmDfnuUK
FQ+ngmtvAf5roGF8esLfhr1pYXTNvBtFYzZpCB3NuFPm2eUixfjqfXglZur5AarD
9Tcl5KlqeM0wClerP8f2/FyIQTFL/qGrog+PULCwJTWNrdqJT0qMscxDU36/NR9W
WDe/o8uVdb8nsgtwK6wOBbglSARbETRp0rvgNdvhVLRNjSLOTFAezWx97CU6xxoQ
eXCZsa6vBWRs6lBkDLoXzlGwZgYoQlHIazaI7epqtOVrU99AUxGsgfotY/MxlMQ=
=Z2sI
-END PGP SIGNATURE-


[security bulletin] HPSBMU03685 rev.1 - HPE Insight Control server provisioning (ICsp), Multiple Remote Vulnerabilities

2017-01-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05376917

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05376917
Version: 1

HPSBMU03685 rev.1 - HPE Insight Control server provisioning (ICsp), Multiple
Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-18
Last Updated: 2017-01-18

Potential Security Impact: Remote: Arbitrary Code Execution, Arbitrary
Command Execution, Denial of Service (DoS), Disclosure of Sensitive
Information, Unauthorized Access to Files

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Insight Control server provisioning (ICsp) software. The vulnerabilities
could be exploited remotely resulting in Denial of Service (DoS), arbitrary
code execution, arbitrary command execution, unauthorized access to files or
disclosure of sensitive information.

References:

  - CVE-2015-6420 - Cisco routing and switching, execution of code
  - CVE-2016-0702 - OpenSSL, disclosure of information, "CacheBleed"
  - CVE-2016-0705 - OpenSSL, denial of service (DoS)
  - CVE-2016-0797 - OpenSSL, denial of service (DoS)
  - CVE-2016-0799 - OpenSSL, denial of service (DoS)
  - CVE-2016-2842 - OpenSSL, denial of service (DoS)
  - CVE-2015-7547 - glibc, denial of service (DoS)
  - CVE-2014-0050 -  Apache Commons FileUpload, denial of service (DoS) 
  - CVE-2014-4877 - wget, execution of arbitrary code

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Insight Control server provisioning all versions prior to 7.6

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2014-0050
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2014-4877
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVE-2015-6420
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2015-7547
  5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2016-0702
  2.9 CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-0705
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2016-0797
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2016-0799
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE-2016-2842
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates available to resolve the
vulnerabilities for the impacted versions of HPE Insight Control server
provisioning (ICsp). Please download the latest version of Insight Control
server provisioning (ICsp)-7.6 from the following location: 

  *


HISTORY
Version:1 (rev.1) - 18 January 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as 

[security bulletin] HPSBGN03689 rev.1 - HPE Diagnostics, Remote Cross-Site Scripting and Click Jacking

2017-01-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05370100

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05370100
Version: 1

HPSBGN03689 rev.1 - HPE Diagnostics, Remote Cross-Site Scripting and Click
Jacking

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-13
Last Updated: 2017-01-13

Potential Security Impact: Remote: Cross-Site Scripting (XSS)

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential vulnerabilities have been identified in HPE Diagnostics. The
vulnerabilities could be exploited remotely to allow Cross-Site Scripting and
Click Jacking.

References:

  - CVE-2016-8521 - Click Jacking
  - CVE-2016-8522 - Cross Site Scripting (XSS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Diagnostics 9.24 IP1, 9.26 , 9.26IP1

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-8521
  3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
  4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE-2016-8522
  2.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
  4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following mitigation information to resolve the
vulnerabilities for the impacted versions of HPE Diagnostics:  

  *


HISTORY
Version:1 (rev.1) - 13 January 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYeTBbAAoJELXhAxt7SZaiCg0H/RVp40EeGiuucjbNlRlLkaHp
SsSIysuaThZvLggG0roC9BOXzliCD/wD9G/xpmelR+1TXTwUTVL7SfQOrN3DRb/B
/bsN76c8w6NGUDbYYJX3tgu77bGfUumaWGjUJKbx+Qi4jgbT8+127Q8tpRKQnoii
u7wqm0FX1YYNYyjX+m7+dwqUNGaB2tgGDUD/77U8rW0wtHZOjkd1sl2WdR24iX9X
4n1lWdLGiclGSuyhQQ2r1jCepSnVECifgHLSKVhYsfCusE11w/ieQozyhc3BjMKn
qRqYXK5Z8Cnk0R13QtGJUlliuAwCf0AqKuq3JMtTHW8bwqidYOjK3TWrKMYhlac=
=owut
-END PGP SIGNATURE-


[security bulletin] HPSBST03671 rev.2 - HPE StoreEver MSL6480 Tape Library Management Interface, Multiple Remote Vulnerabilities

2017-01-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05333297

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05333297
Version: 2

HPSBST03671 rev.2 - HPE StoreEver MSL6480 Tape Library Management Interface,
Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-14
Last Updated: 2017-01-13

Potential Security Impact: Remote: Denial of Service (DoS), Unauthorized
Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in PHP was addressed by the HPE StoreEver MSL6480
Tape Library firmware version 5.10. The vulnerability could be exploited
remotely to allow Unauthorized Disclosure of Information or Denial of Service
via the Ethernet Management Interface.  Please note that the Management
Interface cannot access data stored on tape media, so this vulnerability does
not allow for remote unauthorized disclosure of data stored on tape media or
remote denial of service.

References:

  - CVE-2016-5385 - PHP, HTTPoxy
  - CVE-2016-3074 - PHP
  - CVE-2013-7456 - PHP
  - CVE-2016-5093 - PHP
  - CVE-2016-5094 - PHP
  - CVE-2016-5096 - PHP
  - CVE-2016-5766 - PHP
  - CVE-2016-5767 - PHP
  - CVE-2016-5768 - PHP
  - CVE-2016-5769 - PHP
  - CVE-2016-5770 - PHP
  - CVE-2016-5771 - PHP
  - CVE-2016-5772 - PHP
  - CVE-2016-5773 - PHP
  - CVE-2016-6207 - GD Graphics Library
  - CVE-2016-6289 - PHP
  - CVE-2016-6290 - PHP
  - CVE-2016-6291 - PHP
  - CVE-2016-6292 - PHP
  - CVE-2016-6293 - PHP
  - CVE-2016-6294 - PHP
  - CVE-2016-6295 - PHP
  - CVE-2016-6296 - PHP
  - CVE-2016-6297 - PHP
  - CVE-2016-5399 - PHP

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP StoreEver MSL6480 Tape Library prior to 5.10

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2013-7456
  7.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2016-3074
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-5093
  8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-5094
  8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-5096
  8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-5385
  8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVE-2016-5399
  8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVE-2016-5766
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2016-5767
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2016-5768
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-5769
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-5770
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-5771
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-5772
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-5773
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-6207
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2016-6289
  7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2016-6290
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-6291
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-6292
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2016-6293
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-6294
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-6295
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-6296
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2016-6297
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:


[security bulletin] HPSBGN03694 rev.1 - HPE SiteScope, Remote Disclosure of Information

2017-01-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05369403

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05369403
Version: 1

HPSBGN03694 rev.1 - HPE SiteScope, Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-12
Last Updated: 2017-01-12

Potential Security Impact: Remote: Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A security vulnerability in DES/3DES block ciphers used in the TLS protocol,
could potentially impact HPE SiteScope resulting in remote disclosure of
information, also known as the SWEET32 attack.

References:

  - CVE-2016-2183 - SWEET32
  - CVE-2016-6329 - OpenVPN, SWEET32

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP SiteScope Monitors Software Series 11.2x, 11.30-11.33

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-2183
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE-2016-6329
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to resolve the
vulnerability for the impacted versions of HPE SiteScope:  

  *


HISTORY
Version:1 (rev.1) - 12 January 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYd9+kAAoJELXhAxt7SZaiB/oIAK1y99IsHsSPUkFmTVtjK27U
GJ05byBwAoTOCiDfkcKtRTbEtC3DD35nBA5h062UWzctsfQV2nY7VC9ADPdDZAOs
ObuGAOeHS8GKP+bFe71JTj5UteQorFz8GeMmbKoz1X0a+4qOzBbLFeoe/FftK+Sq
xxdfQ+HMBh7dn+yK9FiV3uvxCcJzSTz5FB+VqB3KpEnh01N2Zu1datTLmZKBYARa
/CGbehURQZTGHpJ5L4XS+EcaicV/xfArC8MFg3Kk0pNLLqJgaVfP52/jJbllhAsH
dO7pRb5CCQG/xu7O0oL/LGahxQeG0EjWXxa+pdAeR06pMCDx6wommUMHC68QO4o=
=h0Vy
-END PGP SIGNATURE-


[security bulletin] HPSBGN03688 rev.1 - HPE Operations Orchestration, Remote Code Execution

2017-01-03 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05361944

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05361944
Version: 1

HPSBGN03688 rev.1 - HPE Operations Orchestration, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-01-03
Last Updated: 2017-01-03

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Operations
Orchestration. The vulnerability could be remotely exploited to allow remote
code execution.

References:

  - CVE-2016-8519 - Remote Code Execution

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Operations Orchestration (Community Edition) - all versions prior to
v10.70

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-8519
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Jacob Baines of Tenable Network Security
working with Trend Micro's Zero Day Initiative (ZDI) for reporting this issue
to security-al...@hpe.com

RESOLUTION

HPE has made the following software updates available to resolve the
vulnerability in impacted version of HPE Operations Orchestration:

* Please install HPE Operations Orchestration (Community Edition) v10.70 from
the following location:


HISTORY
Version:1 (rev.1) - 4 January 2017 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYa/hFAAoJELXhAxt7SZaimpUH/jJNvppyHyQHq5kzR1tDm5IT
o7lyEGrb2pvKkNEtER8jozkb8pAPwkNvpVcyl024qVK8MuJ2D/siEQhsYumcMF4R
JxH9tc0UDoUYy05/ovjYJLOej3iUlOrGetkU7Lcs0TDCnB/KLS4ZXm0ygVn+eypa
AvgwGiyi/kX99FXcCs9ndwUYD/2XIda6GdGNEraaB14Mdz06iqXwhOHCNbpDPvrC
rweXiVDP/LYpqx4vUxwCzklOxkacBIMogAlaHBzc6o9q7pLaoUdtuwaQqd7chSOt
6sDhE6sgToHvUPNJqcZVhb2K9uNrr/59z+2RMKBxfwi14VWkuOYDqjs1FLM9DAg=
=Kzss
-END PGP SIGNATURE-


[security bulletin] HPSBMU03684 rev.1 - HPE Version Control Repository Manager (VCRM), Multiple Remote Vulnerabilities

2016-12-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356363

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05356363
Version: 1

HPSBMU03684 rev.1 - HPE Version Control Repository Manager (VCRM), Multiple
Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-12-15
Last Updated: 2016-12-15

Potential Security Impact: Remote: Cross-Site Request Forgery (CSRF),
Disclosure of Information, Disclosure of Sensitive Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Several potential security vulnerabilities have been identified in HPE
Version Control Repository Manager(VCRM) on Windows and Linux. The
vulnerabilities could be exploited remotely resulting in Cross-Site Request
Forgery, Sensitive Information Disclosure, and Malicious File Upload.

References:

  - CVE-2016-8513 - Cross-Site Request Forgery (CSRF)
  - CVE-2016-8514 - Information Disclosure
  - CVE-2016-8515 - Malicious File Upload

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Version Control Repository Manager All versions prior to 7.6

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-8513
  5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
  6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)

CVE-2016-8514
  5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
  6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)

CVE-2016-8515
  3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
  4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software updates to resolve the
vulnerabilities for the impacted versions of HPE Version Control Repository
Manager (7.6) on Linux and Windows.

Please download the latest version of HPE Version Control Repository Manager
for Linux and Windows (7.6) from the following locations. Because VCRM for
Linux is only available through Systems Insight Manager (SIM) for Linux,
please use the following link:

For Linux:

 *

 
For Windows:

 * 

HISTORY
Version:1 (rev.1) - 15 December 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYUsULAAoJELXhAxt7SZaiUGgIAIER2s6GeoMqUNsxpeYsi8Xr
glv/RLNiDc/+Qhkte5BxZU63w9NLj+/yiFJT9Bzgssr30n5z35Ufz0DqcmSbNFRp

[security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information

2016-12-07 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05349499

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05349499
Version: 1

HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS,
Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-12-06
Last Updated: 2016-12-06

Potential Security Impact: Remote: Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability in the DES/3DES block ciphers could
potentially impact HPE Comware 5 and Comware 7 network products using
SSL/TLS. This vulnerability could be exploited remotely resulting in
disclosure of information.

References:

  - CVE-2016-2183 - "SWEET32" attack

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - Comware 5 (CW5) Products All versions - Please refer to the RESOLUTION
below for a list of impacted products.
  - Comware 7 (CW7) Products All versions - Please refer to the RESOLUTION
below for a list of impacted products.

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-2183
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has released the following mitigation information to resolve the
vulnerability in HPE Comware 5 and Comware 7 network products.

*Note:* Please contact HPE Technical Support for assistance configuring the
recommended settings.

**Mitigation for the DES/3DES vulnerabilities:**

HPE recommends using the “ssl server-policy” and/or the “ssl client-policy”
command to specify which ciphers to negotiate.

+ For Comware V7, do not include the following DES/3DES ciphers:

- exp_rsa_des_cbc_sha 
- rsa_3des_ede_cbc_sha
- rsa_des_cbc_sha

+ For Comware V5, do not include the following DES/3DES ciphers:

- rsa_3des_ede_cbc_sha 
- rsa_des_cbc_sha

using the “ssl server-policy” and/or the “ssl client-policy” command.

Refer to the *Security Command Reference* manual and *Release notes* for the
specific version running on the device for details.


**COMWARE 5 Products**

  + **A6600 (Comware 5) - Version: See Mitigation**
* HP Network Products
  - JC165A HP 6600 RPE-X1 Router Module
  - JC177A HP 6608 Router
  - JC177B HP 6608 Router Chassis
  - JC178A HP 6604 Router Chassis
  - JC178B HP 6604 Router Chassis
  - JC496A HP 6616 Router Chassis
  - JC566A HP 6600 RSE-X1 Router Main Processing Unit
  - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
  - JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit
  + **HSR6602 (Comware 5) - Version: See Mitigation**
* HP Network Products
  - JC176A HP 6602 Router Chassis
  - JG353A HP HSR6602-G Router
  - JG354A HP HSR6602-XG Router
  - JG355A HP 6600 MCP-X1 Router Main Processing Unit
  - JG356A HP 6600 MCP-X2 Router Main Processing Unit
  - JG776A HP HSR6602-G TAA-compliant Router
  - JG777A HP HSR6602-XG TAA-compliant Router
  - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
  + **HSR6800 (Comware 5) - Version: See Mitigation**
* HP Network Products
  - JG361A HP HSR6802 Router Chassis
  - JG361B HP HSR6802 Router Chassis
  - JG362A HP HSR6804 Router Chassis
  - JG362B HP HSR6804 Router Chassis
  - JG363A HP HSR6808 Router Chassis
  - JG363B HP HSR6808 Router Chassis
  - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
  - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
  + **MSR20 (Comware 5) - Version: See Mitigation**
* HP Network Products
  - JD432A HP A-MSR20-21 Router
  - JD662A HP MSR20-20 Router
  - JD663A HP A-MSR20-21 Router
  - JD663B HP MSR20-21 Router
  - JD664A HP MSR20-40 Router
  - JF228A HP MSR20-40 Router
  - JF283A HP MSR20-20 Router
  + **MSR20-1X  (Comware 5) - Version: See Mitigation**
* HP Network Products
  - JD431A HP MSR20-10 Router
  - JD667A HP MSR20-15 IW Multi-Service Router
  - JD668A HP MSR20-13 Multi-Service Router
  - JD669A HP MSR20-13 W Multi-Service Router
  - JD670A HP MSR20-15 A Multi-Service Router
  - JD671A HP MSR20-15 AW Multi-Service Router
  - JD672A HP MSR20-15 I Multi-Service Router
  - JD673A HP MSR20-11 Multi-Service Router
  - JD674A HP MSR20-12 Multi-Service Router
  - JD675A HP MSR20-12 W Multi-Service Router
  - JD676A HP MSR20-12 T1 Multi-Service Router
  - JF236A HP MSR20-15-I Router
  

[security bulletin] HPSBUX03665 rev.3 - HP-UX Tomcat-based Servlet Engine, Remote Denial of Service (DoS), URL Redirection

2016-11-30 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05324759

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05324759
Version: 3

HPSBUX03665 rev.3 - HP-UX Tomcat-based Servlet Engine, Remote Denial of
Service (DoS), URL Redirection

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-12-01
Last Updated: 2016-11-30

Potential Security Impact: Remote: Denial of Service (DoS), URL Redirection

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in the HP-UX
Tomcat-based Servlet Engine. These vulnerabilities could be exploited
remotely to create a Denial of Service (DoS) or URL Redirection.

References:

  - CVE-2016-3092 - Apache Tomcat, Remote Denial of Service (DoS)
  - CVE-2016-5388 - Apache Tomcat, Remote URL Redirection

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP-UX Tomcat-based Servlet v.7.x Engine B.11.31 - Tomcat 7 prior to
D.7.0.70.01

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-3092
  7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVE-2016-5388
  8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following software update to resolve the vulnerabilities
in HP-UX Apache Tomcat 7 Servlet Engine:

 * Tomcat 7.0.70.01 for HP-UX Release B.11.31 (IPF and PA-RISC)

+ 64 bit Depot: HP_UX_11.31_HPUXWS24ATW-B501-11-31-64.depot
+ 32 bit Depot: HP_UX_11.31_HPUXWS24ATW-B501-11-31-32.depot

* **Note:** The depot file can be found here:

+
  

 * Tomcat 7.0.70.01 for Apache 2.2:

+ Install the depot via the link provided and then follow these steps to
enable Tomcat 7.0.70.01 for Apache 2.2:  

1.Run “swremove” to remove the previously installed Tomcat (if any)

2.rm –rf /opt/hpws22/tomcat

3.Create the link using ln -s /opt/hpws24/tomcat /opt/hpws22/tomcat  

**MANUAL ACTIONS: Yes - Update**

Download and install the software update

**PRODUCT SPECIFIC INFORMATION**

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HPE and lists recommended actions that may apply to a specific
HP-UX system. It can also download patches and create a depot automatically.
For more information see:
 
  *


The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31 IA/PA
===  
hpuxws22TOMCAT.TOMCAT
hpuxws22TOMCAT.TOMCAT2
action: install revision D.7.0.70.01 or subsequent

END AFFECTED VERSIONS

HISTORY

Version:1 (rev.1) - 4 November 2016 Initial release

Version:2 (rev.2) - 8 November 2016 Removed extraneous text from background
section

Version:3 (rev.3) - 1 December 2016 Details added to enable Tomcat 7.0.70.01
for Apache 2.2, removed PSRT numbers, simplified title


Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or 

[security bulletin] HPSBGN03680 rev.1 - HPE Propel, Local Denial of Service (DoS), Escalation of Privilege

2016-11-30 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05347541

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05347541
Version: 1

HPSBGN03680 rev.1 - HPE Propel, Local Denial of Service (DoS), Escalation of
Privilege

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-30
Last Updated: 2016-11-30

Potential Security Impact: Local: Denial of Service (DoS), Escalation of
Privilege

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities were identified in HPE Propel. The
vulnerabilities could be exploited locally to allow escalation of privilege
or Denial of Service (DoS).

References:

  - CVE-2016-1669 - V8 (DoS) Buffer Overflow
  - CVE-2016-4997 - Linux kernel vulnerability
  - CVE-2016-5195 - Linux kernel, "Dirty COW"

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Propel v1.01, v1.11, v2.01, v2.10, v2.20

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-1669
  8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVE-2016-4997
  7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVE-2016-5195
  7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following mitigation information available to address the
vulnerabilities in the impacted versions of HPE Propel.

* For CVE-2016-1669 refer to 

* For CVE-2016-4997 refer to 

* For CVE-2016-5195 refer to 

HISTORY
Version:1 (rev.1) - 30 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYP1UoAAoJELXhAxt7SZaidRUH/RHRLgahmWX885du+1AR/FnU
xi+Qq7390EBX/p3Lym7fimwy3vhAvizDQui30txjFszr6TgPx5yv0uJPfoJQqlhm
c83mJAnNoKaHw9F9bJ7Irb42IyqBhvXdYj1BJHaAKs6xdvyejrgMLvoWf00eTbyD
yqsPw80oMWD+n0iB0ipU3Iae+QBUPVJZrxD/xfL6tqr93nQJ9QmGRVTQT+ovwwzp
Z2iuAmu33FjZoXermnrg2FvpB5/9oWVnFwJdwMSsAWZyh5P9uUeGP2tPShpx+5cY
Qgeo8anvhkQHHlVgCPqJnc4iL5D1GB1quCeLqwiYvx7ntTK5Czv/ZFC8LCVsJcw=
=Yk/8
-END PGP SIGNATURE-


[security bulletin] HPSBGN03677 rev.1 - HPE Network Automation using RPCServlet and Java Deserialization, Remote Code Execution

2016-11-30 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05344849

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05344849
Version: 1

HPSBGN03677 rev.1 - HPE Network Automation using RPCServlet and Java
Deserialization, Remote Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-11-30
Last Updated: 2016-11-30

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities in RPCServlet and Java deserialization
were addressed by HPE Network Automation. The vulnerabilities could be
remotely exploited to allow code execution.

References:

  - CVE-2016-8511 - RPCServlet, Deserialization of Untrusted Data 

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HP Network Automation Software v9.1x, v9.2x, v10.00, v10.00.01,
v10.00.02, v10.10, v10.11, v10.11.01, v10.20

BACKGROUND

  CVSS Base Metrics
  =
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-8511
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

Hewlett Packard Enterprise thanks Jacob Baines of Tenable Network Security
for working with Trend Micro's Zero Day Initiative (ZDI) for reporting this
issue to security-al...@hpe.com

RESOLUTION

HPE has made the following software updates and mitigation information to
resolve the vulnerability in HPE Network Automation.

Customers using v9.1x or v9.2x, please upgrade to v10.0x, or v10.1x or v10.2x
as follows:

For v10.0x, first apply patch 10.00.02, and then apply the patch 10.00.021.
The patches are available at the following location:

*

 

After applying the above patches, please follow the steps provided in the
“Enable Secure Communication with Satellites” section of the Hardening Guide
published at this location:

* 
 

For v10.10, customers should first install and upgrade to v10.11 using the
following link:

   *

 
and then apply the 10.11 patch.

For v10.11, first install patch v10.11.01 and then download and apply patch
v10.11.011 using following location:

*


In addition follow the steps given in the “Enable Secure Communication
with Satellites” section of the Hardening Guide published at this location:

*



For 10.20, apply the patch 10.20.001 available for download the following
location:

*


In addition follow the steps given in the “Enable Secure Communication
with Satellites” section of the Hardening Guide published at the following
location:

*



**Note:**

* v10.00.021 would supersede already released patch 10.00.02.01 

* v10.20.001 would supersede already released patch 10.20.00.01

HISTORY
Version:1 (rev.1) - 28 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-al...@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop 

  1   2   3   4   5   6   7   8   9   10   >