[security bulletin] HPSBUX03435 SSRT102977 rev.1 - HP-UX Web Server Suite running Apache, Remote Denial of Service (DoS)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c04926789 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04926789 Version: 1 HPSBUX03435 SSRT102977 rev.1 - HP-UX Web Server Suite running Apache, Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-01-07 Last Updated: 2016-01-07 Potential Security Impact: Remote Denial of Service (DoS) Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX Web Server Suite running Apache on HP-UX 11iv3. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) and other impacts including: The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification. The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information. Apache does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters. References: CVE-2015-4000 CVE-2015-2808 CVE-2015-3183 PSRT102977 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX Web Server Suite v4.05 HPUXWSATW405 httpd prior to 2.2.29.02 BACKGROUND CVSS 2.0 Base Metrics === Reference Base Vector Base Score CVE-2015-4000(AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-2808(AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-3183(AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 === Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HPE has provided the following software updates to resolve the vulnerabilities with HP-UX Web Server Suite running Apache. The updates are available for download from the following location: https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumbe r=HPUXWSATW406 Issues addressed: CVE-2015-4000: Disable Export cipher by default. DH parameter with 1024 bits is used by default. Allow to configure custom DHE or ECDHE parameters by appending the concerned parameter file to the certificate file given for the SSLCertificateFile directive. CVE-2015-2808: Disable RC4 cipher in configuration file. Notes: HP-UX Web Server Suite v4.06 HPUXWSATW406 contains the following components: Apache B.2.2.29.02 Tomcat Servlet Engine C.6.0.43.01 PHP 5.4.40.1 (Part of Apache) Webmin A.1.070.13 See HPE Security Bulletin HPSBUX03512 for information about resolution for Apache web server of HP-UX 11iv2 at the following location: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04832246 MANUAL ACTIONS: Yes - Update Download and install the software update PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HPE and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.31 IA/PA === hpuxws22APACHE.APACHE hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_PERL hpuxws22APACHE.PHP hpuxws22APACHE.WEBPROXY action: install revision B.2.2.29.02 or subsequent hpuxws22TOMCAT.TOMCAT action: install revision C.6.0.43.01 or subsequent HP-UX B.11.31 PA hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.29.02 or subsequent HP-UX B.11.23 IA/PA === hpuxws22WEBMIN.HPDOCS hpuxws22WEBMIN.WEBMIN action: install revision A.1.070.13 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 7 January 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-al...@hpe.com. Report: To report a potential security vulnerability with any HPE supported
[security bulletin] HPSBUX03435 SSRT102977 rev.1 - HP-UX Web Server Suite running Apache, Remote Denial of Service (DoS)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c04926789 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04926789 Version: 1 HPSBUX03435 SSRT102977 rev.1 - HP-UX Web Server Suite running Apache, Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-01-07 Last Updated: 2016-01-07 Potential Security Impact: Remote Denial of Service (DoS) Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX Web Server Suite running Apache on HP-UX 11iv3. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) and other impacts including: The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification. The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information. Apache does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters. References: CVE-2015-4000 CVE-2015-2808 CVE-2015-3183 PSRT102977 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX Web Server Suite v4.05 HPUXWSATW405 httpd prior to 2.2.29.02 BACKGROUND CVSS 2.0 Base Metrics === Reference Base Vector Base Score CVE-2015-4000(AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-2808(AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-3183(AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 === Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HPE has provided the following software updates to resolve the vulnerabilities with HP-UX Web Server Suite running Apache. The updates are available for download from the following location: https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumbe r=HPUXWSATW406 Issues addressed: CVE-2015-4000: Disable Export cipher by default. DH parameter with 1024 bits is used by default. Allow to configure custom DHE or ECDHE parameters by appending the concerned parameter file to the certificate file given for the SSLCertificateFile directive. CVE-2015-2808: Disable RC4 cipher in configuration file. Notes: HP-UX Web Server Suite v4.06 HPUXWSATW406 contains the following components: Apache B.2.2.29.02 Tomcat Servlet Engine C.6.0.43.01 PHP 5.4.40.1 (Part of Apache) Webmin A.1.070.13 See HPE Security Bulletin HPSBUX03512 for information about resolution for Apache web server of HP-UX 11iv2 at the following location: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04832246 MANUAL ACTIONS: Yes - Update Download and install the software update PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HPE and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.31 IA/PA === hpuxws22APACHE.APACHE hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_PERL hpuxws22APACHE.PHP hpuxws22APACHE.WEBPROXY action: install revision B.2.2.29.02 or subsequent hpuxws22TOMCAT.TOMCAT action: install revision C.6.0.43.01 or subsequent HP-UX B.11.31 PA hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.29.02 or subsequent HP-UX B.11.23 IA/PA === hpuxws22WEBMIN.HPDOCS hpuxws22WEBMIN.WEBMIN action: install revision A.1.070.13 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 7 January 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-al...@hpe.com. Report: To report a potential security vulnerability with any HPE supported