VARIoT IoT vulnerabilities database
    | VAR-201201-0170 | CVE-2011-4109 | Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check. Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL (0.9.8o). OpenSSL prone to multiple security vulnerabilities. 
An attacker may leverage these issues to obtain sensitive information, cause a denial-of-service condition and perform unauthorized actions. 
HP SSL for OpenVMS v 1.4-453 (based on OpenSSL 0.9.8o stream) and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Important: rhev-hypervisor5 security and bug fix update
Advisory ID:       RHSA-2012:0168-01
Product:           Red Hat Enterprise Virtualization
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-0168.html
Issue date:        2012-02-21
CVE Names:         CVE-2011-4109 CVE-2011-4576 CVE-2011-4619 
                   CVE-2012-0029 CVE-2012-0207 
=====================================================================
1. Summary:
An updated rhev-hypervisor5 package that fixes several security issues and
various bugs is now available. 
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section. 
2. Relevant releases/architectures:
RHEV Hypervisor for RHEL-5 - noarch
3. Description:
The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization
Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. 
It includes everything necessary to run and manage virtual machines: A
subset of the Red Hat Enterprise Linux operating environment and the Red
Hat Enterprise Virtualization Agent. 
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions. 
A heap overflow flaw was found in the way QEMU-KVM emulated the e1000
network interface card. A privileged guest user in a virtual machine whose
network interface is configured to use the e1000 emulated driver could use
this flaw to crash the host or, possibly, escalate their privileges on the
host. (CVE-2012-0029)
A divide-by-zero flaw was found in the Linux kernel's igmp_heard_query()
function. An attacker able to send certain IGMP (Internet Group Management
Protocol) packets to a target system could use this flaw to cause a denial
of service. (CVE-2011-4109)
An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. Incorrect initialization of SSL record padding bytes could
cause an SSL client or server to send a limited amount of possibly
sensitive data to its SSL peer via the encrypted connection. 
(CVE-2011-4576)
It was discovered that OpenSSL did not limit the number of TLS/SSL
handshake restarts required to support Server Gated Cryptography. A remote
attacker could use this flaw to make a TLS/SSL server using OpenSSL consume
an excessive amount of CPU by continuously restarting the handshake. 
(CVE-2011-4619)
Red Hat would like to thank Nicolae Mogoreanu for reporting CVE-2012-0029,
and Simon McVittie for reporting CVE-2012-0207. 
This updated package provides updated components that include fixes for
various security issues. These issues have no security impact on Red Hat
Enterprise Virtualization Hypervisor itself, however. The security fixes
included in this update address the following CVE numbers:
CVE-2006-1168 and CVE-2011-2716 (busybox issues)
CVE-2009-5029, CVE-2009-5064, CVE-2010-0830 and CVE-2011-1089 (glibc
issues)
CVE-2011-1083, CVE-2011-3638, CVE-2011-4086, CVE-2011-4127 and
CVE-2012-0028 (kernel issues)
CVE-2011-1526 (krb5 issue)
CVE-2011-4347 (kvm issue)
CVE-2010-4008, CVE-2011-0216, CVE-2011-2834, CVE-2011-3905, CVE-2011-3919
and CVE-2011-1944 (libxml2 issues)
CVE-2011-1749 (nfs-utils issue)
CVE-2011-4108 (openssl issue)
CVE-2011-0010 (sudo issue)
CVE-2011-1675 and CVE-2011-1677 (util-linux issues)
CVE-2010-0424 (vixie-cron issue)
This updated rhev-hypervisor5 package fixes various bugs. Documentation of
these changes will be available shortly in the Technical Notes document:
https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html
Users of Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues. 
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
606191 - after upgrade , reboot can't shut off network successfully and back to firstboot menu again
627538 - System will not boot sometimes when using rhevm to do upgrade twice. 
650179 - rhevm bridge came up instead of breth0 after fail to configure network
675325 - Changes to networking always clear the contents of resolv.conf
696875 - RHEVH bootup hanging in ovirt-early when doing LVM scanning
717535 - [RFE] No confirm message for ntp server setting
728895 - RHEV-H rpm should include a versions text file
732948 - CCISS: Auto install fail at creating physical volume. 
734110 - rhevh - upgrade ovirt node fails due to nonexistent breth0
734480 - [RFE] Add virt-who package to RHEVH
734710 - Register RHN satellite will fail if RHN satellite password include space. 
740127 - Provide our CPE name in a new system file
743938 - Make rhev-hypervisor RPM multi-installable like the kernel
747519 - RHEV-H 5.8 register to RHN will fail. 
747647 - Change rhev-hypervisor RPM to be rhev-hypervisor5 to allow coinstallations with rhev-hypervisor6
756178 - remove redundant brcm-iscsi.log rotation from ovirt-node now that it is in iscsi-initiator-utils
758465 - RHEV-H 5.8 register to RHN will fail if password contains quotes or spaces
759462 - Can not retrieve running guests UUID in RHEVH node. 
759632 - virt-who debugging output going to stderr always
759635 - Revert workaround of virt-who output
761357 - Multipathd service is stopped by default cause change password failed in single mode. 
768256 - network layout is incorrect when configure network with  nic up
771771 - CVE-2011-4109 openssl: double-free in policy checks
771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding
771780 - CVE-2011-4619 openssl: SGC restart DoS attack
772075 - CVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow
772867 - CVE-2012-0207 kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries
783625 - The setup command should only allow password setting and viewing logs in single mode. 
6. Package List:
RHEV Hypervisor for RHEL-5:
noarch:
rhev-hypervisor5-5.8-20120202.0.el5.noarch.rpm
rhev-hypervisor5-tools-5.8-20120202.0.el5.noarch.rpm
These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-4109.html
https://www.redhat.com/security/data/cve/CVE-2011-4576.html
https://www.redhat.com/security/data/cve/CVE-2011-4619.html
https://www.redhat.com/security/data/cve/CVE-2012-0029.html
https://www.redhat.com/security/data/cve/CVE-2012-0207.html
https://access.redhat.com/security/updates/classification/#important
https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPQ1yHXlSAg2UNWIIRAl9/AJ9JmPpSO5U2xwDBKDZA8y5To8EVcwCfZFGN
bzF952CZ/r5T3LUF9kY6X8c=
=IdNq
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-1357-1
February 09, 2012
openssl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
Multiple vulnerabilities exist in OpenSSL that could expose
sensitive information or cause applications to crash. 
Software Description:
- openssl: Secure Socket Layer (SSL) binary and related cryptographic tools
Details:
It was discovered that the elliptic curve cryptography (ECC) subsystem
in OpenSSL, when using the Elliptic Curve Digital Signature Algorithm
(ECDSA) for the ECDHE_ECDSA cipher suite, did not properly implement
curves over binary fields. This could allow an attacker to determine
private keys via a timing attack. This issue only affected Ubuntu 8.04
LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1945)
Adam Langley discovered that the ephemeral Elliptic Curve
Diffie-Hellman (ECDH) functionality in OpenSSL did not ensure thread
safety while processing handshake messages from clients. This issue only
affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu
11.04. (CVE-2011-3210)
Nadhem Alfardan and Kenny Paterson discovered that the Datagram
Transport Layer Security (DTLS) implementation in OpenSSL performed a
MAC check only if certain padding is valid. This could allow a remote
attacker to recover plaintext. (CVE-2011-4108)
Antonio Martin discovered that a flaw existed in the fix to address
CVE-2011-4108, the DTLS MAC check failure. This
issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10
and Ubuntu 11.04. (CVE-2011-4109)
It was discovered that OpenSSL, in certain circumstances involving
ECDH or ECDHE cipher suites, used an incorrect modular reduction
algorithm in its implementation of the P-256 and P-384 NIST elliptic
curves. This issue only
affected Ubuntu 8.04 LTS. (CVE-2011-4354)
Adam Langley discovered that the SSL 3.0 implementation in OpenSSL
did not properly initialize data structures for block cipher
padding. (CVE-2011-4576)
Andrew Chi discovered that OpenSSL, when RFC 3779 support is enabled,
could trigger an assert when handling an X.509 certificate containing
certificate-extension data associated with IP address blocks or
Autonomous System (AS) identifiers. (CVE-2011-4619)
Andrey Kulikov discovered that the GOST block cipher engine in OpenSSL
did not properly handle invalid parameters. This could allow a remote
attacker to cause a denial of service via crafted data from a TLS
client. This issue only affected Ubuntu 11.10. (CVE-2012-0027)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.10:
  libssl1.0.0                     1.0.0e-2ubuntu4.2
  openssl                         1.0.0e-2ubuntu4.2
Ubuntu 11.04:
  libssl0.9.8                     0.9.8o-5ubuntu1.2
  openssl                         0.9.8o-5ubuntu1.2
Ubuntu 10.10:
  libssl0.9.8                     0.9.8o-1ubuntu4.6
  openssl                         0.9.8o-1ubuntu4.6
Ubuntu 10.04 LTS:
  libssl0.9.8                     0.9.8k-7ubuntu8.8
  openssl                         0.9.8k-7ubuntu8.8
Ubuntu 8.04 LTS:
  libssl0.9.8                     0.9.8g-4ubuntu3.15
  openssl                         0.9.8g-4ubuntu3.15
After a standard system update you need to reboot your computer to make
all the necessary changes.  The Common Vulnerabilities and
Exposures project identifies the following vulnerabilities:
CVE-2011-4108
	The DTLS implementation performs a MAC check only if certain
	padding is valid, which makes it easier for remote attackers
	to recover plaintext via a padding oracle attack. 
CVE-2011-4354
	On 32-bit systems, the operations on NIST elliptic curves
	P-256 and P-384 are not correctly implemented, potentially
	leaking the private ECC key of a TLS server. 
For the oldstable distribution (lenny), these problems have been fixed
in version 0.9.8g-15+lenny15. 
For the stable distribution (squeeze), these problems have been fixed
in version 0.9.8o-4squeeze5. 
For the testing distribution (wheezy) and the unstable distribution
(sid), these problems have been fixed in version 1.0.0f-1. 
We recommend that you upgrade your openssl packages. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4109
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0027
 http://www.openssl.org/news/secadv_20120104.txt
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2011:
 2291c13c44539a5e25f58750a5d6bf8f  2011/i586/libopenssl1.0.0-1.0.0d-2.2-mdv2011.0.i586.rpm
 c610330d2c4c7397feb126247b1fa94f  2011/i586/libopenssl-devel-1.0.0d-2.2-mdv2011.0.i586.rpm
 36c86a84320e1c8a17a74e4e68bc7d5a  2011/i586/libopenssl-engines1.0.0-1.0.0d-2.2-mdv2011.0.i586.rpm
 4b8054f2c169d2b3223195053bd15802  2011/i586/libopenssl-static-devel-1.0.0d-2.2-mdv2011.0.i586.rpm
 3c48b209b941a83a6acfef439c3f78b7  2011/i586/openssl-1.0.0d-2.2-mdv2011.0.i586.rpm 
 7af9d175d066db069aeb82248df9772b  2011/SRPMS/openssl-1.0.0d-2.2.src.rpm
 Mandriva Linux 2011/X86_64:
 21a50bd2be83839266f033c9a0f0fabc  2011/x86_64/lib64openssl1.0.0-1.0.0d-2.2-mdv2011.0.x86_64.rpm
 7e80ee8e2d445c5f1985cd52d2316658  2011/x86_64/lib64openssl-devel-1.0.0d-2.2-mdv2011.0.x86_64.rpm
 e1f4faa3162a6bbc14b37e4cb8d1e8e2  2011/x86_64/lib64openssl-engines1.0.0-1.0.0d-2.2-mdv2011.0.x86_64.rpm
 6e3ac6d57cf0f4e13ed8e275a9bd2ff8  2011/x86_64/lib64openssl-static-devel-1.0.0d-2.2-mdv2011.0.x86_64.rpm
 e9e0306f8dc9f398915a646547e262e2  2011/x86_64/openssl-1.0.0d-2.2-mdv2011.0.x86_64.rpm 
 7af9d175d066db069aeb82248df9772b  2011/SRPMS/openssl-1.0.0d-2.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
Release Date: 2012-01-19
Last Updated: 2012-01-19
 ------------------------------------------------------------------------------
Potential Security Impact: Remote Denial of Service (DoS), unauthorized access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to create a Denial of Service (DoS) or to gain unauthorized access. 
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08s. 
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2011-3210    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4108    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
CVE-2011-4109    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       9.3
CVE-2011-4576    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0
CVE-2011-4577    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3
CVE-2011-4619    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided upgrades to resolve this vulnerability. 
The upgrades are available from the following location
ftp://ossl098s:Secure12@ftp.usa.hp.com
HP-UX Release / Depot Name
B.11.11 PA (32 and 64) / OpenSSL_A.00.09.08s.001_HP-UX_B.11.11_32+64.depot
B.11.23 (PA and IA) / OpenSSL_A.00.09.08s.002_HP-UX_B.11.23_IA-PA.depot
B.11.31 (PA and IA) / OpenSSL_A.00.09.08s.003_HP-UX_B.11.31_IA-PA.depot
MANUAL ACTIONS: Yes - Update
Install OpenSSL A.00.09.08s or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant. 
AFFECTED VERSIONS
HP-UX B.11.11
==================
openssl.OPENSSL-CER
openssl.OPENSSL-CONF
openssl.OPENSSL-DOC
openssl.OPENSSL-INC
openssl.OPENSSL-LIB
openssl.OPENSSL-MAN
openssl.OPENSSL-MIS
openssl.OPENSSL-PRNG
openssl.OPENSSL-PVT
openssl.OPENSSL-RUN
openssl.OPENSSL-SRC
action: Install revision A.00.09.08s.001 or subsequent
HP-UX B.11.23
==================
openssl.OPENSSL-CER
openssl.OPENSSL-CONF
openssl.OPENSSL-DOC
openssl.OPENSSL-INC
openssl.OPENSSL-LIB
openssl.OPENSSL-MAN
openssl.OPENSSL-MIS
openssl.OPENSSL-PRNG
openssl.OPENSSL-PVT
openssl.OPENSSL-RUN
openssl.OPENSSL-SRC
action: Install revision A.00.09.08s.002 or subsequent
HP-UX B.11.31
==================
openssl.OPENSSL-CER
openssl.OPENSSL-CONF
openssl.OPENSSL-DOC
openssl.OPENSSL-INC
openssl.OPENSSL-LIB
openssl.OPENSSL-MAN
openssl.OPENSSL-MIS
openssl.OPENSSL-PRNG
openssl.OPENSSL-PVT
openssl.OPENSSL-RUN
openssl.OPENSSL-SRC
action: Install revision A.00.09.08s.003 or subsequent
END AFFECTED VERSIONS
HISTORY
Version:1 (rev.1) 19 January 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel.  For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
                        
| VAR-201201-0030 | CVE-2011-4576 | Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer. Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL (0.9.8o). OpenSSL prone to multiple security vulnerabilities. 
An attacker may leverage these issues to obtain sensitive information, cause a denial-of-service condition and perform unauthorized actions. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03360041
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03360041
Version: 1
HPSBMU02786 SSRT100877 rev.1 - HP System Management Homepage (SMH) Running on
Linux and Windows, Remote Unauthorized Access, Disclosure of Information,
Data Modification, Denial of Service (DoS), Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible. 
Release Date: 2012-06-26
Last Updated: 2012-06-26
Potential Security Impact: Remote unauthorized access, disclosure of
information, data modification, Denial of Service (DoS), execution of
arbitrary code
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP System
Management Homepage (SMH) running on Linux and Windows. The vulnerabilities
could be exploited remotely resulting in unauthorized access, disclosure of
information, data modification, Denial of Service (DoS), and execution of
arbitrary code. 
References: CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-3379,
CVE-2011-3607, CVE-2011-4078, CVE-2011-4108, CVE-2011-4153, CVE-2011-4317,
CVE-2011-4415, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2011-4885,
CVE-2012-0021, CVE-2012-0027, CVE-2012-0031, CVE-2012-0036, CVE-2012-0053,
CVE-2012-0057, CVE-2012-0830, CVE-2012-1165, CVE-2012-1823,
CVE-2012-2012 (AUTOCOMPLETE enabled), CVE-2012-2013 (DoS),
CVE-2012-2014 (Improper input validation), CVE-2012-2015 (Privilege
Elevation),
CVE-2012-2016 (Information disclosure),
SSRT100336, SSRT100753, SSRT100669, SSRT100676,
SSRT100695, SSRT100714, SSRT100760, SSRT100786,
SSRT100787, SSRT100815, SSRT100840, SSRT100843, SSRT100869
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP System Management Homepage (SMH) before v7.1.1 running on Linux and
Windows. 
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2012-2012    (AV:N/AC:L/Au:N/C:C/I:C/A:P)       9.7
CVE-2012-2013    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8
CVE-2012-2014    (AV:N/AC:M/Au:S/C:N/I:N/A:N)       6.8
CVE-2012-2015    (AV:N/AC:M/Au:S/C:P/I:N/A:N)       6.5
CVE-2012-2016    (AV:L/AC:M/Au:S/C:C/I:N/A:N)       4.4
CVE-2011-1944    (AV:N/AC:M/Au:N/C:C/I:C/A:C)       9.3
CVE-2011-2821    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-2834    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8
CVE-2011-3379    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-3607    (AV:L/AC:M/Au:N/C:P/I:P/A:P)       4.4
CVE-2011-4078    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4108    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
CVE-2011-4153    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4317    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3
CVE-2011-4415    (AV:L/AC:H/Au:N/C:N/I:N/A:P)       1.2
CVE-2011-4576    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0
CVE-2011-4577    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3
CVE-2011-4619    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4885    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-0021    (AV:N/AC:H/Au:N/C:N/I:N/A:P)       2.6
CVE-2012-0027    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-0031    (AV:L/AC:L/Au:N/C:P/I:P/A:P)       4.6
CVE-2012-0036    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2012-0053    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
CVE-2012-0057    (AV:N/AC:L/Au:N/C:P/I:P/A:N)       6.4
CVE-2012-0830    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2012-1165    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-1823    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided HP System Management Homepage v7.1.1 or subsequent to resolve
the vulnerabilities. HP System Management Homepage v7.1.1 is available here:
HP System Management Homepage for Windows x64
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4064%257CswLang%253D8%257CswItem%253DMTX-ab
0d4e9bb4654a8da503eccfd9%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Windows x86
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4022%257CswLang%253D8%257CswItem%253DMTX-f7
c0d15d28474255bd0ec23136%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Linux (AMD64/EM64T)
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4035%257CswLang%253D8%257CswItem%253DMTX-18
d373dd1361400fbaca892942%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Linux (x86)
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4006%257CswLang%253D8%257CswItem%253DMTX-9e
8a0188f97d48139dcb466509%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HISTORY
Version:1 (rev.1) 26 June 2012 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel.  For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated
periodically, is contained in HP Security Notice HPSN-2011-001:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits;damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. 
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners. 
Corrected:      2012-05-03 15:25:11 UTC (RELENG_7, 7.4-STABLE)
                2012-05-03 15:25:11 UTC (RELENG_7_4, 7.4-RELEASE-p7)
                2012-05-03 15:25:11 UTC (RELENG_8, 8.3-STABLE)
                2012-05-03 15:25:11 UTC (RELENG_8_3, 8.3-RELEASE-p1)
                2012-05-03 15:25:11 UTC (RELENG_8_2, 8.2-RELEASE-p7)
                2012-05-03 15:25:11 UTC (RELENG_8_1, 8.1-RELEASE-p9)
                2012-05-03 15:25:11 UTC (RELENG_9, 9.0-STABLE)
                2012-05-03 15:25:11 UTC (RELENG_9_0, 9.0-RELEASE-p1)
CVE Name:       CVE-2011-4576, CVE-2011-4619, CVE-2011-4109,
                CVE-2012-0884, CVE-2012-2110
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:http://security.FreeBSD.org/>.   Background
FreeBSD includes software from the OpenSSL Project. 
II.  This could include
sensitive contents of previously freed memory. [CVE-2011-4619]
If an application uses OpenSSL's certificate policy checking when
verifying X509 certificates, by enabling the X509_V_FLAG_POLICY_CHECK
flag, a policy check failure can lead to a double-free. [CVE-2011-4109]
A weakness in the OpenSSL PKCS #7 code can be exploited using
Bleichenbacher's attack on PKCS #1 v1.5 RSA padding also known as the
million message attack (MMA). [CVE-2012-0884]
The asn1_d2i_read_bio() function, used by the d2i_*_bio and d2i_*_fp
functions, in OpenSSL contains multiple integer errors that can cause
memory corruption when parsing encoded ASN.1 data.  This error can occur
on systems that parse untrusted ASN.1 data, such as X.509 certificates
or RSA public keys. [CVE-2012-2110]
III. Impact
Sensitive contents of the previously freed memory can be exposed
when communicating with a SSL 3.0 peer.  However, FreeBSD OpenSSL
version does not support SSL_MODE_RELEASE_BUFFERS SSL mode and
therefore have a single write buffer per connection.  That write buffer
is partially filled with non-sensitive, handshake data at the beginning
of the connection and, thereafter, only records which are longer than
any previously sent record leak any non-encrypted data.  This, combined
with the small number of bytes leaked per record, serves to limit to
severity of this issue. [CVE-2011-4619]
The double-free, when an application performs X509 certificate policy
checking, can lead to denial of service in that application. 
[CVE-2011-4109]
A weakness in the OpenSSL PKCS #7 code can lead to a successful
Bleichenbacher attack.  Only users of PKCS #7 decryption operations are
affected.  A successful attack needs on average 2^20 messages. In
practice only automated systems will be affected as humans will not be
willing to process this many messages.  SSL/TLS applications are not
affected. [CVE-2012-0884]
The vulnerability in the asn1_d2i_read_bio() OpenSSL function can lead
to a potentially exploitable attack via buffer overflow.  The SSL/TLS
code in OpenSSL is not affected by this issue, nor are applications
using the memory based ASN.1 functions.  There are no applications in
FreeBSD base system affected by this issue, though some 3rd party
consumers of these functions might be vulnerable when processing
untrusted ASN.1 data.  [CVE-2012-2110]
IV.  Workaround
No workaround is available. 
V.   Solution
Perform one of the following:
1) Upgrade your vulnerable system to 7-STABLE, 8-STABLE or 9-STABLE,
or to the RELENG_7_4, RELENG_8_3, RELENG_8_2, RELENG_8_1, RELENG_9_0
security branch dated after the correction date. 
2) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to FreeBSD 7.4, 8.3,
8.2, 8.1, and 9.0 systems. 
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility. 
# fetch http://security.FreeBSD.org/patches/SA-12:01/openssl.patch
# fetch http://security.FreeBSD.org/patches/SA-12:01/openssl.patch.asc
b) Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile the operating system as described in
<URL: http://www.freebsd.org/handbook/makeworld.html> and reboot the
system. 
NOTE: Any third-party applications, including those installed from the
FreeBSD ports collection, which are statically linked to libcrypto(3)
should be recompiled in order to use the corrected code. 
3) To update your vulnerable system via a binary patch:
Systems running 7.4-RELEASE, 8.3-RELEASE, 8.2-RELEASE, 8.1-RELEASE or
9.0-RELEASE on the i386 or amd64 platforms can be updated via the
freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
VI.  Correction details
The following list contains the revision numbers of each file that was
corrected in FreeBSD. 
CVS:
Branch                                                           Revision
  Path
- - -------------------------------------------------------------------------
RELENG_7
  src/crypto/openssl/crypto/pkcs7/pk7_doit.c                 1.1.1.13.2.2
  src/crypto/openssl/crypto/mem.c                             1.1.1.8.2.2
  src/crypto/openssl/crypto/x509v3/pcy_map.c                  1.1.1.1.2.2
  src/crypto/openssl/crypto/x509v3/pcy_tree.c                 1.1.1.2.2.2
  src/crypto/openssl/crypto/asn1/a_d2i_fp.c                   1.1.1.3.2.1
  src/crypto/openssl/crypto/buffer/buffer.c                   1.1.1.4.2.2
  src/crypto/openssl/ssl/ssl_err.c                           1.1.1.11.2.3
  src/crypto/openssl/ssl/s3_srvr.c                           1.1.1.17.2.7
  src/crypto/openssl/ssl/ssl.h                               1.1.1.16.2.3
  src/crypto/openssl/ssl/s3_enc.c                            1.1.1.13.2.2
  src/crypto/openssl/ssl/ssl3.h                               1.1.1.6.2.2
RELENG_7_4
  src/UPDATING                                             1.507.2.36.2.9
  src/sys/conf/newvers.sh                                  1.72.2.18.2.12
  src/crypto/openssl/crypto/pkcs7/pk7_doit.c             1.1.1.13.2.1.2.1
  src/crypto/openssl/crypto/mem.c                         1.1.1.8.2.1.2.1
  src/crypto/openssl/crypto/x509v3/pcy_map.c              1.1.1.1.2.1.2.1
  src/crypto/openssl/crypto/x509v3/pcy_tree.c             1.1.1.2.2.1.2.1
  src/crypto/openssl/crypto/asn1/a_d2i_fp.c                  1.1.1.3.20.1
  src/crypto/openssl/crypto/buffer/buffer.c               1.1.1.4.2.1.2.1
  src/crypto/openssl/ssl/ssl_err.c                       1.1.1.11.2.2.2.1
  src/crypto/openssl/ssl/s3_srvr.c                       1.1.1.17.2.5.2.1
  src/crypto/openssl/ssl/ssl.h                           1.1.1.16.2.2.2.1
  src/crypto/openssl/ssl/s3_enc.c                        1.1.1.13.2.1.2.1
  src/crypto/openssl/ssl/ssl3.h                           1.1.1.6.2.1.2.1
RELENG_8
  src/crypto/openssl/crypto/pkcs7/pk7_doit.c                1.1.1.13.10.2
  src/crypto/openssl/crypto/mem.c                                 1.2.2.1
  src/crypto/openssl/crypto/x509v3/pcy_map.c                      1.2.2.1
  src/crypto/openssl/crypto/x509v3/pcy_tree.c                     1.2.2.2
  src/crypto/openssl/crypto/asn1/a_d2i_fp.c                  1.1.1.3.10.1
  src/crypto/openssl/crypto/buffer/buffer.c                       1.2.2.1
  src/crypto/openssl/ssl/ssl_err.c                                1.2.2.2
  src/crypto/openssl/ssl/s3_srvr.c                                1.3.2.5
  src/crypto/openssl/ssl/ssl.h                                    1.2.2.2
  src/crypto/openssl/ssl/s3_enc.c                                 1.2.2.2
  src/crypto/openssl/ssl/ssl3.h                                   1.2.2.2
RELENG_8_3
  src/UPDATING                                             1.632.2.26.2.3
  src/sys/conf/newvers.sh                                   1.83.2.15.2.5
  src/crypto/openssl/crypto/pkcs7/pk7_doit.c            1.1.1.13.10.1.4.1
  src/crypto/openssl/crypto/mem.c                                1.2.14.1
  src/crypto/openssl/crypto/x509v3/pcy_map.c                     1.2.14.1
  src/crypto/openssl/crypto/x509v3/pcy_tree.c                 1.2.2.1.6.1
  src/crypto/openssl/crypto/asn1/a_d2i_fp.c                  1.1.1.3.26.1
  src/crypto/openssl/crypto/buffer/buffer.c                      1.2.14.1
  src/crypto/openssl/ssl/ssl_err.c                            1.2.2.1.6.1
  src/crypto/openssl/ssl/s3_srvr.c                            1.3.2.4.2.1
  src/crypto/openssl/ssl/ssl.h                                1.2.2.1.6.1
  src/crypto/openssl/ssl/s3_enc.c                             1.2.2.1.4.1
  src/crypto/openssl/ssl/ssl3.h                               1.2.2.1.6.1
RELENG_8_2
  src/UPDATING                                             1.632.2.19.2.9
  src/sys/conf/newvers.sh                                  1.83.2.12.2.12
  src/crypto/openssl/crypto/pkcs7/pk7_doit.c            1.1.1.13.10.1.2.1
  src/crypto/openssl/crypto/mem.c                                 1.2.8.1
  src/crypto/openssl/crypto/x509v3/pcy_map.c                      1.2.8.1
  src/crypto/openssl/crypto/x509v3/pcy_tree.c                 1.2.2.1.4.1
  src/crypto/openssl/crypto/asn1/a_d2i_fp.c                  1.1.1.3.18.1
  src/crypto/openssl/crypto/buffer/buffer.c                       1.2.8.1
  src/crypto/openssl/ssl/ssl_err.c                            1.2.2.1.4.1
  src/crypto/openssl/ssl/s3_srvr.c                            1.3.2.3.2.1
  src/crypto/openssl/ssl/ssl.h                                1.2.2.1.4.1
  src/crypto/openssl/ssl/s3_enc.c                             1.2.2.1.2.1
  src/crypto/openssl/ssl/ssl3.h                               1.2.2.1.4.1
RELENG_8_1
  src/UPDATING                                            1.632.2.14.2.12
  src/sys/conf/newvers.sh                                  1.83.2.10.2.13
  src/crypto/openssl/crypto/pkcs7/pk7_doit.c                1.1.1.13.16.1
  src/crypto/openssl/crypto/mem.c                                 1.2.6.1
  src/crypto/openssl/crypto/x509v3/pcy_map.c                      1.2.6.1
  src/crypto/openssl/crypto/x509v3/pcy_tree.c                 1.2.2.1.2.1
  src/crypto/openssl/crypto/asn1/a_d2i_fp.c                  1.1.1.3.16.1
  src/crypto/openssl/crypto/buffer/buffer.c                       1.2.6.1
  src/crypto/openssl/ssl/ssl_err.c                            1.2.2.1.2.1
  src/crypto/openssl/ssl/s3_srvr.c                            1.3.2.2.2.1
  src/crypto/openssl/ssl/ssl.h                                1.2.2.1.2.1
  src/crypto/openssl/ssl/s3_enc.c                                 1.2.6.1
  src/crypto/openssl/ssl/ssl3.h                               1.2.2.1.2.1
RELENG_9
  src/crypto/openssl/crypto/pkcs7/pk7_doit.c                      1.2.2.1
  src/crypto/openssl/crypto/mem.c                                1.2.10.1
  src/crypto/openssl/crypto/x509v3/pcy_map.c                     1.2.10.1
  src/crypto/openssl/crypto/x509v3/pcy_tree.c                     1.3.2.1
  src/crypto/openssl/crypto/asn1/a_d2i_fp.c                  1.1.1.3.22.1
  src/crypto/openssl/crypto/buffer/buffer.c                      1.2.10.1
  src/crypto/openssl/ssl/ssl_err.c                                1.3.2.1
  src/crypto/openssl/ssl/s3_srvr.c                                1.7.2.1
  src/crypto/openssl/ssl/ssl.h                                    1.3.2.1
  src/crypto/openssl/ssl/s3_enc.c                                 1.3.2.1
  src/crypto/openssl/ssl/ssl3.h                                   1.3.2.1
RELENG_9_0
  src/UPDATING                                              1.702.2.4.2.3
  src/sys/conf/newvers.sh                                    1.95.2.4.2.5
  src/crypto/openssl/crypto/pkcs7/pk7_doit.c                      1.2.4.1
  src/crypto/openssl/crypto/mem.c                                1.2.12.1
  src/crypto/openssl/crypto/x509v3/pcy_map.c                     1.2.12.1
  src/crypto/openssl/crypto/x509v3/pcy_tree.c                     1.3.4.1
  src/crypto/openssl/crypto/asn1/a_d2i_fp.c                  1.1.1.3.24.1
  src/crypto/openssl/crypto/buffer/buffer.c                      1.2.12.1
  src/crypto/openssl/ssl/ssl_err.c                                1.3.4.1
  src/crypto/openssl/ssl/s3_srvr.c                                1.7.4.1
  src/crypto/openssl/ssl/ssl.h                                    1.3.4.1
  src/crypto/openssl/ssl/s3_enc.c                                 1.3.4.1
  src/crypto/openssl/ssl/ssl3.h                                   1.3.4.1
- - -------------------------------------------------------------------------
Subversion:
Branch/path                                                      Revision
- - -------------------------------------------------------------------------
stable/7/                                                         r234954
releng/7.4/                                                       r234954
stable/8/                                                         r234954
releng/8.3/                                                       r234954
releng/8.2/                                                       r234954
releng/8.1/                                                       r234954
stable/9/                                                         r234954
releng/9.0/                                                       r234954
- - -------------------------------------------------------------------------
VII. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201203-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Severity: Normal
    Title: OpenSSL: Multiple vulnerabilities
     Date: March 06, 2012
     Bugs: #397695, #399365
       ID: 201203-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenSSL, allowing remote
attackers to cause a Denial of Service or obtain sensitive information. 
Affected packages
=================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  dev-libs/openssl             < 1.0.0g                 *>= 0.9.8t
                                                            >= 1.0.0g
Description
===========
Multiple vulnerabilities have been found in OpenSSL:
* Timing differences for decryption are exposed by CBC mode encryption
  in OpenSSL's implementation of DTLS (CVE-2011-4108). 
* Assertion errors can occur during the handling of malformed X.509
  certificates when OpenSSL is built with RFC 3779 support
  (CVE-2011-4577). 
* Invalid parameters in the GOST block cipher are not properly handled
  by the GOST ENGINE(CVE-2012-0027). 
* An incorrect fix for CVE-2011-4108 creates an unspecified
  vulnerability for DTLS applications using OpenSSL (CVE-2012-0050). 
Resolution
==========
All OpenSSL users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.0g"
References
==========
[ 1 ] CVE-2011-4108
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4108
[ 2 ] CVE-2011-4109
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4109
[ 3 ] CVE-2011-4576
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4576
[ 4 ] CVE-2011-4577
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4577
[ 5 ] CVE-2011-4619
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4619
[ 6 ] CVE-2012-0027
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0027
[ 7 ] CVE-2012-0050
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0050
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201203-12.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. 
Multiple numeric conversion errors, leading to a buffer overflow, were
found in the way OpenSSL parsed ASN.1 (Abstract Syntax Notation One) data
from BIO (OpenSSL's I/O abstraction) inputs. Specially-crafted DER
(Distinguished Encoding Rules) encoded data read from a file or other BIO
input could cause an application using the OpenSSL library to crash or,
potentially, execute arbitrary code. (CVE-2012-2110)
A double free flaw was discovered in the policy checking code in OpenSSL. 
Warning: Before applying the update, back up your existing JBoss Enterprise
Web Server installation (including all applications and configuration
files). 
All users of JBoss Enterprise Web Server 1.0.2 for Solaris and Microsoft
Windows as provided from the Red Hat Customer Portal are advised to apply
this update. Solution:
The References section of this erratum contains a download link (you must
log in to download the update). Before applying the update, back up your
existing JBoss Enterprise Web Server installation (including all
applications and configuration files). -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Moderate: openssl security update
Advisory ID:       RHSA-2012:0059-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-0059.html
Issue date:        2012-01-24
CVE Names:         CVE-2011-4108 CVE-2011-4576 CVE-2011-4577 
                   CVE-2011-4619 
=====================================================================
1. Summary:
Updated openssl packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6. 
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section. 
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library. 
It was discovered that the Datagram Transport Layer Security (DTLS)
protocol implementation in OpenSSL leaked timing information when
performing certain operations. A remote attacker could possibly use this
flaw to retrieve plain text from the encrypted packets by using a DTLS
server as a padding oracle. (CVE-2011-4108)
An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. 
(CVE-2011-4576)
A denial of service flaw was found in the RFC 3779 implementation in
OpenSSL. A remote attacker could use this flaw to make an application using
OpenSSL exit unexpectedly by providing a specially-crafted X.509
certificate that has malformed RFC 3779 extension data. (CVE-2011-4577)
It was discovered that OpenSSL did not limit the number of TLS/SSL
handshake restarts required to support Server Gated Cryptography. A remote
attacker could use this flaw to make a TLS/SSL server using OpenSSL consume
an excessive amount of CPU by continuously restarting the handshake. 
(CVE-2011-4619)
All OpenSSL users should upgrade to these updated packages, which contain
backported patches to resolve these issues. For the update to take effect,
all services linked to the OpenSSL library must be restarted, or the system
rebooted. 
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
771770 - CVE-2011-4108 openssl: DTLS plaintext recovery attack
771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding
771778 - CVE-2011-4577 openssl: malformed RFC 3779 data can cause assertion failures
771780 - CVE-2011-4619 openssl: SGC restart DoS attack
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
ppc64:
openssl-1.0.0-20.el6_2.1.ppc.rpm
openssl-1.0.0-20.el6_2.1.ppc64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.ppc.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm
openssl-devel-1.0.0-20.el6_2.1.ppc.rpm
openssl-devel-1.0.0-20.el6_2.1.ppc64.rpm
s390x:
openssl-1.0.0-20.el6_2.1.s390.rpm
openssl-1.0.0-20.el6_2.1.s390x.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.s390.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm
openssl-devel-1.0.0-20.el6_2.1.s390.rpm
openssl-devel-1.0.0-20.el6_2.1.s390x.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
ppc64:
openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm
openssl-perl-1.0.0-20.el6_2.1.ppc64.rpm
openssl-static-1.0.0-20.el6_2.1.ppc64.rpm
s390x:
openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm
openssl-perl-1.0.0-20.el6_2.1.s390x.rpm
openssl-static-1.0.0-20.el6_2.1.s390x.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-4108.html
https://www.redhat.com/security/data/cve/CVE-2011-4576.html
https://www.redhat.com/security/data/cve/CVE-2011-4577.html
https://www.redhat.com/security/data/cve/CVE-2011-4619.html
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPHySOXlSAg2UNWIIRAlYpAKCQCY5k4gZ5VKOHZekEaWFHDNjGZwCZAdR3
CJl5iUxU4cxJLOsSBESSRVs=
=PMiS
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.  The Common Vulnerabilities and
Exposures project identifies the following vulnerabilities:
CVE-2011-4108
	The DTLS implementation performs a MAC check only if certain
	padding is valid, which makes it easier for remote attackers
	to recover plaintext via a padding oracle attack. 
CVE-2011-4109 
	A double free vulnerability when X509_V_FLAG_POLICY_CHECK is
	enabled, allows remote attackers to cause applications crashes
	and potentially allow execution of arbitrary code by
	triggering failure of a policy check. 
CVE-2011-4354
	On 32-bit systems, the operations on NIST elliptic curves
	P-256 and P-384 are not correctly implemented, potentially
	leaking the private ECC key of a TLS server. 
For the oldstable distribution (lenny), these problems have been fixed
in version 0.9.8g-15+lenny15. 
For the stable distribution (squeeze), these problems have been fixed
in version 0.9.8o-4squeeze5. 
For the testing distribution (wheezy) and the unstable distribution
(sid), these problems have been fixed in version 1.0.0f-1. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security
                        
| VAR-201201-0314 | CVE-2011-4619 | Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors. Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL (0.9.8o). OpenSSL prone to multiple security vulnerabilities. 
An attacker may leverage these issues to obtain sensitive information, cause a denial-of-service condition and perform unauthorized actions. 
DTLS Plaintext Recovery Attack (CVE-2011-4108)
==============================================
Nadhem Alfardan and Kenny Paterson have discovered an extension of the 
Vaudenay padding oracle attack on CBC mode encryption which enables an 
efficient plaintext recovery attack against the OpenSSL implementation
of DTLS. Their attack exploits timing differences arising during
decryption processing. A research paper describing this attack can be
found at http://www.isg.rhul.ac.uk/~kp/dtls.pdf
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
Security Group at Royal Holloway, University of London
(www.isg.rhul.ac.uk) for discovering this flaw and to Robin Seggelmann
<seggelmann@fh-muenster.de> and Michael Tuexen <tuexen@fh-muenster.de>
for preparing the fix. 
Double-free in Policy Checks (CVE-2011-4109)
============================================
If X509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy
check failure can lead to a double-free. The bug does not occur 
unless this flag is set. Users of OpenSSL 1.0.0 are not affected. 
This flaw was discovered by Ben Laurie and a fix provided by Emilia
Kasper <ekasper@google.com> of Google. This affects both clients and
servers that accept SSL 3.0 handshakes: those that call SSL_CTX_new with
SSLv3_{server|client}_method or SSLv23_{server|client}_method. It does
not affect TLS. This could include sensitive
contents of previously freed memory. 
However, in practice, most deployments do not use
SSL_MODE_RELEASE_BUFFERS and therefore have a single write buffer per
connection. That write buffer is partially filled with non-sensitive,
handshake data at the beginning of the connection and, thereafter,
only records which are longer any any previously sent record leak any
non-encrypted data. This, combined with the small number of bytes
leaked per record, serves to limit to severity of this issue. 
Thanks to Adam Langley <agl@chromium.org> for identifying and fixing
this issue. 
Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577)
====================================================================
RFC 3779 data can be included in certificates, and if it is malformed,
may trigger an assertion failure. This could be used in a
denial-of-service attack. 
Note, however, that in the standard release of OpenSSL, RFC 3779
support is disabled by default, and in this case OpenSSL is not
vulnerable. Builds of OpenSSL are vulnerable if configured with 
"enable-rfc3779". 
Thanks to Andrew Chi, BBN Technologies, for discovering the flaw, and
Rob Austein <sra@hactrn.net> for fixing it. 
Thanks to George Kadianakis <desnacked@gmail.com> for identifying
this issue and to Adam Langley <agl@chromium.org> for fixing it. 
Invalid GOST parameters DoS Attack (CVE-2012-0027)
===================================================
A malicious TLS client can send an invalid set of GOST parameters
which will cause the server to crash due to lack of error checking. 
This could be used in a denial-of-service attack. 
Only users of the OpenSSL GOST ENGINE are affected by this bug. 
Thanks to Andrey Kulikov <amdeich@gmail.com> for identifying and fixing
this issue. 
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20120104.txt
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03383940
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03383940
Version: 1
HPSBOV02793 SSRT100891 rev.1 - HP OpenVMS running SSL, Remote Denial of
Service (DoS), Unauthorized Access
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible. 
Release Date: 2012-06-21
Last Updated: 2012-06-21
Potential Security Impact: Remote Denial of Service (DoS), unauthorized
access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP OpenVMS
runing SSL. The vulnerabilities could be remotely exploited to cause a Denial
of Service (DoS) or to gain unauthorized access. 
References: CVE-2011-4108, CVE-2011-4109, CVE-2011-4576, CVE-2011-4577,
CVE-2011-4619, CVE-2012-0050, CVE-2012-0884, CVE-2012-1165, CVE-2012-2110,
CVE-2012-2131
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP SSL for OpenVMS v 1.4-453 (based on OpenSSL 0.9.8o stream) and earlier. 
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2011-4108    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
CVE-2011-4109    (AV:N/AC:M/Au:N/C:C/I:C/A:C)       9.3
CVE-2011-4576    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0
CVE-2011-4577    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3
CVE-2011-4619    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-0050    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-0884    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0
CVE-2012-1165    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-2110    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2012-2131    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following patch kits available to resolve the vulnerability. 
Patch kit Name
 Location
HP SSL 1.4-467 (Based on OpenSSL 0.9.8w)
 http://h71000.www7.hp.com/openvms/products/ssl/ssl.html
HISTORY
Version:1 (rev.1) 21 June 2012 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel.  For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated
periodically, is contained in HP Security Notice HPSN-2011-001:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits;damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. 
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners. 
Multiple numeric conversion errors, leading to a buffer overflow, were
found in the way OpenSSL parsed ASN.1 (Abstract Syntax Notation One) data
from BIO (OpenSSL's I/O abstraction) inputs. Specially-crafted DER
(Distinguished Encoding Rules) encoded data read from a file or other BIO
input could cause an application using the OpenSSL library to crash or,
potentially, execute arbitrary code. 
Warning: Before applying this update, back up your existing JBoss
Enterprise Application Platform installation and deployed applications, and
also back up your existing Apache HTTP Server installation (including all
applications and configuration files). 
All users of JBoss Enterprise Application Platform 6.0.0 for Solaris and
Microsoft Windows as provided from the Red Hat Customer Portal are advised
to apply this update. Solution:
The References section of this erratum contains a download link (you must
log in to download the update). Before applying the update, back up your
existing JBoss Enterprise Application Platform installation and deployed
applications, and also back up your existing Apache HTTP Server
installation (including all applications and configuration files). 
HP System Management Homepage (SMH) before v7.1.1 running on Linux, Windows
and VMware ESX. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Moderate: openssl security update
Advisory ID:       RHSA-2012:0059-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-0059.html
Issue date:        2012-01-24
CVE Names:         CVE-2011-4108 CVE-2011-4576 CVE-2011-4577 
                   CVE-2011-4619 
=====================================================================
1. Summary:
Updated openssl packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6. 
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section. 
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library. 
It was discovered that the Datagram Transport Layer Security (DTLS)
protocol implementation in OpenSSL leaked timing information when
performing certain operations. A remote attacker could possibly use this
flaw to retrieve plain text from the encrypted packets by using a DTLS
server as a padding oracle. (CVE-2011-4108)
An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. Incorrect initialization of SSL record padding bytes could
cause an SSL client or server to send a limited amount of possibly
sensitive data to its SSL peer via the encrypted connection. 
(CVE-2011-4576)
A denial of service flaw was found in the RFC 3779 implementation in
OpenSSL. A remote attacker could use this flaw to make an application using
OpenSSL exit unexpectedly by providing a specially-crafted X.509
certificate that has malformed RFC 3779 extension data. 
(CVE-2011-4619)
All OpenSSL users should upgrade to these updated packages, which contain
backported patches to resolve these issues. For the update to take effect,
all services linked to the OpenSSL library must be restarted, or the system
rebooted. 
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
771770 - CVE-2011-4108 openssl: DTLS plaintext recovery attack
771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding
771778 - CVE-2011-4577 openssl: malformed RFC 3779 data can cause assertion failures
771780 - CVE-2011-4619 openssl: SGC restart DoS attack
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
ppc64:
openssl-1.0.0-20.el6_2.1.ppc.rpm
openssl-1.0.0-20.el6_2.1.ppc64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.ppc.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm
openssl-devel-1.0.0-20.el6_2.1.ppc.rpm
openssl-devel-1.0.0-20.el6_2.1.ppc64.rpm
s390x:
openssl-1.0.0-20.el6_2.1.s390.rpm
openssl-1.0.0-20.el6_2.1.s390x.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.s390.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm
openssl-devel-1.0.0-20.el6_2.1.s390.rpm
openssl-devel-1.0.0-20.el6_2.1.s390x.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
ppc64:
openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm
openssl-perl-1.0.0-20.el6_2.1.ppc64.rpm
openssl-static-1.0.0-20.el6_2.1.ppc64.rpm
s390x:
openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm
openssl-perl-1.0.0-20.el6_2.1.s390x.rpm
openssl-static-1.0.0-20.el6_2.1.s390x.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-4108.html
https://www.redhat.com/security/data/cve/CVE-2011-4576.html
https://www.redhat.com/security/data/cve/CVE-2011-4577.html
https://www.redhat.com/security/data/cve/CVE-2011-4619.html
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPHySOXlSAg2UNWIIRAlYpAKCQCY5k4gZ5VKOHZekEaWFHDNjGZwCZAdR3
CJl5iUxU4cxJLOsSBESSRVs=
=PMiS
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.  The Common Vulnerabilities and
Exposures project identifies the following vulnerabilities:
CVE-2011-4108
	The DTLS implementation performs a MAC check only if certain
	padding is valid, which makes it easier for remote attackers
	to recover plaintext via a padding oracle attack. 
CVE-2011-4109 
	A double free vulnerability when X509_V_FLAG_POLICY_CHECK is
	enabled, allows remote attackers to cause applications crashes
	and potentially allow execution of arbitrary code by
	triggering failure of a policy check. 
CVE-2011-4354
	On 32-bit systems, the operations on NIST elliptic curves
	P-256 and P-384 are not correctly implemented, potentially
	leaking the private ECC key of a TLS server. 
For the oldstable distribution (lenny), these problems have been fixed
in version 0.9.8g-15+lenny15. 
For the stable distribution (squeeze), these problems have been fixed
in version 0.9.8o-4squeeze5. 
For the testing distribution (wheezy) and the unstable distribution
(sid), these problems have been fixed in version 1.0.0f-1. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
                        
| VAR-201201-0312 | CVE-2011-4577 | Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers. Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL (0.9.8o). OpenSSL prone to multiple security vulnerabilities. 
An attacker may leverage these issues to obtain sensitive information, cause a denial-of-service condition and perform unauthorized actions. 
DTLS Plaintext Recovery Attack (CVE-2011-4108)
==============================================
Nadhem Alfardan and Kenny Paterson have discovered an extension of the 
Vaudenay padding oracle attack on CBC mode encryption which enables an 
efficient plaintext recovery attack against the OpenSSL implementation
of DTLS. Their attack exploits timing differences arising during
decryption processing. A research paper describing this attack can be
found at http://www.isg.rhul.ac.uk/~kp/dtls.pdf
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
Security Group at Royal Holloway, University of London
(www.isg.rhul.ac.uk) for discovering this flaw and to Robin Seggelmann
<seggelmann@fh-muenster.de> and Michael Tuexen <tuexen@fh-muenster.de>
for preparing the fix. 
Double-free in Policy Checks (CVE-2011-4109)
============================================
If X509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy
check failure can lead to a double-free. The bug does not occur 
unless this flag is set. Users of OpenSSL 1.0.0 are not affected. 
This flaw was discovered by Ben Laurie and a fix provided by Emilia
Kasper <ekasper@google.com> of Google. This affects both clients and
servers that accept SSL 3.0 handshakes: those that call SSL_CTX_new with
SSLv3_{server|client}_method or SSLv23_{server|client}_method. It does
not affect TLS. This could include sensitive
contents of previously freed memory. 
However, in practice, most deployments do not use
SSL_MODE_RELEASE_BUFFERS and therefore have a single write buffer per
connection. That write buffer is partially filled with non-sensitive,
handshake data at the beginning of the connection and, thereafter,
only records which are longer any any previously sent record leak any
non-encrypted data. This, combined with the small number of bytes
leaked per record, serves to limit to severity of this issue. 
Thanks to Adam Langley <agl@chromium.org> for identifying and fixing
this issue. 
Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577)
====================================================================
RFC 3779 data can be included in certificates, and if it is malformed,
may trigger an assertion failure. This could be used in a
denial-of-service attack. 
Note, however, that in the standard release of OpenSSL, RFC 3779
support is disabled by default, and in this case OpenSSL is not
vulnerable. Builds of OpenSSL are vulnerable if configured with 
"enable-rfc3779". 
Thanks to Andrew Chi, BBN Technologies, for discovering the flaw, and
Rob Austein <sra@hactrn.net> for fixing it. 
Thanks to George Kadianakis <desnacked@gmail.com> for identifying
this issue and to Adam Langley <agl@chromium.org> for fixing it. 
Invalid GOST parameters DoS Attack (CVE-2012-0027)
===================================================
A malicious TLS client can send an invalid set of GOST parameters
which will cause the server to crash due to lack of error checking. 
This could be used in a denial-of-service attack. 
Only users of the OpenSSL GOST ENGINE are affected by this bug. 
Thanks to Andrey Kulikov <amdeich@gmail.com> for identifying and fixing
this issue. 
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20120104.txt
. 
HP SSL for OpenVMS v 1.4-453 (based on OpenSSL 0.9.8o stream) and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Moderate: openssl security update
Advisory ID:       RHSA-2012:0059-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-0059.html
Issue date:        2012-01-24
CVE Names:         CVE-2011-4108 CVE-2011-4576 CVE-2011-4577 
                   CVE-2011-4619 
=====================================================================
1. Summary:
Updated openssl packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6. 
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section. 
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library. 
It was discovered that the Datagram Transport Layer Security (DTLS)
protocol implementation in OpenSSL leaked timing information when
performing certain operations. A remote attacker could possibly use this
flaw to retrieve plain text from the encrypted packets by using a DTLS
server as a padding oracle. (CVE-2011-4108)
An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. Incorrect initialization of SSL record padding bytes could
cause an SSL client or server to send a limited amount of possibly
sensitive data to its SSL peer via the encrypted connection. 
(CVE-2011-4576)
A denial of service flaw was found in the RFC 3779 implementation in
OpenSSL. A remote attacker could use this flaw to make an application using
OpenSSL exit unexpectedly by providing a specially-crafted X.509
certificate that has malformed RFC 3779 extension data. (CVE-2011-4577)
It was discovered that OpenSSL did not limit the number of TLS/SSL
handshake restarts required to support Server Gated Cryptography. A remote
attacker could use this flaw to make a TLS/SSL server using OpenSSL consume
an excessive amount of CPU by continuously restarting the handshake. 
(CVE-2011-4619)
All OpenSSL users should upgrade to these updated packages, which contain
backported patches to resolve these issues. For the update to take effect,
all services linked to the OpenSSL library must be restarted, or the system
rebooted. 
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
771770 - CVE-2011-4108 openssl: DTLS plaintext recovery attack
771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding
771778 - CVE-2011-4577 openssl: malformed RFC 3779 data can cause assertion failures
771780 - CVE-2011-4619 openssl: SGC restart DoS attack
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
ppc64:
openssl-1.0.0-20.el6_2.1.ppc.rpm
openssl-1.0.0-20.el6_2.1.ppc64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.ppc.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm
openssl-devel-1.0.0-20.el6_2.1.ppc.rpm
openssl-devel-1.0.0-20.el6_2.1.ppc64.rpm
s390x:
openssl-1.0.0-20.el6_2.1.s390.rpm
openssl-1.0.0-20.el6_2.1.s390x.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.s390.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm
openssl-devel-1.0.0-20.el6_2.1.s390.rpm
openssl-devel-1.0.0-20.el6_2.1.s390x.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
ppc64:
openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm
openssl-perl-1.0.0-20.el6_2.1.ppc64.rpm
openssl-static-1.0.0-20.el6_2.1.ppc64.rpm
s390x:
openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm
openssl-perl-1.0.0-20.el6_2.1.s390x.rpm
openssl-static-1.0.0-20.el6_2.1.s390x.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-4108.html
https://www.redhat.com/security/data/cve/CVE-2011-4576.html
https://www.redhat.com/security/data/cve/CVE-2011-4577.html
https://www.redhat.com/security/data/cve/CVE-2011-4619.html
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPHySOXlSAg2UNWIIRAlYpAKCQCY5k4gZ5VKOHZekEaWFHDNjGZwCZAdR3
CJl5iUxU4cxJLOsSBESSRVs=
=PMiS
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-1357-1
February 09, 2012
openssl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
Multiple vulnerabilities exist in OpenSSL that could expose
sensitive information or cause applications to crash. 
Software Description:
- openssl: Secure Socket Layer (SSL) binary and related cryptographic tools
Details:
It was discovered that the elliptic curve cryptography (ECC) subsystem
in OpenSSL, when using the Elliptic Curve Digital Signature Algorithm
(ECDSA) for the ECDHE_ECDSA cipher suite, did not properly implement
curves over binary fields. This could allow an attacker to determine
private keys via a timing attack. This issue only affected Ubuntu 8.04
LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1945)
Adam Langley discovered that the ephemeral Elliptic Curve
Diffie-Hellman (ECDH) functionality in OpenSSL did not ensure thread
safety while processing handshake messages from clients. This
could allow a remote attacker to cause a denial of service via
out-of-order messages that violate the TLS protocol. This issue only
affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu
11.04. This could allow a remote
attacker to recover plaintext. This could allow a remote
attacker to cause a denial of service. This
could allow a remote attacker to cause a denial of service. This
issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10
and Ubuntu 11.04. (CVE-2011-4109)
It was discovered that OpenSSL, in certain circumstances involving
ECDH or ECDHE cipher suites, used an incorrect modular reduction
algorithm in its implementation of the P-256 and P-384 NIST elliptic
curves. This issue only
affected Ubuntu 8.04 LTS. This could allow a remote attacker
to cause a denial of service. This could allow a remote attacker to cause a denial of
service. (CVE-2011-4619)
Andrey Kulikov discovered that the GOST block cipher engine in OpenSSL
did not properly handle invalid parameters. This could allow a remote
attacker to cause a denial of service via crafted data from a TLS
client. This issue only affected Ubuntu 11.10. (CVE-2012-0027)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.10:
  libssl1.0.0                     1.0.0e-2ubuntu4.2
  openssl                         1.0.0e-2ubuntu4.2
Ubuntu 11.04:
  libssl0.9.8                     0.9.8o-5ubuntu1.2
  openssl                         0.9.8o-5ubuntu1.2
Ubuntu 10.10:
  libssl0.9.8                     0.9.8o-1ubuntu4.6
  openssl                         0.9.8o-1ubuntu4.6
Ubuntu 10.04 LTS:
  libssl0.9.8                     0.9.8k-7ubuntu8.8
  openssl                         0.9.8k-7ubuntu8.8
Ubuntu 8.04 LTS:
  libssl0.9.8                     0.9.8g-4ubuntu3.15
  openssl                         0.9.8g-4ubuntu3.15
After a standard system update you need to reboot your computer to make
all the necessary changes. Relevant releases/architectures:
RHEV Hypervisor for RHEL-6 - noarch
3. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. 
A heap overflow flaw was found in the way QEMU-KVM emulated the e1000
network interface card. A privileged guest user in a virtual machine whose
network interface is configured to use the e1000 emulated driver could use
this flaw to crash the host or, possibly, escalate their privileges on the
host. The security fixes
included in this update address the following CVE numbers:
CVE-2009-5029 and CVE-2011-4609 (glibc issues)
CVE-2012-0056 (kernel issue)
CVE-2011-4108 and CVE-2012-0050 (openssl issues)
This update also fixes the following bugs:
* Previously, it was possible to begin a Hypervisor installation without
any valid disks to install to. 
Now, if no valid disks are found for Hypervisor installation, a message is
displayed informing the user that there are no valid disks for
installation. (BZ#781471)
* Previously, the user interface for the Hypervisor did not indicate
whether the system was registered with Red Hat Network (RHN) Classic or RHN
Satellite. As a result, customers could not easily determine the
registration status of their Hypervisor installations. 
The TUI has been updated to display the registration status of the
Hypervisor. (BZ#788223)
* Previously, autoinstall would fail if the firstboot or reinstall options
were passed but local_boot or upgrade were not passed. Now, neither the
local_boot or upgrade parameters are required for autoinstall. 
788225 - autoinstall fails when local_boot or upgrade not passed on command line
788226 - rhev-hypervisor6 6.2 Update 2 Release bugzilla
6. 
Release Date: 2012-01-19
Last Updated: 2012-01-19
 ------------------------------------------------------------------------------
Potential Security Impact: Remote Denial of Service (DoS), unauthorized access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to create a Denial of Service (DoS) or to gain unauthorized access. 
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08s. 
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2011-3210    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4108    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
CVE-2011-4109    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       9.3
CVE-2011-4576    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0
CVE-2011-4577    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3
CVE-2011-4619    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided upgrades to resolve this vulnerability. 
The upgrades are available from the following location
ftp://ossl098s:Secure12@ftp.usa.hp.com
HP-UX Release / Depot Name
B.11.11 PA (32 and 64) / OpenSSL_A.00.09.08s.001_HP-UX_B.11.11_32+64.depot
B.11.23 (PA and IA) / OpenSSL_A.00.09.08s.002_HP-UX_B.11.23_IA-PA.depot
B.11.31 (PA and IA) / OpenSSL_A.00.09.08s.003_HP-UX_B.11.31_IA-PA.depot
MANUAL ACTIONS: Yes - Update
Install OpenSSL A.00.09.08s or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant. 
AFFECTED VERSIONS
HP-UX B.11.11
==================
openssl.OPENSSL-CER
openssl.OPENSSL-CONF
openssl.OPENSSL-DOC
openssl.OPENSSL-INC
openssl.OPENSSL-LIB
openssl.OPENSSL-MAN
openssl.OPENSSL-MIS
openssl.OPENSSL-PRNG
openssl.OPENSSL-PVT
openssl.OPENSSL-RUN
openssl.OPENSSL-SRC
action: Install revision A.00.09.08s.001 or subsequent
HP-UX B.11.23
==================
openssl.OPENSSL-CER
openssl.OPENSSL-CONF
openssl.OPENSSL-DOC
openssl.OPENSSL-INC
openssl.OPENSSL-LIB
openssl.OPENSSL-MAN
openssl.OPENSSL-MIS
openssl.OPENSSL-PRNG
openssl.OPENSSL-PVT
openssl.OPENSSL-RUN
openssl.OPENSSL-SRC
action: Install revision A.00.09.08s.002 or subsequent
HP-UX B.11.31
==================
openssl.OPENSSL-CER
openssl.OPENSSL-CONF
openssl.OPENSSL-DOC
openssl.OPENSSL-INC
openssl.OPENSSL-LIB
openssl.OPENSSL-MAN
openssl.OPENSSL-MIS
openssl.OPENSSL-PRNG
openssl.OPENSSL-PVT
openssl.OPENSSL-RUN
openssl.OPENSSL-SRC
action: Install revision A.00.09.08s.003 or subsequent
END AFFECTED VERSIONS
HISTORY
Version:1 (rev.1) 19 January 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel.  For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
                        
| VAR-201201-0169 | CVE-2011-4108 | Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack. Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL (0.9.8o). OpenSSL prone to multiple security vulnerabilities. 
An attacker may leverage these issues to obtain sensitive information, cause a denial-of-service condition and perform unauthorized actions. Their attack exploits timing differences arising during
decryption processing. A research paper describing this attack can be
found at http://www.isg.rhul.ac.uk/~kp/dtls.pdf
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
Security Group at Royal Holloway, University of London
(www.isg.rhul.ac.uk) for discovering this flaw and to Robin Seggelmann
<seggelmann@fh-muenster.de> and Michael Tuexen <tuexen@fh-muenster.de>
for preparing the fix. 
Double-free in Policy Checks (CVE-2011-4109)
============================================
If X509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy
check failure can lead to a double-free. The bug does not occur 
unless this flag is set. Users of OpenSSL 1.0.0 are not affected. 
This flaw was discovered by Ben Laurie and a fix provided by Emilia
Kasper <ekasper@google.com> of Google. This affects both clients and
servers that accept SSL 3.0 handshakes: those that call SSL_CTX_new with
SSLv3_{server|client}_method or SSLv23_{server|client}_method. It does
not affect TLS. This could include sensitive
contents of previously freed memory. 
However, in practice, most deployments do not use
SSL_MODE_RELEASE_BUFFERS and therefore have a single write buffer per
connection. That write buffer is partially filled with non-sensitive,
handshake data at the beginning of the connection and, thereafter,
only records which are longer any any previously sent record leak any
non-encrypted data. This, combined with the small number of bytes
leaked per record, serves to limit to severity of this issue. 
Thanks to Adam Langley <agl@chromium.org> for identifying and fixing
this issue. 
Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577)
====================================================================
RFC 3779 data can be included in certificates, and if it is malformed,
may trigger an assertion failure. This could be used in a
denial-of-service attack. 
Note, however, that in the standard release of OpenSSL, RFC 3779
support is disabled by default, and in this case OpenSSL is not
vulnerable. Builds of OpenSSL are vulnerable if configured with 
"enable-rfc3779". 
Thanks to Andrew Chi, BBN Technologies, for discovering the flaw, and
Rob Austein <sra@hactrn.net> for fixing it. 
Thanks to George Kadianakis <desnacked@gmail.com> for identifying
this issue and to Adam Langley <agl@chromium.org> for fixing it. 
Invalid GOST parameters DoS Attack (CVE-2012-0027)
===================================================
A malicious TLS client can send an invalid set of GOST parameters
which will cause the server to crash due to lack of error checking. 
This could be used in a denial-of-service attack. 
Only users of the OpenSSL GOST ENGINE are affected by this bug. 
Thanks to Andrey Kulikov <amdeich@gmail.com> for identifying and fixing
this issue. 
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20120104.txt
. 
Multiple numeric conversion errors, leading to a buffer overflow, were
found in the way OpenSSL parsed ASN.1 (Abstract Syntax Notation One) data
from BIO (OpenSSL's I/O abstraction) inputs. Specially-crafted DER
(Distinguished Encoding Rules) encoded data read from a file or other BIO
input could cause an application using the OpenSSL library to crash or,
potentially, execute arbitrary code. 
Warning: Before applying this update, back up your JBoss Enterprise
Application Platform's "server/[PROFILE]/deploy/" directory, along with all
other customized configuration files. 
All users of JBoss Enterprise Application Platform 5.1.2 for Solaris and
Microsoft Windows as provided from the Red Hat Customer Portal are advised
to apply this update. Solution:
The References section of this erratum contains a download link (you must
log in to download the update). Before applying the update, back up your
existing JBoss Enterprise Application Platform installation (including all
applications and configuration files). 
HP SSL for OpenVMS v 1.4-453 (based on OpenSSL 0.9.8o stream) and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03360041
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03360041
Version: 1
HPSBMU02786 SSRT100877 rev.1 - HP System Management Homepage (SMH) Running on
Linux and Windows, Remote Unauthorized Access, Disclosure of Information,
Data Modification, Denial of Service (DoS), Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible. 
Release Date: 2012-06-26
Last Updated: 2012-06-26
Potential Security Impact: Remote unauthorized access, disclosure of
information, data modification, Denial of Service (DoS), execution of
arbitrary code
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP System
Management Homepage (SMH) running on Linux and Windows. The vulnerabilities
could be exploited remotely resulting in unauthorized access, disclosure of
information, data modification, Denial of Service (DoS), and execution of
arbitrary code. 
References: CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-3379,
CVE-2011-3607, CVE-2011-4078, CVE-2011-4108, CVE-2011-4153, CVE-2011-4317,
CVE-2011-4415, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2011-4885,
CVE-2012-0021, CVE-2012-0027, CVE-2012-0031, CVE-2012-0036, CVE-2012-0053,
CVE-2012-0057, CVE-2012-0830, CVE-2012-1165, CVE-2012-1823,
CVE-2012-2012 (AUTOCOMPLETE enabled), CVE-2012-2013 (DoS),
CVE-2012-2014 (Improper input validation), CVE-2012-2015 (Privilege
Elevation),
CVE-2012-2016 (Information disclosure),
SSRT100336, SSRT100753, SSRT100669, SSRT100676,
SSRT100695, SSRT100714, SSRT100760, SSRT100786,
SSRT100787, SSRT100815, SSRT100840, SSRT100843, SSRT100869
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP System Management Homepage (SMH) before v7.1.1 running on Linux and
Windows. 
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2012-2012    (AV:N/AC:L/Au:N/C:C/I:C/A:P)       9.7
CVE-2012-2013    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8
CVE-2012-2014    (AV:N/AC:M/Au:S/C:N/I:N/A:N)       6.8
CVE-2012-2015    (AV:N/AC:M/Au:S/C:P/I:N/A:N)       6.5
CVE-2012-2016    (AV:L/AC:M/Au:S/C:C/I:N/A:N)       4.4
CVE-2011-1944    (AV:N/AC:M/Au:N/C:C/I:C/A:C)       9.3
CVE-2011-2821    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-2834    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8
CVE-2011-3379    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-3607    (AV:L/AC:M/Au:N/C:P/I:P/A:P)       4.4
CVE-2011-4078    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4108    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
CVE-2011-4153    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4317    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3
CVE-2011-4415    (AV:L/AC:H/Au:N/C:N/I:N/A:P)       1.2
CVE-2011-4576    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0
CVE-2011-4577    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3
CVE-2011-4619    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4885    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-0021    (AV:N/AC:H/Au:N/C:N/I:N/A:P)       2.6
CVE-2012-0027    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-0031    (AV:L/AC:L/Au:N/C:P/I:P/A:P)       4.6
CVE-2012-0036    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2012-0053    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
CVE-2012-0057    (AV:N/AC:L/Au:N/C:P/I:P/A:N)       6.4
CVE-2012-0830    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2012-1165    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-1823    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided HP System Management Homepage v7.1.1 or subsequent to resolve
the vulnerabilities. HP System Management Homepage v7.1.1 is available here:
HP System Management Homepage for Windows x64
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4064%257CswLang%253D8%257CswItem%253DMTX-ab
0d4e9bb4654a8da503eccfd9%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Windows x86
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4022%257CswLang%253D8%257CswItem%253DMTX-f7
c0d15d28474255bd0ec23136%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Linux (AMD64/EM64T)
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4035%257CswLang%253D8%257CswItem%253DMTX-18
d373dd1361400fbaca892942%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Linux (x86)
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4006%257CswLang%253D8%257CswItem%253DMTX-9e
8a0188f97d48139dcb466509%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HISTORY
Version:1 (rev.1) 26 June 2012 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel.  For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated
periodically, is contained in HP Security Notice HPSN-2011-001:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits;damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. 
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Moderate: openssl security update
Advisory ID:       RHSA-2012:0059-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-0059.html
Issue date:        2012-01-24
CVE Names:         CVE-2011-4108 CVE-2011-4576 CVE-2011-4577 
                   CVE-2011-4619 
=====================================================================
1. Summary:
Updated openssl packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6. 
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section. 
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library. 
It was discovered that the Datagram Transport Layer Security (DTLS)
protocol implementation in OpenSSL leaked timing information when
performing certain operations. A remote attacker could possibly use this
flaw to retrieve plain text from the encrypted packets by using a DTLS
server as a padding oracle. (CVE-2011-4108)
An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. Incorrect initialization of SSL record padding bytes could
cause an SSL client or server to send a limited amount of possibly
sensitive data to its SSL peer via the encrypted connection. 
(CVE-2011-4576)
A denial of service flaw was found in the RFC 3779 implementation in
OpenSSL. A remote attacker could use this flaw to make an application using
OpenSSL exit unexpectedly by providing a specially-crafted X.509
certificate that has malformed RFC 3779 extension data. (CVE-2011-4577)
It was discovered that OpenSSL did not limit the number of TLS/SSL
handshake restarts required to support Server Gated Cryptography. A remote
attacker could use this flaw to make a TLS/SSL server using OpenSSL consume
an excessive amount of CPU by continuously restarting the handshake. 
(CVE-2011-4619)
All OpenSSL users should upgrade to these updated packages, which contain
backported patches to resolve these issues. For the update to take effect,
all services linked to the OpenSSL library must be restarted, or the system
rebooted. 
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
771770 - CVE-2011-4108 openssl: DTLS plaintext recovery attack
771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding
771778 - CVE-2011-4577 openssl: malformed RFC 3779 data can cause assertion failures
771780 - CVE-2011-4619 openssl: SGC restart DoS attack
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
ppc64:
openssl-1.0.0-20.el6_2.1.ppc.rpm
openssl-1.0.0-20.el6_2.1.ppc64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.ppc.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm
openssl-devel-1.0.0-20.el6_2.1.ppc.rpm
openssl-devel-1.0.0-20.el6_2.1.ppc64.rpm
s390x:
openssl-1.0.0-20.el6_2.1.s390.rpm
openssl-1.0.0-20.el6_2.1.s390x.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.s390.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm
openssl-devel-1.0.0-20.el6_2.1.s390.rpm
openssl-devel-1.0.0-20.el6_2.1.s390x.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
ppc64:
openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm
openssl-perl-1.0.0-20.el6_2.1.ppc64.rpm
openssl-static-1.0.0-20.el6_2.1.ppc64.rpm
s390x:
openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm
openssl-perl-1.0.0-20.el6_2.1.s390x.rpm
openssl-static-1.0.0-20.el6_2.1.s390x.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm
x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-4108.html
https://www.redhat.com/security/data/cve/CVE-2011-4576.html
https://www.redhat.com/security/data/cve/CVE-2011-4577.html
https://www.redhat.com/security/data/cve/CVE-2011-4619.html
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPHySOXlSAg2UNWIIRAlYpAKCQCY5k4gZ5VKOHZekEaWFHDNjGZwCZAdR3
CJl5iUxU4cxJLOsSBESSRVs=
=PMiS
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-1357-1
February 09, 2012
openssl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
Multiple vulnerabilities exist in OpenSSL that could expose
sensitive information or cause applications to crash. 
Software Description:
- openssl: Secure Socket Layer (SSL) binary and related cryptographic tools
Details:
It was discovered that the elliptic curve cryptography (ECC) subsystem
in OpenSSL, when using the Elliptic Curve Digital Signature Algorithm
(ECDSA) for the ECDHE_ECDSA cipher suite, did not properly implement
curves over binary fields. This could allow an attacker to determine
private keys via a timing attack. This issue only affected Ubuntu 8.04
LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1945)
Adam Langley discovered that the ephemeral Elliptic Curve
Diffie-Hellman (ECDH) functionality in OpenSSL did not ensure thread
safety while processing handshake messages from clients. This
could allow a remote attacker to cause a denial of service via
out-of-order messages that violate the TLS protocol. This issue only
affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu
11.04. This could allow a remote
attacker to recover plaintext. This could allow a remote
attacker to cause a denial of service. This
could allow a remote attacker to cause a denial of service. This
issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10
and Ubuntu 11.04. (CVE-2011-4109)
It was discovered that OpenSSL, in certain circumstances involving
ECDH or ECDHE cipher suites, used an incorrect modular reduction
algorithm in its implementation of the P-256 and P-384 NIST elliptic
curves. This issue only
affected Ubuntu 8.04 LTS. (CVE-2011-4576)
Andrew Chi discovered that OpenSSL, when RFC 3779 support is enabled,
could trigger an assert when handling an X.509 certificate containing
certificate-extension data associated with IP address blocks or
Autonomous System (AS) identifiers. This could allow a remote attacker
to cause a denial of service. This could allow a remote attacker to cause a denial of
service. (CVE-2011-4619)
Andrey Kulikov discovered that the GOST block cipher engine in OpenSSL
did not properly handle invalid parameters. This could allow a remote
attacker to cause a denial of service via crafted data from a TLS
client. This issue only affected Ubuntu 11.10. (CVE-2012-0027)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.10:
  libssl1.0.0                     1.0.0e-2ubuntu4.2
  openssl                         1.0.0e-2ubuntu4.2
Ubuntu 11.04:
  libssl0.9.8                     0.9.8o-5ubuntu1.2
  openssl                         0.9.8o-5ubuntu1.2
Ubuntu 10.10:
  libssl0.9.8                     0.9.8o-1ubuntu4.6
  openssl                         0.9.8o-1ubuntu4.6
Ubuntu 10.04 LTS:
  libssl0.9.8                     0.9.8k-7ubuntu8.8
  openssl                         0.9.8k-7ubuntu8.8
Ubuntu 8.04 LTS:
  libssl0.9.8                     0.9.8g-4ubuntu3.15
  openssl                         0.9.8g-4ubuntu3.15
After a standard system update you need to reboot your computer to make
all the necessary changes. 
CVE-2011-4109 
	A double free vulnerability when X509_V_FLAG_POLICY_CHECK is
	enabled, allows remote attackers to cause applications crashes
	and potentially allow execution of arbitrary code by
	triggering failure of a policy check. 
CVE-2011-4354
	On 32-bit systems, the operations on NIST elliptic curves
	P-256 and P-384 are not correctly implemented, potentially
	leaking the private ECC key of a TLS server. 
For the oldstable distribution (lenny), these problems have been fixed
in version 0.9.8g-15+lenny15. 
For the stable distribution (squeeze), these problems have been fixed
in version 0.9.8o-4squeeze5. 
For the testing distribution (wheezy) and the unstable distribution
(sid), these problems have been fixed in version 1.0.0f-1. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security
                        
| VAR-201201-0049 | CVE-2012-0027 | Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client. Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL (0.9.8o). OpenSSL prone to multiple security vulnerabilities. 
An attacker may leverage these issues to obtain sensitive information, cause a denial-of-service condition and perform unauthorized actions. 
DTLS Plaintext Recovery Attack (CVE-2011-4108)
==============================================
Nadhem Alfardan and Kenny Paterson have discovered an extension of the 
Vaudenay padding oracle attack on CBC mode encryption which enables an 
efficient plaintext recovery attack against the OpenSSL implementation
of DTLS. Their attack exploits timing differences arising during
decryption processing. A research paper describing this attack can be
found at http://www.isg.rhul.ac.uk/~kp/dtls.pdf
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
Security Group at Royal Holloway, University of London
(www.isg.rhul.ac.uk) for discovering this flaw and to Robin Seggelmann
<seggelmann@fh-muenster.de> and Michael Tuexen <tuexen@fh-muenster.de>
for preparing the fix. 
Affected users should upgrade to OpenSSL 1.0.0f or 0.9.8s. 
Double-free in Policy Checks (CVE-2011-4109)
============================================
If X509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy
check failure can lead to a double-free. The bug does not occur 
unless this flag is set. Users of OpenSSL 1.0.0 are not affected. 
This flaw was discovered by Ben Laurie and a fix provided by Emilia
Kasper <ekasper@google.com> of Google. 
Affected users should upgrade to OpenSSL 0.9.8s. 
Uninitialized SSL 3.0 Padding (CVE-2011-4576)
=============================================
OpenSSL prior to 1.0.0f and 0.9.8s failed to clear the bytes used as
block cipher padding in SSL 3.0 records. This affects both clients and
servers that accept SSL 3.0 handshakes: those that call SSL_CTX_new with
SSLv3_{server|client}_method or SSLv23_{server|client}_method. It does
not affect TLS. 
As a result, in each record, up to 15 bytes of uninitialized memory
may be sent, encrypted, to the SSL peer. This could include sensitive
contents of previously freed memory. 
However, in practice, most deployments do not use
SSL_MODE_RELEASE_BUFFERS and therefore have a single write buffer per
connection. That write buffer is partially filled with non-sensitive,
handshake data at the beginning of the connection and, thereafter,
only records which are longer any any previously sent record leak any
non-encrypted data. This, combined with the small number of bytes
leaked per record, serves to limit to severity of this issue. 
Thanks to Adam Langley <agl@chromium.org> for identifying and fixing
this issue. 
Affected users should upgrade to OpenSSL 1.0.0f or 0.9.8s. 
Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577)
====================================================================
RFC 3779 data can be included in certificates, and if it is malformed,
may trigger an assertion failure. This could be used in a
denial-of-service attack. 
Note, however, that in the standard release of OpenSSL, RFC 3779
support is disabled by default, and in this case OpenSSL is not
vulnerable. Builds of OpenSSL are vulnerable if configured with 
"enable-rfc3779". 
Thanks to Andrew Chi, BBN Technologies, for discovering the flaw, and
Rob Austein <sra@hactrn.net> for fixing it. 
Affected users should upgrade to OpenSSL 1.0.0f or 0.9.8s. 
SGC Restart DoS Attack (CVE-2011-4619)
======================================
Support for handshake restarts for server gated cryptograpy (SGC) can
be used in a denial-of-service attack. 
Thanks to George Kadianakis <desnacked@gmail.com> for identifying
this issue and to Adam Langley <agl@chromium.org> for fixing it. 
Affected users should upgrade to OpenSSL 1.0.0f or 0.9.8s. 
This could be used in a denial-of-service attack. 
Only users of the OpenSSL GOST ENGINE are affected by this bug. 
Thanks to Andrey Kulikov <amdeich@gmail.com> for identifying and fixing
this issue. 
Affected users should upgrade to OpenSSL 1.0.0f. 
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20120104.txt
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03360041
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03360041
Version: 1
HPSBMU02786 SSRT100877 rev.1 - HP System Management Homepage (SMH) Running on
Linux and Windows, Remote Unauthorized Access, Disclosure of Information,
Data Modification, Denial of Service (DoS), Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible. 
Release Date: 2012-06-26
Last Updated: 2012-06-26
Potential Security Impact: Remote unauthorized access, disclosure of
information, data modification, Denial of Service (DoS), execution of
arbitrary code
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP System
Management Homepage (SMH) running on Linux and Windows. The vulnerabilities
could be exploited remotely resulting in unauthorized access, disclosure of
information, data modification, Denial of Service (DoS), and execution of
arbitrary code. 
References: CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-3379,
CVE-2011-3607, CVE-2011-4078, CVE-2011-4108, CVE-2011-4153, CVE-2011-4317,
CVE-2011-4415, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2011-4885,
CVE-2012-0021, CVE-2012-0027, CVE-2012-0031, CVE-2012-0036, CVE-2012-0053,
CVE-2012-0057, CVE-2012-0830, CVE-2012-1165, CVE-2012-1823,
CVE-2012-2012 (AUTOCOMPLETE enabled), CVE-2012-2013 (DoS),
CVE-2012-2014 (Improper input validation), CVE-2012-2015 (Privilege
Elevation),
CVE-2012-2016 (Information disclosure),
SSRT100336, SSRT100753, SSRT100669, SSRT100676,
SSRT100695, SSRT100714, SSRT100760, SSRT100786,
SSRT100787, SSRT100815, SSRT100840, SSRT100843, SSRT100869
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP System Management Homepage (SMH) before v7.1.1 running on Linux and
Windows. 
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2012-2012    (AV:N/AC:L/Au:N/C:C/I:C/A:P)       9.7
CVE-2012-2013    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8
CVE-2012-2014    (AV:N/AC:M/Au:S/C:N/I:N/A:N)       6.8
CVE-2012-2015    (AV:N/AC:M/Au:S/C:P/I:N/A:N)       6.5
CVE-2012-2016    (AV:L/AC:M/Au:S/C:C/I:N/A:N)       4.4
CVE-2011-1944    (AV:N/AC:M/Au:N/C:C/I:C/A:C)       9.3
CVE-2011-2821    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-2834    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8
CVE-2011-3379    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-3607    (AV:L/AC:M/Au:N/C:P/I:P/A:P)       4.4
CVE-2011-4078    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4108    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
CVE-2011-4153    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4317    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3
CVE-2011-4415    (AV:L/AC:H/Au:N/C:N/I:N/A:P)       1.2
CVE-2011-4576    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0
CVE-2011-4577    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3
CVE-2011-4619    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4885    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-0021    (AV:N/AC:H/Au:N/C:N/I:N/A:P)       2.6
CVE-2012-0027    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-0031    (AV:L/AC:L/Au:N/C:P/I:P/A:P)       4.6
CVE-2012-0036    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2012-0053    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
CVE-2012-0057    (AV:N/AC:L/Au:N/C:P/I:P/A:N)       6.4
CVE-2012-0830    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2012-1165    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-1823    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided HP System Management Homepage v7.1.1 or subsequent to resolve
the vulnerabilities. HP System Management Homepage v7.1.1 is available here:
HP System Management Homepage for Windows x64
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4064%257CswLang%253D8%257CswItem%253DMTX-ab
0d4e9bb4654a8da503eccfd9%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Windows x86
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4022%257CswLang%253D8%257CswItem%253DMTX-f7
c0d15d28474255bd0ec23136%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Linux (AMD64/EM64T)
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4035%257CswLang%253D8%257CswItem%253DMTX-18
d373dd1361400fbaca892942%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Linux (x86)
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4006%257CswLang%253D8%257CswItem%253DMTX-9e
8a0188f97d48139dcb466509%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HISTORY
Version:1 (rev.1) 26 June 2012 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel.  For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated
periodically, is contained in HP Security Notice HPSN-2011-001:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits;damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. 
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk/p5ksACgkQ4B86/C0qfVkQpwCfbOEZmoo7myCkxQAdqQHevKG5
6IwAoPw4DI3YBCclyWuRekae7EFscAy0
=zd3u
-----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201203-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Severity: Normal
    Title: OpenSSL: Multiple vulnerabilities
     Date: March 06, 2012
     Bugs: #397695, #399365
       ID: 201203-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenSSL, allowing remote
attackers to cause a Denial of Service or obtain sensitive information. 
Background
==========
OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer
(SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general
purpose cryptography library. 
Affected packages
=================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  dev-libs/openssl             < 1.0.0g                 *>= 0.9.8t
                                                            >= 1.0.0g
Description
===========
Multiple vulnerabilities have been found in OpenSSL:
* Timing differences for decryption are exposed by CBC mode encryption
  in OpenSSL's implementation of DTLS (CVE-2011-4108). 
* An incorrect fix for CVE-2011-4108 creates an unspecified
  vulnerability for DTLS applications using OpenSSL (CVE-2012-0050). 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All OpenSSL users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.0g"
References
==========
[ 1 ] CVE-2011-4108
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4108
[ 2 ] CVE-2011-4109
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4109
[ 3 ] CVE-2011-4576
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4576
[ 4 ] CVE-2011-4577
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4577
[ 5 ] CVE-2011-4619
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4619
[ 6 ] CVE-2012-0027
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0027
[ 7 ] CVE-2012-0050
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0050
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201203-12.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-1357-1
February 09, 2012
openssl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
Multiple vulnerabilities exist in OpenSSL that could expose
sensitive information or cause applications to crash. 
Software Description:
- openssl: Secure Socket Layer (SSL) binary and related cryptographic tools
Details:
It was discovered that the elliptic curve cryptography (ECC) subsystem
in OpenSSL, when using the Elliptic Curve Digital Signature Algorithm
(ECDSA) for the ECDHE_ECDSA cipher suite, did not properly implement
curves over binary fields. This could allow an attacker to determine
private keys via a timing attack. This issue only affected Ubuntu 8.04
LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1945)
Adam Langley discovered that the ephemeral Elliptic Curve
Diffie-Hellman (ECDH) functionality in OpenSSL did not ensure thread
safety while processing handshake messages from clients. This
could allow a remote attacker to cause a denial of service via
out-of-order messages that violate the TLS protocol. This issue only
affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu
11.04. (CVE-2011-3210)
Nadhem Alfardan and Kenny Paterson discovered that the Datagram
Transport Layer Security (DTLS) implementation in OpenSSL performed a
MAC check only if certain padding is valid. This could allow a remote
attacker to recover plaintext. This could allow a remote
attacker to cause a denial of service. This
could allow a remote attacker to cause a denial of service. This
issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10
and Ubuntu 11.04. (CVE-2011-4109)
It was discovered that OpenSSL, in certain circumstances involving
ECDH or ECDHE cipher suites, used an incorrect modular reduction
algorithm in its implementation of the P-256 and P-384 NIST elliptic
curves. This could allow a remote attacker to obtain the private
key of a TLS server via multiple handshake attempts. This issue only
affected Ubuntu 8.04 LTS. (CVE-2011-4576)
Andrew Chi discovered that OpenSSL, when RFC 3779 support is enabled,
could trigger an assert when handling an X.509 certificate containing
certificate-extension data associated with IP address blocks or
Autonomous System (AS) identifiers. This could allow a remote attacker
to cause a denial of service. This could allow a remote attacker to cause a denial of
service. This issue only affected Ubuntu 11.10. (CVE-2012-0027)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.10:
  libssl1.0.0                     1.0.0e-2ubuntu4.2
  openssl                         1.0.0e-2ubuntu4.2
Ubuntu 11.04:
  libssl0.9.8                     0.9.8o-5ubuntu1.2
  openssl                         0.9.8o-5ubuntu1.2
Ubuntu 10.10:
  libssl0.9.8                     0.9.8o-1ubuntu4.6
  openssl                         0.9.8o-1ubuntu4.6
Ubuntu 10.04 LTS:
  libssl0.9.8                     0.9.8k-7ubuntu8.8
  openssl                         0.9.8k-7ubuntu8.8
Ubuntu 8.04 LTS:
  libssl0.9.8                     0.9.8g-4ubuntu3.15
  openssl                         0.9.8g-4ubuntu3.15
After a standard system update you need to reboot your computer to make
all the necessary changes. 
References:
  http://www.ubuntu.com/usn/usn-1357-1
  CVE-2011-1945, CVE-2011-3210, CVE-2011-4108, CVE-2011-4109,
  CVE-2011-4354, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619,
  CVE-2012-0027, CVE-2012-0050
Package Information:
  https://launchpad.net/ubuntu/+source/openssl/1.0.0e-2ubuntu4.2
  https://launchpad.net/ubuntu/+source/openssl/0.9.8o-5ubuntu1.2
  https://launchpad.net/ubuntu/+source/openssl/0.9.8o-1ubuntu4.6
  https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.8
  https://launchpad.net/ubuntu/+source/openssl/0.9.8g-4ubuntu3.15
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2012:007
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : openssl
 Date    : January 16, 2012
 Affected: 2011. 
 
 The updated packages have been patched to correct these issues. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4109
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0027
 http://www.openssl.org/news/secadv_20120104.txt
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2011:
 2291c13c44539a5e25f58750a5d6bf8f  2011/i586/libopenssl1.0.0-1.0.0d-2.2-mdv2011.0.i586.rpm
 c610330d2c4c7397feb126247b1fa94f  2011/i586/libopenssl-devel-1.0.0d-2.2-mdv2011.0.i586.rpm
 36c86a84320e1c8a17a74e4e68bc7d5a  2011/i586/libopenssl-engines1.0.0-1.0.0d-2.2-mdv2011.0.i586.rpm
 4b8054f2c169d2b3223195053bd15802  2011/i586/libopenssl-static-devel-1.0.0d-2.2-mdv2011.0.i586.rpm
 3c48b209b941a83a6acfef439c3f78b7  2011/i586/openssl-1.0.0d-2.2-mdv2011.0.i586.rpm 
 7af9d175d066db069aeb82248df9772b  2011/SRPMS/openssl-1.0.0d-2.2.src.rpm
 Mandriva Linux 2011/X86_64:
 21a50bd2be83839266f033c9a0f0fabc  2011/x86_64/lib64openssl1.0.0-1.0.0d-2.2-mdv2011.0.x86_64.rpm
 7e80ee8e2d445c5f1985cd52d2316658  2011/x86_64/lib64openssl-devel-1.0.0d-2.2-mdv2011.0.x86_64.rpm
 e1f4faa3162a6bbc14b37e4cb8d1e8e2  2011/x86_64/lib64openssl-engines1.0.0-1.0.0d-2.2-mdv2011.0.x86_64.rpm
 6e3ac6d57cf0f4e13ed8e275a9bd2ff8  2011/x86_64/lib64openssl-static-devel-1.0.0d-2.2-mdv2011.0.x86_64.rpm
 e9e0306f8dc9f398915a646547e262e2  2011/x86_64/openssl-1.0.0d-2.2-mdv2011.0.x86_64.rpm 
 7af9d175d066db069aeb82248df9772b  2011/SRPMS/openssl-1.0.0d-2.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFPFFiBmqjQ0CJFipgRAkIUAJ9foScZELNgGkHUEaaSx9sgdWNMFwCgnsst
eph27yO3eEECVX28+SNUKyw=
=wTFq
-----END PGP SIGNATURE-----
                        
| VAR-201112-0349 | No CVE | vtiger CRM Database backup verification bypass vulnerability | 
                                      
                                        CVSS V2: - CVSS V3: - Severity: MEDIUM  | 
                            Vtiger CRM is a Web-based Sales Capability Automation (SFA)-based Customer Relationship Management System (CRM). Some modules in vtiger CRM do not verify user access levels. An anonymous mode call can be made using the graph.php script, which can be used to view or modify certain configurations (organization name, template, backup). An attacker can download backup data to get sensitive information. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
vtiger CRM Database Backup Authentication Bypass Vulnerability
SECUNIA ADVISORY ID:
SA47367
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47367/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47367
RELEASE DATE:
2011-12-27
DISCUSS ADVISORY:
http://secunia.com/advisories/47367/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47367/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47367
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Francois Harvey has discovered a vulnerability in vtiger CRM, which
can be exploited by malicious people to bypass certain security
restrictions. 
The vulnerability is caused due to the application allowing database
backup requests via graph.php without checking credentials. 
The vulnerability is confirmed in version 5.2.1. Prior versions may
also be affected. 
SOLUTION:
Update to version 5.3.0. 
PROVIDED AND/OR DISCOVERED BY:
Francois Harvey
ORIGINAL ADVISORY:
http://francoisharvey.ca/2011/12/advisory-meds-2011-01-vtigercrm-anonymous-access-to-setting-module/
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201112-0123 | CVE-2011-5035 | 
                                        Hash table implementations vulnerable to algorithmic complexity attacks
                                        
                                         Related entries in the VARIoT exploits database: VAR-E-201102-0027, VAR-E-201112-0006, VAR-E-201112-0003, VAR-E-201112-0007, VAR-E-201112-0002, VAR-E-201112-0001, VAR-E-201111-0002, VAR-E-201111-0001, VAR-E-201108-0001, VAR-E-201108-0002, VAR-E-201105-0001, VAR-E-201105-0002, VAR-E-201110-0002, VAR-E-201110-0004, VAR-E-201112-0008, VAR-E-201112-0004, VAR-E-201110-0003, VAR-E-200607-0001, VAR-E-200607-0733  | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869. Some programming language implementations do not sufficiently randomize their hash functions or provide means to limit key collision attacks, which can be leveraged by an unauthenticated attacker to cause a denial-of-service (DoS) condition. Oracle Glassfish Calculates the hash value of the form parameter without restricting the assumption of hash collision. (CPU Resource consumption ) There is a vulnerability that becomes a condition.A third party can send a large amount of crafted parameters to disrupt service operation. (CPU Resource consumption ) There is a possibility of being put into a state. Oracle GlassFish Server is prone to a denial-of-service vulnerability. 
An attacker can exploit this issue by sending specially crafted forms in HTTP POST requests. 
Oracle GlassFish Server 3.1.1 and prior versions are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2012-04-03-1 Java for OS X 2012-001 and
Java for Mac OS X 10.6 Update 7
Java for OS X 2012-001 and Java for Mac OS X 10.6 Update 7 is now
available and addresses the following:
Java
Available for:  Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7.3, OS X Lion Server v10.7.3
Impact:  Multiple vulnerabilities in Java 1.6.0_29
Description:  Multiple vulnerabilities exist in Java 1.6.0_29, the
most serious of which may allow an untrusted Java applet to execute
arbitrary code outside the Java sandbox. Visiting a web page
containing a maliciously crafted untrusted Java applet may lead to
arbitrary code execution with the privileges of the current user. 
These issues are addressed by updating to Java version 1.6.0_31. 
Further information is available via the Java website at http://www.o
racle.com/technetwork/java/javase/releasenotes-136954.html
CVE-ID
CVE-2011-3563
CVE-2011-5035
CVE-2012-0497
CVE-2012-0498
CVE-2012-0499
CVE-2012-0500
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Java for OS X 2012-001 and Java for Mac OS X 10.6 Update 7
may be obtained from the Software Update pane in System Preferences,
or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
For Mac OS X v10.6 systems
The download file is named: JavaForMacOSX10.6.dmg
Its SHA-1 digest is: f76807153bc0ca253e4a466a2a8c0abf1e180667
For OS X Lion systems
The download file is named: JavaForOSX.dmg
Its SHA-1 digest is: 176ac1f8e79b4245301e84b616de5105ccd13e16
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
iQEcBAEBAgAGBQJPezVqAAoJEGnF2JsdZQee7gIIALa7b5hVTKL7kOXF7EYT6wjx
VnAmxoQbjEwpBkdzPzqqhCQ303/iBdLdHr2O/yxdaX0tFuB+5+4iInPU2t6O+PNh
7iJ3rhQszzIj5q/qGDXyzIQEjurNfvrEKAxQ3T7uj1At+n/9YVBaw8p6i+HopbRc
Fo6Jrxy0Qf/MyeGO4lqxht2Aq8omh+pEBNP68EglqrJp/CjZTYGaFAHVGvnm8/gA
wjcpIRQBacXcBCJ3K8pZhuQvXhm+GVLWYgc2KGsZ/l7jbQX5Bi67b7CFf7lBHlyd
V7ss6N/0T/O3nspdhg+jhnvcaia1Ow3GikC/707NNkM8Dm3lm0DFVMBBgpNvPcU=
=Pf96
-----END PGP SIGNATURE-----
. In a typical operating environment, these are of low security risk as
the runtime is not used on untrusted applets. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201406-32
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Severity: High
    Title: IcedTea JDK: Multiple vulnerabilities
     Date: June 29, 2014
     Bugs: #312297, #330205, #340819, #346799, #352035, #353418,
           #354231, #355127, #370787, #387637, #404095, #421031,
           #429522, #433389, #438750, #442478, #457206, #458410,
           #461714, #466822, #477210, #489570, #508270
       ID: 201406-32
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in the IcedTea JDK, the worst
of which could lead to arbitrary code execution. 
Background
==========
IcedTea is a distribution of the Java OpenJDK source code built with
free build tools. 
Affected packages
=================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  dev-java/icedtea-bin        < 6.1.13.3               >= 6.1.13.3 
Description
===========
Multiple vulnerabilities have been discovered in the IcedTea JDK. 
Please review the CVE identifiers referenced below for details. 
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, bypass intended security policies, or have other
unspecified impact. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All IcedTea JDK users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-6.1.13.3"
References
==========
[   1 ] CVE-2009-3555
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555
[   2 ] CVE-2010-2548
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2548
[   3 ] CVE-2010-2783
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2783
[   4 ] CVE-2010-3541
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541
[   5 ] CVE-2010-3548
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548
[   6 ] CVE-2010-3549
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549
[   7 ] CVE-2010-3551
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551
[   8 ] CVE-2010-3553
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553
[   9 ] CVE-2010-3554
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554
[  10 ] CVE-2010-3557
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557
[  11 ] CVE-2010-3561
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561
[  12 ] CVE-2010-3562
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562
[  13 ] CVE-2010-3564
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3564
[  14 ] CVE-2010-3565
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565
[  15 ] CVE-2010-3566
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566
[  16 ] CVE-2010-3567
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567
[  17 ] CVE-2010-3568
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568
[  18 ] CVE-2010-3569
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569
[  19 ] CVE-2010-3573
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573
[  20 ] CVE-2010-3574
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574
[  21 ] CVE-2010-3860
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3860
[  22 ] CVE-2010-4351
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4351
[  23 ] CVE-2010-4448
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448
[  24 ] CVE-2010-4450
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450
[  25 ] CVE-2010-4465
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465
[  26 ] CVE-2010-4467
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467
[  27 ] CVE-2010-4469
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469
[  28 ] CVE-2010-4470
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470
[  29 ] CVE-2010-4471
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471
[  30 ] CVE-2010-4472
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472
[  31 ] CVE-2010-4476
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476
[  32 ] CVE-2011-0025
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0025
[  33 ] CVE-2011-0706
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0706
[  34 ] CVE-2011-0815
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815
[  35 ] CVE-2011-0822
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0822
[  36 ] CVE-2011-0862
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862
[  37 ] CVE-2011-0864
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864
[  38 ] CVE-2011-0865
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865
[  39 ] CVE-2011-0868
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868
[  40 ] CVE-2011-0869
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869
[  41 ] CVE-2011-0870
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0870
[  42 ] CVE-2011-0871
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871
[  43 ] CVE-2011-0872
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872
[  44 ] CVE-2011-3389
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389
[  45 ] CVE-2011-3521
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521
[  46 ] CVE-2011-3544
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544
[  47 ] CVE-2011-3547
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547
[  48 ] CVE-2011-3548
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548
[  49 ] CVE-2011-3551
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551
[  50 ] CVE-2011-3552
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552
[  51 ] CVE-2011-3553
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553
[  52 ] CVE-2011-3554
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554
[  53 ] CVE-2011-3556
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556
[  54 ] CVE-2011-3557
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557
[  55 ] CVE-2011-3558
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558
[  56 ] CVE-2011-3560
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560
[  57 ] CVE-2011-3563
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563
[  58 ] CVE-2011-3571
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3571
[  59 ] CVE-2011-5035
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035
[  60 ] CVE-2012-0497
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497
[  61 ] CVE-2012-0501
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501
[  62 ] CVE-2012-0502
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502
[  63 ] CVE-2012-0503
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503
[  64 ] CVE-2012-0505
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505
[  65 ] CVE-2012-0506
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506
[  66 ] CVE-2012-0547
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547
[  67 ] CVE-2012-1711
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711
[  68 ] CVE-2012-1713
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713
[  69 ] CVE-2012-1716
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716
[  70 ] CVE-2012-1717
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717
[  71 ] CVE-2012-1718
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718
[  72 ] CVE-2012-1719
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719
[  73 ] CVE-2012-1723
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723
[  74 ] CVE-2012-1724
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724
[  75 ] CVE-2012-1725
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725
[  76 ] CVE-2012-1726
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726
[  77 ] CVE-2012-3216
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216
[  78 ] CVE-2012-3422
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3422
[  79 ] CVE-2012-3423
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3423
[  80 ] CVE-2012-4416
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416
[  81 ] CVE-2012-4540
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4540
[  82 ] CVE-2012-5068
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068
[  83 ] CVE-2012-5069
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069
[  84 ] CVE-2012-5070
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070
[  85 ] CVE-2012-5071
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071
[  86 ] CVE-2012-5072
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072
[  87 ] CVE-2012-5073
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073
[  88 ] CVE-2012-5074
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074
[  89 ] CVE-2012-5075
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075
[  90 ] CVE-2012-5076
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076
[  91 ] CVE-2012-5077
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077
[  92 ] CVE-2012-5081
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081
[  93 ] CVE-2012-5084
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084
[  94 ] CVE-2012-5085
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085
[  95 ] CVE-2012-5086
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086
[  96 ] CVE-2012-5087
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087
[  97 ] CVE-2012-5089
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089
[  98 ] CVE-2012-5979
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5979
[  99 ] CVE-2013-0169
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169
[ 100 ] CVE-2013-0401
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401
[ 101 ] CVE-2013-0424
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0424
[ 102 ] CVE-2013-0425
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0425
[ 103 ] CVE-2013-0426
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0426
[ 104 ] CVE-2013-0427
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0427
[ 105 ] CVE-2013-0428
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0428
[ 106 ] CVE-2013-0429
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0429
[ 107 ] CVE-2013-0431
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0431
[ 108 ] CVE-2013-0432
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0432
[ 109 ] CVE-2013-0433
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0433
[ 110 ] CVE-2013-0434
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0434
[ 111 ] CVE-2013-0435
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0435
[ 112 ] CVE-2013-0440
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0440
[ 113 ] CVE-2013-0441
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0441
[ 114 ] CVE-2013-0442
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0442
[ 115 ] CVE-2013-0443
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0443
[ 116 ] CVE-2013-0444
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0444
[ 117 ] CVE-2013-0450
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0450
[ 118 ] CVE-2013-0809
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809
[ 119 ] CVE-2013-1475
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1475
[ 120 ] CVE-2013-1476
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1476
[ 121 ] CVE-2013-1478
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1478
[ 122 ] CVE-2013-1480
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1480
[ 123 ] CVE-2013-1484
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484
[ 124 ] CVE-2013-1485
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485
[ 125 ] CVE-2013-1486
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486
[ 126 ] CVE-2013-1488
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488
[ 127 ] CVE-2013-1493
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493
[ 128 ] CVE-2013-1500
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500
[ 129 ] CVE-2013-1518
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518
[ 130 ] CVE-2013-1537
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537
[ 131 ] CVE-2013-1557
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557
[ 132 ] CVE-2013-1569
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569
[ 133 ] CVE-2013-1571
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571
[ 134 ] CVE-2013-2383
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383
[ 135 ] CVE-2013-2384
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384
[ 136 ] CVE-2013-2407
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407
[ 137 ] CVE-2013-2412
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412
[ 138 ] CVE-2013-2415
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415
[ 139 ] CVE-2013-2417
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417
[ 140 ] CVE-2013-2419
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419
[ 141 ] CVE-2013-2420
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420
[ 142 ] CVE-2013-2421
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421
[ 143 ] CVE-2013-2422
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422
[ 144 ] CVE-2013-2423
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423
[ 145 ] CVE-2013-2424
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424
[ 146 ] CVE-2013-2426
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426
[ 147 ] CVE-2013-2429
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429
[ 148 ] CVE-2013-2430
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430
[ 149 ] CVE-2013-2431
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431
[ 150 ] CVE-2013-2436
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436
[ 151 ] CVE-2013-2443
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443
[ 152 ] CVE-2013-2444
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444
[ 153 ] CVE-2013-2445
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445
[ 154 ] CVE-2013-2446
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446
[ 155 ] CVE-2013-2447
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447
[ 156 ] CVE-2013-2448
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448
[ 157 ] CVE-2013-2449
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449
[ 158 ] CVE-2013-2450
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450
[ 159 ] CVE-2013-2451
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451
[ 160 ] CVE-2013-2452
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452
[ 161 ] CVE-2013-2453
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453
[ 162 ] CVE-2013-2454
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454
[ 163 ] CVE-2013-2455
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455
[ 164 ] CVE-2013-2456
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456
[ 165 ] CVE-2013-2457
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457
[ 166 ] CVE-2013-2458
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458
[ 167 ] CVE-2013-2459
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459
[ 168 ] CVE-2013-2460
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460
[ 169 ] CVE-2013-2461
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461
[ 170 ] CVE-2013-2463
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463
[ 171 ] CVE-2013-2465
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465
[ 172 ] CVE-2013-2469
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469
[ 173 ] CVE-2013-2470
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470
[ 174 ] CVE-2013-2471
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471
[ 175 ] CVE-2013-2472
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472
[ 176 ] CVE-2013-2473
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473
[ 177 ] CVE-2013-3829
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829
[ 178 ] CVE-2013-4002
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4002
[ 179 ] CVE-2013-5772
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772
[ 180 ] CVE-2013-5774
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774
[ 181 ] CVE-2013-5778
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778
[ 182 ] CVE-2013-5780
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780
[ 183 ] CVE-2013-5782
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782
[ 184 ] CVE-2013-5783
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783
[ 185 ] CVE-2013-5784
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784
[ 186 ] CVE-2013-5790
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790
[ 187 ] CVE-2013-5797
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797
[ 188 ] CVE-2013-5800
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800
[ 189 ] CVE-2013-5802
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802
[ 190 ] CVE-2013-5803
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803
[ 191 ] CVE-2013-5804
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804
[ 192 ] CVE-2013-5805
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805
[ 193 ] CVE-2013-5806
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806
[ 194 ] CVE-2013-5809
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809
[ 195 ] CVE-2013-5814
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814
[ 196 ] CVE-2013-5817
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817
[ 197 ] CVE-2013-5820
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820
[ 198 ] CVE-2013-5823
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823
[ 199 ] CVE-2013-5825
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825
[ 200 ] CVE-2013-5829
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829
[ 201 ] CVE-2013-5830
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830
[ 202 ] CVE-2013-5840
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840
[ 203 ] CVE-2013-5842
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842
[ 204 ] CVE-2013-5849
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849
[ 205 ] CVE-2013-5850
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850
[ 206 ] CVE-2013-5851
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851
[ 207 ] CVE-2013-6629
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629
[ 208 ] CVE-2013-6954
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6954
[ 209 ] CVE-2014-0429
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429
[ 210 ] CVE-2014-0446
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446
[ 211 ] CVE-2014-0451
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451
[ 212 ] CVE-2014-0452
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452
[ 213 ] CVE-2014-0453
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453
[ 214 ] CVE-2014-0456
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456
[ 215 ] CVE-2014-0457
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457
[ 216 ] CVE-2014-0458
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458
[ 217 ] CVE-2014-0459
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459
[ 218 ] CVE-2014-0460
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460
[ 219 ] CVE-2014-0461
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461
[ 220 ] CVE-2014-1876
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1876
[ 221 ] CVE-2014-2397
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397
[ 222 ] CVE-2014-2398
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398
[ 223 ] CVE-2014-2403
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403
[ 224 ] CVE-2014-2412
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412
[ 225 ] CVE-2014-2414
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414
[ 226 ] CVE-2014-2421
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421
[ 227 ] CVE-2014-2423
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423
[ 228 ] CVE-2014-2427
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201406-32.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04047415
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04047415
Version: 2
HPSBST02955 rev.2 - HP XP P9000 Performance Advisor Software, 3rd party
Software Security - Apache Tomcat and Oracle Updates, Multiple
Vulnerabilities Affecting Confidentiality, Availability And Integrity
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible. 
Release Date: 2014-02-24
Last Updated: 2014-03-04
Potential Security Impact: Multiple vulnerabilities affecting
confidentiality, availability, and integrity
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in 3rd party software
used in HP XP P9000 Performance Advisor running Oracle and Apache Tomcat
Software. HP has updated the Apache Tomcat and Oracle database software to
address vulnerabilities affecting confidentiality, availability, and
integrity. 
References: CVE-2013-0361 CVE-2013-0354 CVE-2013-0397 CVE-2012-3190
CVE-2013-0352 CVE-2012-3219 CVE-2013-0363 CVE-2013-0381 CVE-2011-5035
CVE-2013-0364 CVE-2013-0372 CVE-2013-0366 CVE-2009-2902 CVE-2009-2901
CVE-2009-2693 CVE-2009-3548 CVE-2010-2227 CVE-2010-1157 CVE-2010-3718
CVE-2011-0013 CVE-2010-4172 CVE-2011-3190 CVE-2011-1184 CVE-2011-5064
CVE-2011-5063 CVE-2011-5062 CVE-2007-5342 CVE-2007-6286 CVE-2007-5333
CVE-2008-0002 CVE-2007-5461 CVE-2011-2729 CVE-2011-2526 CVE-2011-2481
CVE-2011-2204 CVE-2012-2733 CVE-2012-4534 CVE-2012-4431 CVE-2012-3546
CVE-2011-0534 CVE-2008-2370 CVE-2008-1947 CVE-2008-1232, CPU-JAN-2013,
SSRT101157
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP XP P9000 Performance Advisor Software v5.4.1 and earlier
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2007-5333    (AV:N/AC:L/Au:N/C:P/I:N/A:N)        5.0
CVE-2007-5342    (AV:N/AC:L/Au:N/C:P/I:P/A:N)        6.4
CVE-2007-5461    (AV:N/AC:M/Au:S/C:P/I:N/A:N)        3.5
CVE-2007-6286    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2008-0002    (AV:N/AC:M/Au:N/C:P/I:P/A:N)        5.8
CVE-2008-1232    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2008-1947    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2008-2370    (AV:N/AC:L/Au:N/C:P/I:N/A:N)        5.0
CVE-2009-2693    (AV:N/AC:M/Au:N/C:N/I:P/A:P)        5.8
CVE-2009-2901    (AV:N/AC:M/Au:N/C:P/I:N/A:N)        4.3
CVE-2009-2902    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2009-3548    (AV:N/AC:L/Au:N/C:P/I:P/A:P)        7.5
CVE-2010-1157    (AV:N/AC:H/Au:N/C:P/I:N/A:N)        2.6
CVE-2010-2227    (AV:N/AC:L/Au:N/C:P/I:N/A:P)        6.4
CVE-2010-3718    (AV:L/AC:H/Au:N/C:N/I:P/A:N)        1.2
CVE-2010-4172    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2011-0013    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2011-0534    (AV:N/AC:L/Au:N/C:N/I:N/A:P)        5.0
CVE-2011-1184    (AV:N/AC:L/Au:N/C:P/I:N/A:N)        5.0
CVE-2011-2204    (AV:L/AC:M/Au:N/C:P/I:N/A:N)        1.9
CVE-2011-2481    (AV:L/AC:L/Au:N/C:P/I:P/A:P)        4.6
CVE-2011-2526    (AV:L/AC:M/Au:N/C:P/I:P/A:P)        4.4
CVE-2011-2729    (AV:N/AC:L/Au:N/C:P/I:N/A:N)        5.0
CVE-2011-3190    (AV:N/AC:L/Au:N/C:P/I:P/A:P)        7.5
CVE-2011-5035    (AV:N/AC:L/Au:N/C:N/I:N/A:P)        5.0
CVE-2011-5062    (AV:N/AC:L/Au:N/C:P/I:N/A:N)        5.0
CVE-2011-5063    (AV:N/AC:M/Au:N/C:P/I:N/A:N)        4.3
CVE-2011-5064    (AV:N/AC:M/Au:N/C:P/I:N/A:N)        4.3
CVE-2012-2733    (AV:N/AC:L/Au:N/C:N/I:N/A:P)        5.0
CVE-2012-3190    (AV:N/AC:L/Au:N/C:P/I:P/A:N)        6.4
CVE-2012-3219    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2012-3546    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2012-4431    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2012-4534    (AV:N/AC:H/Au:N/C:N/I:N/A:P)        2.6
CVE-2013-0352    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2013-0354    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2013-0361    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0
CVE-2013-0363    (AV:N/AC:L/Au:N/C:C/I:N/A:N)        7.8
CVE-2013-0364    (AV:N/AC:L/Au:N/C:C/I:N/A:N)        7.8
CVE-2013-0366    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0
CVE-2013-0372    (AV:N/AC:M/Au:N/C:N/I:P/A:N)        4.3
CVE-2013-0381    (AV:N/AC:L/Au:N/C:P/I:P/A:N)        6.4
CVE-2013-0397    (AV:N/AC:L/Au:N/C:P/I:P/A:N)        6.4
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided a software update, HP XP P9000 Performance Advisor Software
v5.5.1 to resolve this issue. To obtain the update, go to http://www.hp.com :
Select "Support"
Select "Download Drivers"
Search "find by product" for "HP P9000 Performance Advisor Software"
Select "HP P9000 Performance Advisor Software" and then choose the operating
system
Download "HP StorageWorks P9000 Performance Advisor Software" v5.5.1
HISTORY
Version:1 (rev.1) - 24 February 2014 Initial release
Version:2 (rev.2) - 4 March 2014 Updated Potential Security Impact section
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel.  For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. 
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners. ============================================================================
Ubuntu Security Notice USN-1373-2
March 01, 2012
openjdk-6b18 vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
Summary:
Multiple vulnerabilities in OpenJDK 6 for the ARM architecture have
been fixed. 
Software Description:
- openjdk-6b18: Open Source Java implementation
Details:
USN 1373-1 fixed vulnerabilities in OpenJDK 6 in Ubuntu 10.04 LTS,
Ubuntu 10.10 and Ubuntu 11.04 for all architectures except for ARM
(armel). This provides the corresponding OpenJDK 6 update for use
with the ARM (armel) architecture in Ubuntu 10.04 LTS, Ubuntu 10.10
and Ubuntu 11.04. A remote attacker could
 cause a denial of service by sending special requests that trigger
 hash collisions predictably. This may be increased
 by adjusting the sun.net.httpserver.maxReqHeaders property. (CVE-2012-0497)
 
 It was discovered that an off-by-one error exists in the Java ZIP
 file processing code. An attacker could us this to cause a denial of
 service through a maliciously crafted ZIP file. (CVE-2012-0507)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.04:
  icedtea-6-jre-cacao             6b18-1.8.13-0ubuntu1~11.04.1
  icedtea-6-jre-jamvm             6b18-1.8.13-0ubuntu1~11.04.1
  openjdk-6-jre                   6b18-1.8.13-0ubuntu1~11.04.1
  openjdk-6-jre-headless          6b18-1.8.13-0ubuntu1~11.04.1
  openjdk-6-jre-zero              6b18-1.8.13-0ubuntu1~11.04.1
Ubuntu 10.10:
  icedtea-6-jre-cacao             6b18-1.8.13-0ubuntu1~10.10.1
  openjdk-6-jre                   6b18-1.8.13-0ubuntu1~10.10.1
  openjdk-6-jre-headless          6b18-1.8.13-0ubuntu1~10.10.1
  openjdk-6-jre-zero              6b18-1.8.13-0ubuntu1~10.10.1
Ubuntu 10.04 LTS:
  icedtea-6-jre-cacao             6b18-1.8.13-0ubuntu1~10.04.1
  openjdk-6-jre                   6b18-1.8.13-0ubuntu1~10.04.1
  openjdk-6-jre-headless          6b18-1.8.13-0ubuntu1~10.04.1
  openjdk-6-jre-zero              6b18-1.8.13-0ubuntu1~10.04.1
After a standard system update you need to restart any Java applications
or applets to make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Critical: java-1.6.0-openjdk security update
Advisory ID:       RHSA-2012:0135-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-0135.html
Issue date:        2012-02-14
CVE Names:         CVE-2011-3563 CVE-2011-3571 CVE-2011-5035 
                   CVE-2012-0497 CVE-2012-0501 CVE-2012-0502 
                   CVE-2012-0503 CVE-2012-0505 CVE-2012-0506 
=====================================================================
1. Summary:
Updated java-1.6.0-openjdk packages that fix several security issues are
now available for Red Hat Enterprise Linux 6. 
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section. 
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. Description:
These packages provide the OpenJDK 6 Java Runtime Environment and the
OpenJDK 6 Software Development Kit. 
It was discovered that Java2D did not properly check graphics rendering
objects before passing them to the native renderer. Malicious input, or an
untrusted Java application or applet could use this flaw to crash the Java
Virtual Machine (JVM), or bypass Java sandbox restrictions. (CVE-2012-0497)
It was discovered that the exception thrown on deserialization failure did
not always contain a proper identification of the cause of the failure. An
untrusted Java application or applet could use this flaw to bypass Java
sandbox restrictions. (CVE-2012-0505)
The AtomicReferenceArray class implementation did not properly check if
the array was of the expected Object[] type. A malicious Java application
or applet could use this flaw to bypass Java sandbox restrictions. 
(CVE-2011-3571)
It was discovered that the use of TimeZone.setDefault() was not restricted
by the SecurityManager, allowing an untrusted Java application or applet to
set a new default time zone, and hence bypass Java sandbox restrictions. 
(CVE-2012-0503)
The HttpServer class did not limit the number of headers read from HTTP
requests. A remote attacker could use this flaw to make an application
using HttpServer use an excessive amount of CPU time via a
specially-crafted request. This update introduces a header count limit
controlled using the sun.net.httpserver.maxReqHeaders property. The default
value is 200. (CVE-2011-5035)
The Java Sound component did not properly check buffer boundaries. 
Malicious input, or an untrusted Java application or applet could use this
flaw to cause the Java Virtual Machine (JVM) to crash or disclose a portion
of its memory. (CVE-2011-3563)
A flaw was found in the AWT KeyboardFocusManager that could allow an
untrusted Java application or applet to acquire keyboard focus and possibly
steal sensitive information. (CVE-2012-0502)
It was discovered that the CORBA (Common Object Request Broker
Architecture) implementation in Java did not properly protect repository
identifiers on certain CORBA objects. This could have been used to modify
immutable object data. (CVE-2012-0506)
An off-by-one flaw, causing a stack overflow, was found in the unpacker for
ZIP files. A specially-crafted ZIP archive could cause the Java Virtual
Machine (JVM) to crash when opened. (CVE-2012-0501)
Note: If the web browser plug-in provided by the icedtea-web package was
installed, the issues exposed via Java applets could have been exploited
without user interaction if a user visited a malicious website. 
This erratum also upgrades the OpenJDK package to IcedTea6 1.10.6. Refer to
the NEWS file, linked to in the References, for further information. 
All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect. 
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
788606 - CVE-2011-5035 OpenJDK: HttpServer no header count limit (Lightweight HTTP Server, 7126960)
788624 - CVE-2012-0501 OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)
788976 - CVE-2012-0503 OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)
788994 - CVE-2011-3571 OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)
789295 - CVE-2011-3563 OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)
789297 - CVE-2012-0502 OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)
789299 - CVE-2012-0505 OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)
789300 - CVE-2012-0506 OpenJDK: mutable repository identifiers (CORBA, 7110704)
789301 - CVE-2012-0497 OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.src.rpm
i386:
java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.src.rpm
i386:
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-demo-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-devel-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-src-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
x86_64:
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-demo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-devel-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-src-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.src.rpm
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.src.rpm
x86_64:
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-demo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-devel-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-src-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.src.rpm
i386:
java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-devel-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-devel-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.src.rpm
i386:
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-demo-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-src-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
x86_64:
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-demo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-src-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.src.rpm
i386:
java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-devel-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-devel-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.43.1.10.6.el6_2.src.rpm
i386:
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-demo-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
java-1.6.0-openjdk-src-1.6.0.0-1.43.1.10.6.el6_2.i686.rpm
x86_64:
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-demo-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
java-1.6.0-openjdk-src-1.6.0.0-1.43.1.10.6.el6_2.x86_64.rpm
These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-3563.html
https://www.redhat.com/security/data/cve/CVE-2011-3571.html
https://www.redhat.com/security/data/cve/CVE-2011-5035.html
https://www.redhat.com/security/data/cve/CVE-2012-0497.html
https://www.redhat.com/security/data/cve/CVE-2012-0501.html
https://www.redhat.com/security/data/cve/CVE-2012-0502.html
https://www.redhat.com/security/data/cve/CVE-2012-0503.html
https://www.redhat.com/security/data/cve/CVE-2012-0505.html
https://www.redhat.com/security/data/cve/CVE-2012-0506.html
https://access.redhat.com/security/updates/classification/#critical
http://icedtea.classpath.org/hg/release/icedtea6-1.10/file/icedtea6-1.10.6/NEWS
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPOwEiXlSAg2UNWIIRAnYKAKCorWMpTAsiiuJ4uSywvmAym2EK0wCfa/8B
lhqpUTdPMNmgswBpMj4pV/M=
=9liL
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. 
 
 Fix in AtomicReferenceArray (CVE-2011-3571). 
 
 Multiple unspecified vulnerabilities allows remote attackers to affect
 confidentiality, integrity, and availability via unknown vectors
 (CVE-2012-0498. CVE-2012-0499, CVE-2012-0500). 
 
 Issues with some KeyboardFocusManager method (CVE-2012-0502). 
 
 Issues with TimeZone class (CVE-2012-0503). 
 
 Enhance exception throwing mechanism in ObjectStreamClass
 (CVE-2012-0505). 
 
 Issues with some method in corba (CVE-2012-0506).  The verification
 of md5 checksums and GPG signatures is performed automatically for you.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFPPnJ1mqjQ0CJFipgRAsShAJ9uLjzWi9Y8x/myvScmQfUPwRh8RACg22f9
NSDNWCT+JqEyYHUExPAwR58=
=cwgS
-----END PGP SIGNATURE-----
. Further
information about these flaws can be found on the Oracle Java SE Critical
Patch page, listed in the References section
                        
| VAR-201201-0259 | CVE-2011-4858 | 
                                        Hash table implementations vulnerable to algorithmic complexity attacks
                                        
                                         Related entries in the VARIoT exploits database: VAR-E-200607-0001, VAR-E-200607-0733  | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. Some programming language implementations do not sufficiently randomize their hash functions or provide means to limit key collision attacks, which can be leveraged by an unauthenticated attacker to cause a denial-of-service (DoS) condition. Multiple Hitachi COBOL2002 products have security vulnerabilities that allow attackers to take control of target user systems. No detailed vulnerability details are provided at this time. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201206-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Severity: Normal
    Title: Apache Tomcat: Multiple vulnerabilities
     Date: June 24, 2012
     Bugs: #272566, #273662, #303719, #320963, #329937, #373987,
           #374619, #382043, #386213, #396401, #399227
       ID: 201206-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities were found in Apache Tomcat, the worst of
which allowing to read, modify and overwrite arbitrary files. 
Affected packages
=================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  www-servers/tomcat          *< 5.5.34                 *>= 6.0.35
                                 *< 6.0.35                  >= 7.0.23
                                  < 7.0.23
Description
===========
Multiple vulnerabilities have been discovered in Apache Tomcat. Please
review the CVE identifiers referenced below for details. 
Impact
======
The vulnerabilities allow an attacker to cause a Denial of Service, to
hijack a session, to bypass authentication, to inject webscript, to
enumerate valid usernames, to read, modify and overwrite arbitrary
files, to bypass intended access restrictions, to delete work-directory
files, to discover the server's hostname or IP, to bypass read
permissions for files or HTTP headers, to read or write files outside
of the intended working directory, and to obtain sensitive information
by reading a log file. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All Apache Tomcat 6.0.x users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot --verbose ">=www-servers/tomcat-6.0.35"
All Apache Tomcat 7.0.x users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot --verbose ">=www-servers/tomcat-7.0.23"
References
==========
[  1 ] CVE-2008-5515
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5515
[  2 ] CVE-2009-0033
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0033
[  3 ] CVE-2009-0580
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0580
[  4 ] CVE-2009-0781
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0781
[  5 ] CVE-2009-0783
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0783
[  6 ] CVE-2009-2693
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2693
[  7 ] CVE-2009-2901
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2901
[  8 ] CVE-2009-2902
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2902
[  9 ] CVE-2010-1157
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1157
[ 10 ] CVE-2010-2227
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2227
[ 11 ] CVE-2010-3718
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3718
[ 12 ] CVE-2010-4172
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4172
[ 13 ] CVE-2010-4312
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4312
[ 14 ] CVE-2011-0013
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0013
[ 15 ] CVE-2011-0534
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0534
[ 16 ] CVE-2011-1088
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1088
[ 17 ] CVE-2011-1183
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1183
[ 18 ] CVE-2011-1184
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1184
[ 19 ] CVE-2011-1419
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1419
[ 20 ] CVE-2011-1475
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1475
[ 21 ] CVE-2011-1582
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1582
[ 22 ] CVE-2011-2204
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2204
[ 23 ] CVE-2011-2481
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2481
[ 24 ] CVE-2011-2526
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2526
[ 25 ] CVE-2011-2729
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2729
[ 26 ] CVE-2011-3190
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3190
[ 27 ] CVE-2011-3375
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3375
[ 28 ] CVE-2011-4858
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4858
[ 29 ] CVE-2011-5062
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5062
[ 30 ] CVE-2011-5063
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5063
[ 31 ] CVE-2011-5064
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5064
[ 32 ] CVE-2012-0022
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0022
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201206-24.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. 
Release Date: 2012-02-06
Last Updated: 2012-02-06
 ------------------------------------------------------------------------------
Potential Security Impact: Remote Denial of Service (DoS), access restriction bypass
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP-UX Apache Running Tomcat Servlet Engine. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) or to perform an access restriction bypass. 
References: CVE-2006-7243, CVE-2011-4858, CVE-2011-4885, CVE-2012-0022
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.21 or earlier
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2006-7243    (AV:N/AC:L/Au:N/C:N/I:P/A:N)       5.0
CVE-2011-4858    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2011-4885    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2012-0022    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following software updates to resolve the vulnerability. 
The updates are available for download from
ftp://srt10728:Secure12@ftp.usa.hp.com
Note: HP-UX Web Server Suite v3.22 contains HP-UX Tomcat-based Servlet Engine v5.5.35.01
Web Server Suite Version
 Apache Depot Name
HP-UX Web Server Suite v.3.22
HP-UX B.11.23 HPUXWS22ATW-B322-64.depot
HP-UX B.11.23 HPUXWS22ATW-B322-32.depot
HP-UX B.11.31 HPUXWS22ATW-B322-64.depot
HP-UX B.11.31 HPUXWS22ATW-B322-32.depot
MANUAL ACTIONS: Yes - Update
Install HP-UX Web Server Suite v3.22 or subsequent. 
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant. 
AFFECTED VERSIONS
HP-UX Web Server Suite
HP-UX B.11.23
HP-UX B.11.31
==================
hpuxws22TOMCAT.TOMCAT
action: install revision B.5.5.35.01 or subsequent
hpuxws22APCH32.APACHE
hpuxws22APCH32.APACHE2
hpuxws22APCH32.AUTH_LDAP
hpuxws22APCH32.AUTH_LDAP2
hpuxws22APCH32.MOD_JK
hpuxws22APCH32.MOD_JK2
hpuxws22APCH32.MOD_PERL
hpuxws22APCH32.MOD_PERL2
hpuxws22APCH32.PHP
hpuxws22APCH32.PHP2
hpuxws22APCH32.WEBPROXY
action: install revision B.2.2.15.11 or subsequent
END AFFECTED VERSION
HISTORY
Version:1 (rev.1) - 06 February 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel.  For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Moderate: tomcat6 security and bug fix update
Advisory ID:       RHSA-2012:0682-01
Product:           JBoss Enterprise Web Server
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-0682.html
Issue date:        2012-05-21
CVE Names:         CVE-2011-1184 CVE-2011-2204 CVE-2011-2526 
                   CVE-2011-3190 CVE-2011-3375 CVE-2011-4858 
                   CVE-2011-5062 CVE-2011-5063 CVE-2011-5064 
                   CVE-2012-0022 
=====================================================================
1. Summary:
Updated tomcat6 packages that fix multiple security issues and three bugs
are now available for JBoss Enterprise Web Server 1.0.2 for Red Hat
Enterprise Linux 5 and 6. 
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section. 
2. Relevant releases/architectures:
JBoss Enterprise Web Server 1.0 for RHEL 5 Server - noarch
JBoss Enterprise Web Server 1.0 for RHEL 6 Server - noarch
3. Description:
Apache Tomcat is a servlet container. 
JBoss Enterprise Web Server includes the Tomcat Native library, providing
Apache Portable Runtime (APR) support for Tomcat. References in this text
to APR refer to the Tomcat Native implementation, not any other apr
package. 
This update fixes the JBPAPP-4873, JBPAPP-6133, and JBPAPP-6852 bugs. It
also resolves the following security issues:
Multiple flaws weakened the Tomcat HTTP DIGEST authentication
implementation, subjecting it to some of the weaknesses of HTTP BASIC
authentication, for example, allowing remote attackers to perform session
replay attacks. (CVE-2011-1184, CVE-2011-5062, CVE-2011-5063,
CVE-2011-5064)
A flaw was found in the way the Coyote (org.apache.coyote.ajp.AjpProcessor)
and APR (org.apache.coyote.ajp.AjpAprProcessor) Tomcat AJP (Apache JServ
Protocol) connectors processed certain POST requests. An attacker could
send a specially-crafted request that would cause the connector to treat
the message body as a new request. This allows arbitrary AJP messages to be
injected, possibly allowing an attacker to bypass a web application's
authentication checks and gain access to information they would otherwise
be unable to access. The JK (org.apache.jk.server.JkCoyoteHandler)
connector is used by default when the APR libraries are not present. The JK
connector is not affected by this flaw. (CVE-2011-3190)
A flaw in the way Tomcat recycled objects that contain data from user
requests (such as IP addresses and HTTP headers) when certain errors
occurred. If a user sent a request that caused an error to be logged,
Tomcat would return a reply to the next request (which could be sent by a
different user) with data from the first user's request, leading to
information disclosure. Under certain conditions, a remote attacker could
leverage this flaw to hijack sessions. (CVE-2011-3375)
The Java hashCode() method implementation was susceptible to predictable
hash collisions. This update
introduces a limit on the number of parameters processed per request to
mitigate this issue. The default limit is 512 for parameters and 128 for
headers. These defaults can be changed by setting the
org.apache.tomcat.util.http.Parameters.MAX_COUNT and
org.apache.tomcat.util.http.MimeHeaders.MAX_COUNT system properties. 
(CVE-2011-4858)
Tomcat did not handle large numbers of parameters and large parameter
values efficiently. A remote attacker could make Tomcat use an excessive
amount of CPU time by sending an HTTP request containing a large number of
parameters or large parameter values. This update introduces limits on the
number of parameters and headers processed per request to address this
issue. Refer to the CVE-2011-4858 description for information about the
org.apache.tomcat.util.http.Parameters.MAX_COUNT and
org.apache.tomcat.util.http.MimeHeaders.MAX_COUNT system properties. 
(CVE-2012-0022)
A flaw in the Tomcat MemoryUserDatabase. If a runtime exception occurred
when creating a new user with a JMX client, that user's password was logged
to Tomcat log files. Note: By default, only administrators have access to
such log files. (CVE-2011-2204)
A flaw in the way Tomcat handled sendfile request attributes when using the
HTTP APR or NIO (Non-Blocking I/O) connector. A malicious web application
running on a Tomcat instance could use this flaw to bypass security manager
restrictions and gain access to files it would otherwise be unable to
access, or possibly terminate the Java Virtual Machine (JVM). The HTTP NIO
connector is used by default in JBoss Enterprise Web Server. 
(CVE-2011-2526)
Red Hat would like to thank oCERT for reporting CVE-2011-4858, and the
Apache Tomcat project for reporting CVE-2011-2526. oCERT acknowledges
Julian Wälde and Alexander Klink as the original reporters of
CVE-2011-4858. 
4. Solution:
Users of Tomcat should upgrade to these updated packages, which
resolve these issues. Tomcat must be restarted for this update to take
effect. 
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
5. Bugs fixed (http://bugzilla.redhat.com/):
717013 - CVE-2011-2204 tomcat: password disclosure vulnerability
720948 - CVE-2011-2526 tomcat: security manager restrictions bypass
734868 - CVE-2011-3190 tomcat: authentication bypass and information disclosure
741401 - CVE-2011-1184 CVE-2011-5062 CVE-2011-5063 CVE-2011-5064 tomcat: Multiple weaknesses in HTTP DIGEST authentication
750521 - CVE-2011-4858 tomcat: hash table collisions CPU usage DoS (oCERT-2011-003)
782624 - CVE-2011-3375 tomcat: information disclosure due to improper response and request object recycling
783359 - CVE-2012-0022 tomcat: large number of parameters DoS
6. Package List:
JBoss Enterprise Web Server 1.0 for RHEL 5 Server:
Source:
tomcat6-6.0.32-24_patch_07.ep5.el5.src.rpm
noarch:
tomcat6-6.0.32-24_patch_07.ep5.el5.noarch.rpm
tomcat6-admin-webapps-6.0.32-24_patch_07.ep5.el5.noarch.rpm
tomcat6-docs-webapp-6.0.32-24_patch_07.ep5.el5.noarch.rpm
tomcat6-el-1.0-api-6.0.32-24_patch_07.ep5.el5.noarch.rpm
tomcat6-javadoc-6.0.32-24_patch_07.ep5.el5.noarch.rpm
tomcat6-jsp-2.1-api-6.0.32-24_patch_07.ep5.el5.noarch.rpm
tomcat6-lib-6.0.32-24_patch_07.ep5.el5.noarch.rpm
tomcat6-log4j-6.0.32-24_patch_07.ep5.el5.noarch.rpm
tomcat6-servlet-2.5-api-6.0.32-24_patch_07.ep5.el5.noarch.rpm
tomcat6-webapps-6.0.32-24_patch_07.ep5.el5.noarch.rpm
JBoss Enterprise Web Server 1.0 for RHEL 6 Server:
Source:
tomcat6-6.0.32-24_patch_07.ep5.el6.src.rpm
noarch:
tomcat6-6.0.32-24_patch_07.ep5.el6.noarch.rpm
tomcat6-admin-webapps-6.0.32-24_patch_07.ep5.el6.noarch.rpm
tomcat6-docs-webapp-6.0.32-24_patch_07.ep5.el6.noarch.rpm
tomcat6-el-1.0-api-6.0.32-24_patch_07.ep5.el6.noarch.rpm
tomcat6-javadoc-6.0.32-24_patch_07.ep5.el6.noarch.rpm
tomcat6-jsp-2.1-api-6.0.32-24_patch_07.ep5.el6.noarch.rpm
tomcat6-lib-6.0.32-24_patch_07.ep5.el6.noarch.rpm
tomcat6-log4j-6.0.32-24_patch_07.ep5.el6.noarch.rpm
tomcat6-servlet-2.5-api-6.0.32-24_patch_07.ep5.el6.noarch.rpm
tomcat6-webapps-6.0.32-24_patch_07.ep5.el6.noarch.rpm
These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-1184.html
https://www.redhat.com/security/data/cve/CVE-2011-2204.html
https://www.redhat.com/security/data/cve/CVE-2011-2526.html
https://www.redhat.com/security/data/cve/CVE-2011-3190.html
https://www.redhat.com/security/data/cve/CVE-2011-3375.html
https://www.redhat.com/security/data/cve/CVE-2011-4858.html
https://www.redhat.com/security/data/cve/CVE-2011-5062.html
https://www.redhat.com/security/data/cve/CVE-2011-5063.html
https://www.redhat.com/security/data/cve/CVE-2011-5064.html
https://www.redhat.com/security/data/cve/CVE-2012-0022.html
https://access.redhat.com/security/updates/classification/#moderate
http://tomcat.apache.org/security-6.html
https://issues.jboss.org/browse/JBPAPP-4873
https://issues.jboss.org/browse/JBPAPP-6133
https://issues.jboss.org/browse/JBPAPP-6852
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPunmrXlSAg2UNWIIRAkA4AKCTaGA0dlkzcdXw8BMDz6i6Kk31iQCbBwk5
HGbJnvqJAVX57f9/Kpj3+R4=
=pyZw
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. 
A flaw was found in the way JBoss Web handled UTF-8 surrogate pair
characters. If JBoss Web was hosting an application with UTF-8 character
encoding enabled, or that included user-supplied UTF-8 strings in a
response, a remote attacker could use this flaw to cause a denial of
service (infinite loop) on the JBoss Web server. 
Warning: Before applying this update, back up your JBoss Enterprise
Application Platform's "jboss-as/server/[PROFILE]/deploy/" directory, along
with all other customized configuration files. It comprises a set of offerings for enterprise
customers who are looking for pre-configured profiles of JBoss Enterprise
Middleware components that have been tested and certified together to
provide an integrated experience. Refer to the
JBoss Enterprise Portal Platform 4.3 CP07 Release Notes, available shortly
from docs.redhat.com, for information on the most significant bug fixes
included in this release. 
The following security fixes are also included:
JBoss Seam 2 did not properly block access to JBoss Expression Language
(EL) constructs in page exception handling, allowing arbitrary Java methods
to be executed. A remote attacker could use this flaw to execute arbitrary
code via a specially-crafted URL provided to certain applications based on
the JBoss Seam 2 framework. Note: A properly configured and enabled Java
Security Manager would prevent exploitation of this flaw. (CVE-2011-1484)
Note: If you have created custom applications that are packaged with a copy
of the JBoss Seam 2 library, those applications must be rebuilt with the
updated jboss-seam.jar file provided by this update. (CVE-2011-1184, CVE-2011-5062,
CVE-2011-5063, CVE-2011-5064)
The invoker servlets, deployed by default via httpha-invoker, only
performed access control on the HTTP GET and POST methods, allowing remote
attackers to make unauthenticated requests by using different HTTP methods. 
Due to the second layer of authentication provided by a security
interceptor, this issue is not exploitable on default installations unless
an administrator has misconfigured the security interceptor or disabled it. Solution:
The References section of this erratum contains a download link (you must
log in to download the update). 
Note that if you have created custom applications that are packaged with a
copy of the JBoss Seam 2 library, those applications must be rebuilt with
the updated jboss-seam.jar file provided by this update. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
3. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tomcat5-5.5.23-0jpp.31.el5_8.src.rpm
i386:
tomcat5-debuginfo-5.5.23-0jpp.31.el5_8.i386.rpm
tomcat5-jsp-2.0-api-5.5.23-0jpp.31.el5_8.i386.rpm
tomcat5-servlet-2.4-api-5.5.23-0jpp.31.el5_8.i386.rpm
x86_64:
tomcat5-debuginfo-5.5.23-0jpp.31.el5_8.x86_64.rpm
tomcat5-jsp-2.0-api-5.5.23-0jpp.31.el5_8.x86_64.rpm
tomcat5-servlet-2.4-api-5.5.23-0jpp.31.el5_8.x86_64.rpm
RHEL Desktop Workstation (v. Description:
The JBoss Communications Platform (JBCP) is an open source VoIP platform
certified for JAIN SLEE 1.1 and SIP Servlets 1.1 compliance. JBCP serves as
a high performance core for Service Delivery Platforms (SDPs) and IP
Multimedia Subsystems (IMSs) by leveraging J2EE to enable the convergence
of data and video in Next-Generation Intelligent Network (NGIN)
applications. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Hitachi COBOL2002 Products Unspecified Vulnerability
SECUNIA ADVISORY ID:
SA47612
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47612/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47612
RELEASE DATE:
2012-01-20
DISCUSS ADVISORY:
http://secunia.com/advisories/47612/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47612/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47612
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Hitachi has reported a vulnerability in some COBOL2002 products,
which can be exploited by malicious users to compromise a vulnerable
system. 
The vulnerability is caused due to an unspecified error. No further
information is currently available. 
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor. 
ORIGINAL ADVISORY:
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-002/index.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201112-0360 | No CVE | D-Link DSL-500T ADSL Router Remote Vulnerability | 
                                      
                                        CVSS V2: - CVSS V3: - Severity: -  | 
                            The DSL-500T is an ADSL2 terminal with routing function. It is connected to a computer via an Ethernet interface and has powerful routing functions. It is ideal for home, office and SOHO users. D-Link DSL-500T ADSL routers have predictable resource locations, brute force guesses, and cross-site request forgery vulnerabilities that can be exploited by malicious users to change router settings, brute force passwords, perform CSRF attacks, and remote logins.
                        
| VAR-201112-0187 | CVE-2011-4723 | D-Link DIR-300 Vulnerability to obtain important information in router | 
                                      
                                        CVSS V2: 6.8 CVSS V3: 5.7 Severity: MEDIUM  | 
                            The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors. D-Link is a network company founded by Taiwan D-Link Group, dedicated to the R&D, production and marketing of LAN, broadband network, wireless network, voice network and related network equipment. D-Link DIR-300 routers are vulnerable to encryption issues
                        
| VAR-201112-0148 | CVE-2011-4050 | 7-Technologies Interactive Graphical SCADA System Data Server Remote Denial Of Service Vulnerability | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            Buffer overflow in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) 9.0.0.11200 allows remote attackers to cause a denial of service via a crafted packet to TCP port 12401. The 7T Interactive Graphical SCADA System is an automated monitoring and control system. 
Attackers can exploit this issue to crash the application, denying service to legitimate users. 
7-Technologies Interactive Graphical SCADA System 9.0.0.11200 is affected; other versions may also be vulnerable. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
7-Technologies Interactive Graphical SCADA System Data Server Denial
of Service
SECUNIA ADVISORY ID:
SA47327
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47327/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47327
RELEASE DATE:
2011-12-21
DISCUSS ADVISORY:
http://secunia.com/advisories/47327/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47327/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47327
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in 7-Technologies Interactive
Graphical SCADA System, which can be exploited by malicious people to
cause a DoS (Denial of Service). 
The vulnerability is reported in version 9.0.0.11200. 
SOLUTION:
Apply patch. 
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits UCQ, Cyber Defense Institute, Inc. 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-335-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201112-0250 | CVE-2011-4856 | Parallels Plesk Panel Design Error Vulnerability | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 sends incorrect Content-Type headers for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving admin/health/parameters and certain other files.  NOTE: it is possible that only clients, not the Plesk product, could be affected by this issue. A remote attacker can cause an unexplained impact by exploiting an interpretation conflict that includes admin/health/parameters and some other file
                        
| VAR-201112-0249 | CVE-2011-4855 | Parallels Plesk Panel Design Error Vulnerability | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 omits the Content-Type header's charset parameter for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving admin/customer-service-plan/list/reset-search/true/ and certain other files.  NOTE: it is possible that only clients, not the Plesk product, could be affected by this issue. There is a vulnerability in Parallels Plesk Panel 10.4.4_build20111103.18. A remote attacker can cause an unexplained impact by exploiting an interpretation conflict that includes admin/customer-service-plan/list/reset-search/true/ and some other file
                        
| VAR-201112-0248 | CVE-2011-4854 | Parallels Plesk Panel Design Error Vulnerability | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 does not ensure that Content-Type HTTP headers match the corresponding Content-Type data in HTML META elements, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving the get_enabled_product_icon program.  NOTE: it is possible that only clients, not the Plesk product, could be affected by this issue. A remote attacker can cause an unexplained impact by exploiting an interpretation conflict that includes the get_enabled_product_icon program
                        
| VAR-201112-0247 | CVE-2011-4853 | Parallels Plesk Panel Information Disclosure Vulnerability | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 includes an RFC 1918 IP address within a web page, which allows remote attackers to obtain potentially sensitive information by reading this page, as demonstrated by smb/user/list-data/items-per-page/ and certain other files
                        
| VAR-201112-0246 | CVE-2011-4852 | Parallels Plesk Panel Information Disclosure Vulnerability | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 generates web pages containing external links in response to GET requests with query strings for enterprise/mobile-monitor/ and certain other files, which makes it easier for remote attackers to obtain sensitive information by reading (1) web-server access logs or (2) web-server Referer logs, related to a "cross-domain Referer leakage" issue. request
                        
| VAR-201112-0245 | CVE-2011-4851 | Parallels Plesk Panel Trust Management Vulnerability | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 generates a password form field without disabling the autocomplete feature, which makes it easier for remote attackers to bypass authentication by leveraging an unattended workstation, as demonstrated by forms in server/google-tools/ and certain other files. There is a vulnerability in Parallels Plesk Panel 10.4.4_build20111103.18, and the Control Panel is not disabled. The AutoComplete function generates a password form field
                        
| VAR-201112-0244 | CVE-2011-4850 | Parallels Plesk Panel Information Disclosure Vulnerability | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 does not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie, as demonstrated by cookies used by help.php and certain other files
                        
| VAR-201112-0243 | CVE-2011-4849 | Parallels Plesk Panel of Control Panel In Cookie Vulnerability that is captured | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session, as demonstrated by cookies used by help.php and certain other files