Movatterモバイル変換


[0]ホーム

URL:


Home page logo
bugtraq logo

Bugtraqmailing list archives

PreviousBy DateNext
PreviousBy ThreadNext

(SSRT0822) Security Bulletin - Compaq & Java Proxy/VM Potential Security Vulnerabilities (fwd)


From: Dave Ahmad <da () securityfocus com>
Date: Tue, 14 May 2002 19:49:44 -0600 (MDT)

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1SECURITY BULLETINTITLE: (SSRT0822) Java(tm) Runtime Environment - Proxy and JVM                  Potential Security VulnerabilitiesNOTICE: There are no restrictions for distribution of this Bulletinprovided that it remains complete and intact.Posted at:http://www.support.compaq.com/patches/mailing-list.shtmlRELEASE DATE: May 2002SEVERITY:   HIGHSOURCE:            Compaq Computer Corporation            Compaq Services            Software Security Response TeamREFERENCE:            SUN Bulletin #00216 & #00218, CVE CAN-2002-0058 , CVE            CAN-2002-0076________________PROBLEM SUMMARY: When using Microsoft Internet Explorer or NetScape Navigator to browse to Compaq products incorporating affected versions of the Java Runtime Environment, users may become vulnerable to attack from untrusted applets.  These applets may be able to increase their privileges on the user system and potentially gain un- authorized access to system resources. This potential problem would exist on either side of a corporate firewall. Sun Microsystems published two security bulletins regarding potential vulnerabilities in Java(tm).     o The first is a security bulletin (#00216) regarding a       potential runtime environmental redirection issue that       may allow an untrusted applet to monitor requests to       and responses from an HTTP proxy server when a persistent       connection is used between a client and an HTTP proxy server.  NOTE: Only systems that have a HTTP proxy configured would be  vulnerable to this potential exploit.     o The second is a security bulletin (#00218) regarding a       potential vulnerability to attack of the Java Runtime       Environment Bytecode Verifier. The security advisory       states, "A vulnerability in the Java(TM) Runtime       Environment Bytecode Verifier may be exploited by an       untrusted applet to escalate privileges."__________________VERSIONS IMPACTED: Compaq Management Software   Compaq Insight Manager 7, Compaq Insight Manager XE, the   Compaq Management Agents and the Remote Insight Lights-Out   Edition Card leverage Java technology to deliver portions of their   functionality. The Java software causing this problem is delivered   as part of the Java Runtime Environment used to enable access to   these management products and as part of the server-side software   embedded in Compaq Insight Manager XE and Compaq Insight   Manager 7.   o Compaq Insight Manager XE     Compaq Insight Manager XE uses the Microsoft Java Runtime     Environment integrated into Microsoft Internet Explorer.=3D3D20   o Compaq Insight Manager 7     Compaq Insight Manager 7 uses the Sun Java Runtime Environment     version 1.3.1 in place of the Microsoft Java Runtime     Environment.   o Compaq Management Agents     See resolution Section   o Remote Insight Lights-Out Edition     See resolution Section Compaq Tru64 UNIX      V4.0f    SDK and JRE 1.1.7B-2      V4.0g    SDK and JRE 1.1.7B-2      V5.0a    SDK and JRE 1.1.7B-6      V5.1     SDK and JRE 1.1.8-6 (default) and 1.2.2-6 Compaq Nonstop Himalaya     No applets run on the Compaq NonStop Himalaya operating systems.     This is not a vulnerability on these systems. Compaq OpenVMS      V7.2 V7.2-1  SDK and JRE 1.1.6-2      V7.2-1h1     SDK and JRE 1.1.6-2      V7.2-1h2     SDK and JRE 1.1.6-2      V7.2-2       SDK and JRE 1.1.6-2      V7.3         SDK and JRE 1.1.8-5 (includes fix)      *Please note that this is an issue for the Alpha       architecture only. OpenVMS on Vax does not support Java.___________RESOLUTION: The following table outlines the suggested resolutions to the vulnerabilities described above. Suggested remedies will be different on a product-by-product depending on developer of the Java Runtime Environment and any dependencies for synchronization between server and client side components. Compaq Insight Manager XE   Compaq Insight Manager XE uses the Microsoft Java Runtime   Environment integrated into Microsoft Internet Explorer.   Compaq recommends that Compaq Insight Manager XE users   upgrade to Compaq Insight Manager 7 SP1 that will be   available for download in the first half of May athttp://www.compaq.com/manage. Compaq Insight Manager 7 SP1   leverages version 1.3.1_02 of the Sun Java Runtime Environment   that addresses the vulnerability described above. Prior to the   release of Compaq Insight Manager 7 SP1, Compaq recommends that   users exercise care when browsing to sites outside of the   internal network using a browser with a vulnerable version of   the Microsoft Java Runtime Environment.  While it is possible   to update the browser to the version of the Java Runtime   Environment recommended by Microsoft, this version has not been   tested with Compaq Insight Manager XE and Compaq cannot   guarantee that Insight Manager XE will function properly. Compaq Insight Manager 7   Compaq Insight Manager 7 uses the Sun Java Runtime Environment   version 1.3.1 in place of the Microsoft Java Runtime Environment.   Compaq is in the process of incorporating version 1.3.1_02 of the   runtime environment, which fixes the aforementioned vulnerability,   into Compaq Insight Manager 7 Service Pack 1.  Compaq Insight   Manager 7 SP1 will be available at the beginning of May. Users   may not use version 1.3.1_02 of the plug-in with the current   version of Compaq Insight Manager 7 as newer versions of the Sun   Java Runtime Environment are not backwards compatible and the   Insight Manager 7 may not function properly if client   and server side runtime environments are not of the same version.   Compaq recommends that current Compaq Insight Manager 7 users   close Microsoft Internet Explorer prior to browsing to   untrusted sites outside of the corporate firewall.  This will   ensure that the Java plug-in is closed prior to browsing to   sites on the public Internet.  With Compaq Insight Manager 7 SP1,   the requirement to close the browser prior to visiting public   sites will be removed. Compaq Management Agents   Update to the version of the Java Runtime Environment that   Microsoft Recommends.  This information may be found athttp://www.microsoft.com/java/vm/dl_vm40.htm Remote Insight Lights-Out Edition / Integrated Lights-Out on ProLiant DL360 G2   Update to the Java(tm) 2 Runtime Environment, Standard Edition,   version 1.3.1_02.  To download this software simply click on   the hyperlinkhttp://java.sun.com/j2se/1.3/ Compaq TRU64 UNIX   Tru64 UNIX - Java 1.1.7B-10   Tru64 UNIX - Java 1.1.8-13 (includes fix)   Tru64 UNIX - Java 1.2.2-12   Tru64 UNIX - Java 1.3.0-1   Tru64 UNIX - Java 1.3.1-2 (includes fix)   It is critical that the information posted athttp://www.compaq.com/java/alpha be reviewed before updating Java.   Tru64 UNIX 5.0 and higher include some Java-based tools that   depend on the Java environment version that ships with the   operating system and is installed in /usr/bin. If you change   the default system Java environment version, some operating   system tools, such as the SysMan Station, the SysMan Station   authentication daemon, and the Logical Storage Manager (LSM)  Storage Administrator, will not work correctly. Compaq OpenVMS   The following table shows Java versions that are available athttp://www.compaq.com/java/alpha  and indicates if the versionincludes   the fix:   Compaq OpenVMS - Java 1.1.8-5 (includes fix)   Compaq OpenVMS - Java 1.2.2-3   Compaq OpenVMS - Java 1.3.0-2 (includes fix)   Compaq OpenVMS - Java 1.3.1-2 (includes fix)   It is critical that the information posted athttp://www.compaq.com/java/alpha be reviewed before updating Java.__________SUBSCRIBE:To subscribe to automatically receive future SecurityAdvisories from the Compaq's Software Security Response Team viaelectronic mail:http://www.support.compaq.com/patches/mailing-list.shtml_______REPORT:To report a potential security vulnerability with any Compaqsupported product, send emailmailto:security-ssrt () compaq comormailto:sec-alert () compaq comCompaq appreciates your cooperation and patience. As always,Compaq urges you to periodically review your system managementand security procedures. Compaq will continue to review andenhance the security features of its products and work withour customers to maintain and improve the security and integrityof their systems."Compaq is broadly distributing this Security Bulletin in order tobring to the attention of users of the affected Compaq products theimportant security information contained in this Bulletin.Compaq recommends that all users determine the applicability ofthis information to their individual situations and take appropriateaction.  Compaq does not warrant that this information is necessarilyaccurate or complete for all user situations and, consequently,Compaq will not be responsible for any damages resulting fromuser's use or disregard of the information provided in thisBulletin."Copyright 2002 Compaq Information Technologies Group, L.P.Compaq shall not be liable for technical or editorial errorsor omissions contained herein. The information in this documentis subject to change without notice. Compaq and the names ofCompaq products referenced herein are, either, trademarksand/or service marks or registered trademarks and/or servicemarks of Compaq Information Technologies Group, L.P. Other productand company names mentioned herein may be trademarks and/or servicemarks of their respective owners.-----BEGIN PGP SIGNATURE-----Version: PGP 7.0.1iQA/AwUBPOFxFDnTu2ckvbFuEQKjvQCgrIbosO8ILvkzRikR2nit/mzy1k4An3TKaVsSiWVhRI67p1RCnquAtuf2=VRtm-----END PGP SIGNATURE-----

PreviousBy DateNext
PreviousBy ThreadNext

Current thread:


[8]ページ先頭

©2009-2026 Movatter.jp