發信人: tw-cert () 看板: security 日期: Mon Mar 18 19:29:59 2002 標題: TW-CA-2002-054-[HPSBTL0202-025: Updated ncurses4 compat pac TW-CA-2002-054-[HPSBTL0202-025: Updated ncurses4 compat packages are available] ------------------------------------------------------------------------------- TWCERT發布日期:2002-03-15 原漏洞發布日期:2002-03-01 分類:Gain Priviledge 來源參考:SecurityFocus Advisories ------ 簡述 ------------------------------------------------------------------- 在 ncurses4 上的安全漏洞問題。 ------ 說明 ------------------------------------------------------------------- ncrses library 提供了螢幕處理的終端獨立方法(terminal-independent method)。 ncurses4 是根據 ncrses 所設計,並且它被設計成與 ABI 相容。未經授權的使用者可利 用該漏洞在主機上執行任何指令。Linux 平台上的 HP Secure OS 軟體的預設安裝並不會 安裝 telnet server。 ------ 影響平台 --------------------------------------------------------------- 任何使用 HP Secure OS 1.0 軟體的 Linux 平台。 ------ 修正方式 --------------------------------------------------------------- 安裝適當的RPM。 Hewlett-Packard 公司建議客戶至下列的 Red Hat Security Advisory 下載 RPMs: 2002-02-19 (RHSA-2002-020) Updated ncurses4 compat packages are available http://www.redhat.com/support/errata/RHSA-2002-020.html 安裝步驟如下: 1.如果您有使用 tripwire 產品,HP建議您先執行完整性檢查,並在安裝 security bulletin RPM 前修正任何的不正確設定。 tripwire --check --interactive 2.使用 root 帳號安裝 security bulletin RPM。 rpm -F 3.更新 tripwire 資料庫。 tripwire --check --interactive ------ 影響結果 --------------------------------------------------------------- 存在未經授權的指令會以root權限執行的潛在危機。 ------ 連絡 TW-CERT ----------------------------------------------------------- Tel: 886-7-5250211 Fax: 886-7-5250212 886-2-23563303 886-2-23924082 Email: twcert@cert.org.tw URL: http://www.cert.org.tw/ PGP key: http://www.cert.org.tw/eng/pgp.htm =============================================================================== 附件:[HPSBTL0202-025: Updated ncurses4 compat packages are available] HPSBTL0202-025: Updated ncurses4 compat packages are available Published: Mar 01, 2002 Updated: Mar 01, 2002 ------------------------------------------------------------------------------- Document ID: HPSBTL0202-025 Date Loaded: 20020222 Title: Updated ncurses4 compat packages are available TEXT --------------------------------------------------------------- HEWLETT-PACKARD COMPANY SECURITY ADVISORY: #025 Originally issued: 22 February '02 --------------------------------------------------------------- The information in the following Security Advisory should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from the customer's failure to fully implement instructions in this Security Advisory as soon as possible. Because the vulnerability does not require a Hewlett-Packard Secure OS 1.0 patch or re-packaging of the RPM affected by the advisory, the RPMs have not been produced or tested by Hewlett-Packard. --------------------------------------------------------------- PROBLEM: Security vulnerability in ncurses4. PLATFORM: Any system running HP Secure OS software for Linux Release 1.0 DAMAGE: Potential unauthorized execution of commands by a remote users SOLUTION: Apply the appropriate RPMs (see section B below) MANUAL ACTIONS: None AVAILABILITY: The RPMs are available now. --------------------------------------------------------------- A. Background The ncurses library provides a terminal-independent method of screen handling. ncurses4 is bases on ncurses but has been made ABI compatible. A vulnerablity exists that could be exploited by an unauthorized remote user to execute commands. ncurses4 is not included in the default installation of HP Secure OS Software for Linux Release 1.0. B. Fixing the problem Hewlett-Packard recommends that customers download the RPMs listed in the following Red Hat Security Advisory: 2002-02-19 (RHSA-2002-020) Updated ncurses4 compat packages are available http://www.redhat.com/support/errata/RHSA-2002-020.html To install the security advisory RPMs, use the following sequence of commands: 1. If you use the tripwire product, we recommend that you run a a consistency check and fix any violations before installing the security advisory RPM. tripwire --check --interactive 2. Install the advisory RPM from the root account. rpm -F 3. Update the tripwire database tripwire --check --interactive NOTE: The rpm -q command can be used to determine if the product is installed. Hewlett-Packard recommends applying the security advisory fixes to installed packages only. The -F option to the RPM installer will only apply the fix if the package is currently installed on the system. Dependent RPMs can be found by using the "Find Latest RPMs" search facility at http://www.redhat.com/apps/download. To find the latest dependent RPM enter the RPM's name in the "By Keyword" box. C. To subscribe to automatically receive future HP Security Bulletins from the HP IT Resource Center via electronic mail, do the following: Use your browser to access the HP IT Resource Center page at: http://itrc.hp.com Use the 'Login' tab at the left side of the screen to login using your ID and password. Use your existing login or the "Register" button at the left to create a login. Remember to save the User ID assigned to you, and your password. This login provides access to many useful areas of the ITRC. In the leftmost frame select "Maintenance and Support". Under the "Notifications" section (near the bottom of the page), select "Support Information Digests". To -subscribe- to future HP Security Bulletins or other Technical Digests, click the check box (in the left column) for the appropriate digest and then click the "Update Subscriptions" button at the bottom of the page. or To -review- bulletins already released, select the link (in the middle column) for the appropriate digest. D. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server. You may also get the security-alert PGP key by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this advisory to Hewlett-Packard (HP)customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the advisory is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. --------------------------------------------------------------- -----End of Document ID: HPSBTL0202-025-------------------------------------- -----End of Document ID: HPSBTL0202-025------------------------------------ ---- -- * Origin: 中山大學-美麗之島BBS * From: 140.117.101.140 [已通過認證] .