__________________________________________________________
	
						   The U.S. Department of Energy
					   Computer Incident Advisory Capability
							   ___  __ __    _     ___
							  /       |     /_\   /
							  \___  __|__  /   \  \___
				 __________________________________________________________
	
								 INFORMATION BULLETIN
	
	   HP Help and Support Center Running on HP Notebook Computers VUlnerability
							[HPSBPI02226 SSRT061274 rev. 1]
	
	June 26, 2007 19:00 GMT                                           Number R-283
	______________________________________________________________________________
	PROBLEM:       A potential security vulnerability has been identified in HP 
				   Help and Support Center running on HP Notebook Computers 
				   running with Windows XP. 
	PLATFORM:      HP Help and Support Center earlier than v4.4 C running on HP 
				   Notebook Computers running with Microsoft Windows XP, XP 
				   Progessional, XP Home Edition, XP Tablet PC Edition. 
	DAMAGE:        A remote attacker could run arbitrary code. 
	SOLUTION:      Upgrade to the appropriate version. 
	______________________________________________________________________________
	VULNERABILITY  The risk is MEDIUM. A remote attacker could run arbitrary code 
	ASSESSMENT:    with the privileges ofthe attacked user if he can induce a user 
				   to open a crafted help file. 
	______________________________________________________________________________
	LINKS: 
	 CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/r-283.shtml 
	 ORIGINAL BULLETIN:  Visit Hewlett-Packard Subscription Service for: 
						 HBSBPI02226 SSRT061274 rev. 1 
	 CVE:                http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= 
						 CVE-2007-3180 
	______________________________________________________________________________
	[***** Start HPSBPI02226 SSRT061274 rev. 1 *****]
	
	Submitted Date: Mon Jun 11 01:00:00 EDT 2007
	Title: HPSBPI02226 SSRT061274 rev.1 - HP Help and Support Center Running on HP 
	Notebook Computers Running with Windows XP, Remote Unauthorized Access
	
	Document ID: emr_na-c01077085-1
	Last Modified Date: Mon Jun 18 01:00:00 EDT 2007
	 
	 
	
	You may provide feedback on this document 
	
	
	
	SUPPORT COMMUNICATION - SECURITY BULLETIN
	Document ID: c01077085
	
	Version: 1
	
	HPSBPI02226 SSRT061274 rev.1 - HP Help and Support Center Running on HP Notebook 
	Computers Running with Windows XP, Remote Unauthorized Access
	NOTICE: The information in this Security Bulletin should be acted upon as soon 
	as possible.
	Release Date: 2007-06-18
	
	Last Updated: 2007-06-18
	
	
	--------------------------------------------------------------------------------
	
	Potential Security Impact: Remote unauthorized access
	
	Source: Hewlett-Packard Company, HP Software Security Response Team
	
	VULNERABILITY SUMMARY
	A potential security vulnerability has been identified in HP Help and Support 
	Center running on HP Notebook Computers running with Windows XP. The vulnerability 
	could be remotely exploited to allow unauthorized access to the system.
	
	References: CVE-2007-3180 
	
	SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
	HP Help and Support Center earlier than v4.4 C running on HP Notebook Computers 
	running with Microsoft Windows XP, XP Professional, XP Home Edition, XP Tablet 
	PC Edition
	
	BACKGROUND
	For a PGP signed version of this security bulletin please write to: 
	security-alert@hp.com 
	
	This issue will only be on HP Notebook Computers that have HP Help and Support 
	with a version less than v4.4 C.
	
	To find the HP Help and Support version using Add/Remove programs:
	
	Click Start 
	Click Control Panel 
	Click Add or Remove programs 
	Scroll to HP Help and Support 
	Click on the "Click here for support information" link 
	The version number is displayed. 
	Note: If HP Help and Support is not found in the Add/Remove Programs list, no 
	further action is required.
	
	The Hewlett-Packard Company thanks Karl Lynn of Juniper Networks J-Security 
	Research Labs for reporting this vulnerability to security-alert@hp.com
	
	RESOLUTION
	HP has provided the following software update to resolve this vulnerability: 
	
	HP Help and Support Center v4.4 C or later 
	
	The updated HP Help and Support Center software is available for download at the 
	HP Customer Care site. Please click on the following link and then select the 
	appropriate language: http://h10025.www1.hp.com/ewfrf/wc/genericSoftware
	DownloadIndex?softwareitem=ob-48738-1&jumpid=reg_R1002_USEN 
	
	PRODUCT SPECIFIC INFORMATION 
	
	None
	
	HISTORY: 
	Version:1 (rev.1) - 18 June 2007 Initial Release 
	
	Third Party Security Patches: Third party security patches which are to be 
	installed on systems running HP software products should be applied in accordance 
	with the customer's patch management policy. 
	
	Support: For further information, contact normal HP Services support channel.
	
	Report: To report a potential security vulnerability with any HP supported product, 
	send Email to: security-alert@hp.com 
	It is strongly recommended that security related information being communicated to 
	HP be encrypted using PGP, especially exploit information. 
	To get the security-alert PGP key, please send an e-mail message as follows:
	  To: security-alert@hp.com 
	  Subject: get key
	Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: 
	http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&
	jumpid=in_SC-GEN__driverITRC&topiccode=ITRC 
	On the web page: ITRC security bulletins and patch sign-up 
	Under Step1: your ITRC security bulletins and patches 
	  - check ALL categories for which alerts are required and continue.
	Under Step2: your ITRC operating systems 
	  - verify your operating system selections are checked and save.
	
	
	To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php 
	Log in on the web page: Subscriber's choice for Business: sign-in. 
	On the web page: Subscriber's Choice: your profile summary - use Edit Profile to 
	update appropriate sections.
	
	
	To review previously published Security Bulletins visit: 
	http://www.itrc.hp.com/service/cki/secBullArchive.do 
	
	
	* The Software Product Category that this Security Bulletin relates to is 
	represented by the 5th and 6th characters of the Bulletin number in the title: 
	GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW 
	MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS 
	PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux 
	TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault 
	
	System management and security procedures must be reviewed frequently to maintain 
	system integrity. HP is continually reviewing and enhancing the security features 
	of software products to provide customers with current secure solutions.
	
	
	"HP is broadly distributing this Security Bulletin in order to bring to the attention 
	of users of the affected HP products the important security information contained in 
	this Bulletin. HP recommends that all users determine the applicability of this 
	information to their individual situations and take appropriate action. HP does not 
	warrant that this information is necessarily accurate or complete for all user 
	situations and, consequently, HP will not be responsible for any damages resulting 
	from user's use or disregard of the information provided in this Bulletin. To the 
	extent permitted by law, HP disclaims all warranties, either express or implied, 
	including the warranties of merchantability and fitness for a particular purpose, 
	title and non-infringement."
	
	
	
	[***** End HPSBPI02226 SSRT061274 rev. 1 *****]
	_______________________________________________________________________________
	
	CIAC wishes to acknowledge the contributions of Hewlett-Packard for the 
	information contained in this bulletin.
	_______________________________________________________________________________
	
	
	CIAC, the Computer Incident Advisory Capability, is the computer
	security incident response team for the U.S. Department of Energy
	(DOE) and the emergency backup response team for the National
	Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
	National Laboratory in Livermore, California. CIAC is also a founding
	member of FIRST, the Forum of Incident Response and Security Teams, a
	global organization established to foster cooperation and coordination
	among computer security teams worldwide.
	
	CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
	can be contacted at:
		Voice:    +1 925-422-8193 (7x24)
		FAX:      +1 925-423-8002
		STU-III:  +1 925-423-2604
		E-mail:   ciac@ciac.org
	
	Previous CIAC notices, anti-virus software, and other information are
	available from the CIAC Computer Security Archive.
	
	   World Wide Web:      http://www.ciac.org/
	   Anonymous FTP:       ftp.ciac.org
	
	PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
	communities receive CIAC bulletins.  If you are not part of these
	communities, please contact your agency's response team to report
	incidents. Your agency's team will coordinate with CIAC. The Forum of
	Incident Response and Security Teams (FIRST) is a world-wide
	organization. A list of FIRST member organizations and their
	constituencies can be obtained via WWW at http://www.first.org/.
	
	This document was prepared as an account of work sponsored by an
	agency of the United States Government. Neither the United States
	Government nor the University of California nor any of their
	employees, makes any warranty, express or implied, or assumes any
	legal liability or responsibility for the accuracy, completeness, or
	usefulness of any information, apparatus, product, or process
	disclosed, or represents that its use would not infringe privately
	owned rights. Reference herein to any specific commercial products,
	process, or service by trade name, trademark, manufacturer, or
	otherwise, does not necessarily constitute or imply its endorsement,
	recommendation or favoring by the United States Government or the
	University of California. The views and opinions of authors expressed
	herein do not necessarily state or reflect those of the United States
	Government or the University of California, and shall not be used for
	advertising or product endorsement purposes.
	
	LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
	
	R-273: Vulnerability in Windows Vista (931213)
	R-274: Mozilla Firefox Vulnerability
	R-275: OpenOffice.org Heap Overflow
	R-276: Kernel Security and Bug Fix Update
	R-277: Security Vulnerability in Sun Java System Directory Server
	R-278: Security Vulnerability in Solaris 10 NFS XDR Handling
	R-279: Multiple Security Vulnerabilities in samba(7)
	R-280: MPlayer Vulnerability
	R-281: Apple Security Update 2007-006
	R-282: libphp-phpmailer Security Vulnerability