__________________________________________________________
	
						   The U.S. Department of Energy
					   Computer Incident Advisory Capability
							   ___  __ __    _     ___
							  /       |     /_\   /
							  \___  __|__  /   \  \___
				 __________________________________________________________
	
								 INFORMATION BULLETIN
	
				  HP OpenView Performance Manager (OVPM) Vulnerability
							[HPSBMA02236 SSRT061260 rev. 1]
	
	August 30, 2007 17:00 GMT                                         Number R-337
	______________________________________________________________________________
	PROBLEM:       A potential security vulnerability has been identified with HP 
				   OpenView Performance Manager (OVPM) running Shared Trace 
				   Service on HP-UX, Solaris, and Windows. 
	PLATFORM:      HP OpenView Performance Manager (OVPM) 5.x and 6.x running on 
				   HP-UX PA-RISC and IPF (B.11.11,B.11.23), Solaris (5.7, 5.8, 
				   5.9), Windows (2000, 2003 and Windows XP) 
	DAMAGE:        Could be remotely exploited to execute arbitrary code. 
	SOLUTION:      Upgrade to the appropriate version. 
	______________________________________________________________________________
	VULNERABILITY  The risk is MEDIUM. Could be remotely exploited to execute 
	ASSESSMENT:    arbitrary code. 
	______________________________________________________________________________
	LINKS: 
	 CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/r-337.shtml 
	 ORIGINAL BULLETIN:  Visit Hewlett-Packard Subscription Service for: 
						 HPSBMA02236 SSRT061260 rev. 1 
	______________________________________________________________________________
	[***** Start HPSBMA02236 SSRT061260 rev. 1 *****]
	
	SUPPORT COMMUNICATION - SECURITY BULLETIN
	Document ID: c01109171
	
	Version: 1
	
	HPSBMA02236 SSRT061260 rev.1 - HP OpenView Performance Manager (OVPM) Running 
	Shared Trace Service on HP-UX, Solaris, and Windows, Remote Arbitrary Code 
	Execution
	NOTICE: The information in this Security Bulletin should be acted upon as soon 
	as possible.
	Release Date: 2007-08-07
	
	Last Updated: 2007-08-07
	
	
	--------------------------------------------------------------------------------
	
	Potential Security Impact: Remote arbitrary code execution 
	
	Source: Hewlett-Packard Company, HP Software Security Response Team
	
	VULNERABILITY SUMMARY
	A potential security vulnerability has been identified with HP OpenView 
	Performance Manager (OVPM) running Shared Trace Service on HP-UX, Solaris, and 
	Windows. The vulnerability could be remotely exploited to execute arbitrary code.
	
	References: None 
	
	SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
	HP OpenView Performance Manager (OVPM) 5.x and 6.x running on 
	HP-UX PA-RISC and IPF (B.11.11,B.11.23), 
	Solaris (5.7, 5.8, 5.9), 
	Windows (2000, 2003 and Windows XP). 
	
	BACKGROUND
	For a PGP signed version of this security bulletin please write to: 
	security-alert@hp.com 
	
	The Hewlett-Packard Company thanks Cody Pierce of TippingPoint DV Labs 
	(dvlabs.tippingpoint.com) for reporting this vulnerability to 
	security-alert@hp.com.
	
	The Hewlett-Packard Company thanks an anonymous researcher working with the 
	iDefense VCP for reporting this vulnerability to security-alert@hp.com.
	
	To determine if a system has an affected version, search the output of "swlist 
	-a revision -l fileset" for an affected fileset. Then determine if the 
	recommended patch or update is installed. 
	
	AFFECTED VERSIONS 
	
	HP-UX B.11.23 (IA) 
	============= 
	HPOvLcore.HPOVXPL 
	action: install revision 3.10.040 or subsequent 
	URL: http://openview.hp.com/ecare/getsupportdoc?docid=QXCR1000390205 
	
	HP-UX B.11.23 (PA) 
	HP-UX B.11.11 
	HP-UX B.11.00 
	============= 
	HPOvLcore.HPOVXPL 
	action: install revision 3.10.040 or subsequent 
	URL: http://openview.hp.com/ecare/getsupportdoc?docid=QXCR1000390205 
	
	END AFFECTED VERSIONS 
	
	RESOLUTION
	HP has provided a hotfix to resolve this vulnerability. Please contact HP 
	Support and request the hotfix for QXCR1000390205: 
	http://openview.hp.com/ecare/getsupportdoc?docid=QXCR1000390205 
	
	MANUAL ACTIONS: Yes - NonUpdate 
	Install the hotfix 
	
	PRODUCT SPECIFIC INFORMATION 
	
	HP-UX Software Assistant: HP-UX Software Assistant is an enhanced 
	application that replaces HP-UX Security Patch Check. It analyzes all 
	HP-issued Security Bulletins and lists recommended actions that may apply 
	to a specific HP-UX system. It can also download patches and create a 
	depot automatically. For more information see: https://www.hp.com/go/swa 
	
	HISTORY 
	Version: 1 (rev.1) - 7 August 2007 Initial release 
	
	Third Party Security Patches: Third party security patches which are to be 
	installed on systems running HP software products should be applied in 
	accordance with the customer's patch management policy. 
	
	Support: For further information, contact normal HP Services support channel.
	
	Report: To report a potential security vulnerability with any HP supported 
	product, send Email to: security-alert@hp.com 
	It is strongly recommended that security related information being 
	communicated to HP be encrypted using PGP, especially exploit information. 
	To get the security-alert PGP key, please send an e-mail message as follows:
	  To: security-alert@hp.com 
	  Subject: get key
	Subscribe: To initiate a subscription to receive future HP Security Bulletins 
	via Email: 
	http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG
	&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC 
	On the web page: ITRC security bulletins and patch sign-up 
	Under Step1: your ITRC security bulletins and patches 
		-check ALL categories for which alerts are required and continue.
	Under Step2: your ITRC operating systems 
		-verify your operating system selections are checked and save.
	
	
	To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php 
	Log in on the web page: Subscriber's choice for Business: sign-in. 
	On the web page: Subscriber's Choice: your profile summary - use Edit Profile 
	to update appropriate sections.
	
	
	To review previously published Security Bulletins visit: 
	http://www.itrc.hp.com/service/cki/secBullArchive.do 
	
	
	* The Software Product Category that this Security Bulletin relates to is 
	represented by the 5th and 6th characters of the Bulletin number in the title: 
	GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW 
	MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS 
	PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux 
	TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault 
	
	System management and security procedures must be reviewed frequently to maintain 
	system integrity. HP is continually reviewing and enhancing the security features 
	of software products to provide customers with current secure solutions.
	
	
	"HP is broadly distributing this Security Bulletin in order to bring to the 
	attention of users of the affected HP products the important security information 
	contained in this Bulletin. HP recommends that all users determine the 
	applicability of this information to their individual situations and take 
	appropriate action. HP does not warrant that this information is necessarily 
	accurate or complete for all user situations and, consequently, HP will not be 
	responsible for any damages resulting from user's use or disregard of the 
	information provided in this Bulletin. To the extent permitted by law, HP 
	disclaims all warranties, either express or implied, including the warranties of 
	merchantability and fitness for a particular purpose, title and non-infringement."
	
	
	
	[***** End HPSBMA02236 SSRT061260 rev. 1 *****]
	_______________________________________________________________________________
	
	CIAC wishes to acknowledge the contributions of Hewlett-Packard for the 
	information contained in this bulletin.
	_______________________________________________________________________________
	
	
	CIAC, the Computer Incident Advisory Capability, is the computer
	security incident response team for the U.S. Department of Energy
	(DOE) and the emergency backup response team for the National
	Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
	National Laboratory in Livermore, California. CIAC is also a founding
	member of FIRST, the Forum of Incident Response and Security Teams, a
	global organization established to foster cooperation and coordination
	among computer security teams worldwide.
	
	CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
	can be contacted at:
		Voice:    +1 925-422-8193 (7x24)
		FAX:      +1 925-423-8002
		STU-III:  +1 925-423-2604
		E-mail:   ciac@ciac.org
	
	Previous CIAC notices, anti-virus software, and other information are
	available from the CIAC Computer Security Archive.
	
	   World Wide Web:      http://www.ciac.org/
	   Anonymous FTP:       ftp.ciac.org
	
	PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
	communities receive CIAC bulletins.  If you are not part of these
	communities, please contact your agency's response team to report
	incidents. Your agency's team will coordinate with CIAC. The Forum of
	Incident Response and Security Teams (FIRST) is a world-wide
	organization. A list of FIRST member organizations and their
	constituencies can be obtained via WWW at http://www.first.org/.
	
	This document was prepared as an account of work sponsored by an
	agency of the United States Government. Neither the United States
	Government nor the University of California nor any of their
	employees, makes any warranty, express or implied, or assumes any
	legal liability or responsibility for the accuracy, completeness, or
	usefulness of any information, apparatus, product, or process
	disclosed, or represents that its use would not infringe privately
	owned rights. Reference herein to any specific commercial products,
	process, or service by trade name, trademark, manufacturer, or
	otherwise, does not necessarily constitute or imply its endorsement,
	recommendation or favoring by the United States Government or the
	University of California. The views and opinions of authors expressed
	herein do not necessarily state or reflect those of the United States
	Government or the University of California, and shall not be used for
	advertising or product endorsement purposes.
	
	LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
	
	R-327: Cisco IOS Secure Copy Authorization Bypass Vulnerability
	R-328: Local Privilege Vulnerabilities in Cisco VPN Client
	R-329: Trend Micro ServerProtect Agent Vulnerabilities
	R-330: Asterisk Security Vulnerabilities
	R-331: HP-UX Running the Ignite-UX or the DynRootDisk (DRD) get_system_info Command
	R-332: MSN Messenger and Windows Live Messenger Webcam Vulnerability
	R-333: BIND Version 8 Vulnerable
	R-334: Oracle JInitiator Vulnerabilities
	R-335: rsync Vulnerability
	R-336: XSS and SQL Injection in Cisco CallManager/Unified Communications Manager Logon Page Vulnerabilities