<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Upgrade and Vulnerability - Please URGENT in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472243#M212005</link>
    <description>Dear All&lt;BR /&gt;We have HP rp7400 Server which is 2 Node cluster with 4 CPU, 4 GB RAM, 6 GB Swap Memory, with va7100 array (6X36 GB), having HPUX B.11.11.U ver. and running Oracle 9i &amp;amp; 9iAS with 4 Packages. Three Package in NODE one and One Package in NODE two.&lt;BR /&gt;&lt;BR /&gt;Now the issue is our Nework Security Team has suggested few VULNERABILITY which reads as - "ftp(21/tcp) flaw server is running an FTP server which is vulnerable to 'glob heap corruption flaw'. And attacker may use this problem to executed arbitory commands" and they&lt;BR /&gt;&lt;BR /&gt;RECOMMENDED --- Upgrade ftp server software to latest version.&lt;BR /&gt;&lt;BR /&gt;I want to know what is this glob heap corruption flaw and how to upgrade the ftp server software to latest.&lt;BR /&gt;&lt;BR /&gt;I also want to know how to add, delete, stop and start the services.&lt;BR /&gt;&lt;BR /&gt;Regds &lt;BR /&gt;Vishal</description>
    <pubDate>Thu, 27 Jan 2005 04:22:14 GMT</pubDate>
    <dc:creator>vishal_18</dc:creator>
    <dc:date>2005-01-27T04:22:14Z</dc:date>
    <item>
      <title>Upgrade and Vulnerability - Please URGENT</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472243#M212005</link>
      <description>Dear All&lt;BR /&gt;We have HP rp7400 Server which is 2 Node cluster with 4 CPU, 4 GB RAM, 6 GB Swap Memory, with va7100 array (6X36 GB), having HPUX B.11.11.U ver. and running Oracle 9i &amp;amp; 9iAS with 4 Packages. Three Package in NODE one and One Package in NODE two.&lt;BR /&gt;&lt;BR /&gt;Now the issue is our Nework Security Team has suggested few VULNERABILITY which reads as - "ftp(21/tcp) flaw server is running an FTP server which is vulnerable to 'glob heap corruption flaw'. And attacker may use this problem to executed arbitory commands" and they&lt;BR /&gt;&lt;BR /&gt;RECOMMENDED --- Upgrade ftp server software to latest version.&lt;BR /&gt;&lt;BR /&gt;I want to know what is this glob heap corruption flaw and how to upgrade the ftp server software to latest.&lt;BR /&gt;&lt;BR /&gt;I also want to know how to add, delete, stop and start the services.&lt;BR /&gt;&lt;BR /&gt;Regds &lt;BR /&gt;Vishal</description>
      <pubDate>Thu, 27 Jan 2005 04:22:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472243#M212005</guid>
      <dc:creator>vishal_18</dc:creator>
      <dc:date>2005-01-27T04:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrade and Vulnerability - Please URGENT</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472244#M212006</link>
      <description>Hi Vishal,&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.prosumis.com/account/viewtest.php?id=10821&amp;amp;PHPSESSID=1172506e1a3b6e22d86373a597bb985f" target="_blank"&gt;https://www.prosumis.com/account/viewtest.php?id=10821&amp;amp;PHPSESSID=1172506e1a3b6e22d86373a597bb985f&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;PHNE_21936 ftp patch for 11.0, latest ftp patch for 11i &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www4.itrc.hp.com/service/patch/patchDetail.do?BC=patch.breadcrumb.main" target="_blank"&gt;http://www4.itrc.hp.com/service/patch/patchDetail.do?BC=patch.breadcrumb.main&lt;/A&gt;|patch.breadcrumb.search|&amp;amp;patchid=PHNE_29461&amp;amp;context=hpux:800:11:11&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Robert-Jan</description>
      <pubDate>Thu, 27 Jan 2005 05:21:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472244#M212006</guid>
      <dc:creator>Robert-Jan Goossens</dc:creator>
      <dc:date>2005-01-27T05:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrade and Vulnerability - Please URGENT</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472245#M212007</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;we had the same problem with our security team, we applied recent ftp patch, It solvd the problem</description>
      <pubDate>Thu, 27 Jan 2005 05:48:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472245#M212007</guid>
      <dc:creator>Ravi_8</dc:creator>
      <dc:date>2005-01-27T05:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrade and Vulnerability - Please URGENT</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472246#M212008</link>
      <description>Hi &lt;BR /&gt;&lt;BR /&gt;Visal again, actually i want to know anothere thing that-- there will not be any issue with this after upgradeing to the server / database... &lt;BR /&gt;&lt;BR /&gt;I also want to know how to add, delete, stop and start the services - such as snmp, smtp etc &lt;BR /&gt;&lt;BR /&gt;regds&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Jan 2005 07:01:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472246#M212008</guid>
      <dc:creator>vishal_18</dc:creator>
      <dc:date>2005-01-27T07:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrade and Vulnerability - Please URGENT</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472247#M212009</link>
      <description>To add or delete inetd services such as telnet, ftp, etc., simply comment out the appropriate lines in /etc/inetd.conf and run 'inetd -c' to apply the changes.&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Jan 2005 08:48:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472247#M212009</guid>
      <dc:creator>Tom Danzig</dc:creator>
      <dc:date>2005-01-27T08:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrade and Vulnerability - Please URGENT</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472248#M212010</link>
      <description>Since the patch only affects ftpd, there will be no change to your database software. Like all patches, you need to read the details to see if there are potential conflicts. The only safe way to patch your system is by having a test system that is a copy of your production system. And always make regular Ignite/UX backups.&lt;BR /&gt; &lt;BR /&gt;As far as starting and stopping services, these are configured in the /etc/rc.config.d directory. These files start various services at bootup, and terminate them down during a shutdown. For example, to turn off all SNMP services, set the enabling flag to =0 rather than =1 in these files:&lt;BR /&gt;&lt;BR /&gt;/etc/rc.config.d/SnmpMaster&lt;BR /&gt;/etc/rc.config.d/SnmpHpunix&lt;BR /&gt;/etc/rc.config.d/SnmpTrpDst&lt;BR /&gt;/etc/rc.config.d/SnmpMib2&lt;BR /&gt; &lt;BR /&gt;For sendmail (SMTP), edit&lt;BR /&gt; &lt;BR /&gt;/etc/rc.config.d/mailservs&lt;BR /&gt; &lt;BR /&gt;Here are the details:&lt;BR /&gt;&lt;A href="http://docs.hp.com/en/5990-8172/ch05s03.html" target="_blank"&gt;http://docs.hp.com/en/5990-8172/ch05s03.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If you need to stop the services immediately, use the start/stop scripts:&lt;BR /&gt; &lt;BR /&gt;/sbin/init.d/SnmpMaster stop&lt;BR /&gt;/sbin/init.d/SnmpHpunix stop&lt;BR /&gt;/sbin/init.d/SnmpTrpDst stop&lt;BR /&gt;/sbin/init.d/SnmpMib2 stop&lt;BR /&gt;&lt;BR /&gt;Now you can edit the config files. Some start/stop scripts have been coded so that the stop command is ignored if the enabling flag (=1) is set to zero (=0), so stop the service then edit the config files.&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Jan 2005 09:00:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472248#M212010</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2005-01-27T09:00:21Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrade and Vulnerability - Please URGENT</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472249#M212011</link>
      <description>"we had the same problem with our security team, we applied recent ftp patch, It solvd the problem"&lt;BR /&gt;&lt;BR /&gt;You didn't have a problem with Your security team - they had one with You. &lt;BR /&gt;You should at least with one system that runs the hp security patch notification if You don't stay uptodate otherwise. This is more than risky.&lt;BR /&gt;&lt;BR /&gt;just my $.02</description>
      <pubDate>Thu, 27 Jan 2005 09:11:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472249#M212011</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-01-27T09:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrade and Vulnerability - Please URGENT</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472250#M212012</link>
      <description>Thanks a lot to one and all&lt;BR /&gt;&lt;BR /&gt;vishal</description>
      <pubDate>Fri, 28 Jan 2005 02:12:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/upgrade-and-vulnerability-please-urgent/m-p/3472250#M212012</guid>
      <dc:creator>vishal_18</dc:creator>
      <dc:date>2005-01-28T02:12:53Z</dc:date>
    </item>
  </channel>
</rss>

