<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Patch needed in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244530#M330495</link>
    <description>Tanks, hp gave a update this morning that there was a patch, &lt;BR /&gt;&lt;BR /&gt;I was talking about&lt;BR /&gt;&lt;A href="http://www.isc.org/index.pl?/sw/bind/bind-security.php" target="_blank"&gt;http://www.isc.org/index.pl?/sw/bind/bind-security.php&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;reading this is a system what has /usr/sbin/rpcbind running vulable??&lt;BR /&gt;</description>
    <pubDate>Mon, 04 Aug 2008 15:41:58 GMT</pubDate>
    <dc:creator>F Verschuren</dc:creator>
    <dc:date>2008-08-04T15:41:58Z</dc:date>
    <item>
      <title>Patch needed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244526#M330491</link>
      <description>Hi,&lt;BR /&gt;There is a report that there is a big security issue whit DSN does somebody knows if hp has a patch?&lt;BR /&gt;&lt;BR /&gt;more info:&lt;BR /&gt;Technical Cyber Security Alert TA08-190B&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Multiple DNS implementations vulnerable to cache poisoning&lt;BR /&gt;&lt;BR /&gt;  Original release date: July 08, 2008&lt;BR /&gt;  Last revised: --&lt;BR /&gt;  Source: US-CERT&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Systems Affected&lt;BR /&gt;&lt;BR /&gt;  Systems implementing:&lt;BR /&gt;    * Caching DNS resolvers&lt;BR /&gt;    * DNS stub resolvers&lt;BR /&gt;&lt;BR /&gt;  Affected systems include both client and server systems, and any other&lt;BR /&gt;  networked systems that include this functionality.&lt;BR /&gt;</description>
      <pubDate>Fri, 01 Aug 2008 10:27:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244526#M330491</guid>
      <dc:creator>F Verschuren</dc:creator>
      <dc:date>2008-08-01T10:27:10Z</dc:date>
    </item>
    <item>
      <title>Re: Patch needed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244527#M330492</link>
      <description>Have a look here....looks you are talking bout this.&lt;BR /&gt;&lt;A href="http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01506861-2" target="_blank"&gt;http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01506861-2&lt;/A&gt;</description>
      <pubDate>Fri, 01 Aug 2008 10:51:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244527#M330492</guid>
      <dc:creator>Anshumali</dc:creator>
      <dc:date>2008-08-01T10:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: Patch needed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244528#M330493</link>
      <description>It seems that hp des not have a patch availeble jet for the "virus".&lt;BR /&gt;</description>
      <pubDate>Mon, 04 Aug 2008 06:53:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244528#M330493</guid>
      <dc:creator>F Verschuren</dc:creator>
      <dc:date>2008-08-04T06:53:30Z</dc:date>
    </item>
    <item>
      <title>Re: Patch needed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244529#M330494</link>
      <description>&amp;gt;It seems that HP does not have a patch available yet for the "virus".&lt;BR /&gt;&lt;BR /&gt;That's not strictly true.  From Anshumali's link, it has new bind versions you can download and it mentions PHNE_37865.</description>
      <pubDate>Mon, 04 Aug 2008 07:45:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244529#M330494</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2008-08-04T07:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: Patch needed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244530#M330495</link>
      <description>Tanks, hp gave a update this morning that there was a patch, &lt;BR /&gt;&lt;BR /&gt;I was talking about&lt;BR /&gt;&lt;A href="http://www.isc.org/index.pl?/sw/bind/bind-security.php" target="_blank"&gt;http://www.isc.org/index.pl?/sw/bind/bind-security.php&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;reading this is a system what has /usr/sbin/rpcbind running vulable??&lt;BR /&gt;</description>
      <pubDate>Mon, 04 Aug 2008 15:41:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244530#M330495</guid>
      <dc:creator>F Verschuren</dc:creator>
      <dc:date>2008-08-04T15:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Patch needed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244531#M330496</link>
      <description>&amp;gt;reading this is a system what has /usr/sbin/rpcbind running vulnerable??&lt;BR /&gt;&lt;BR /&gt;Are you asking if this bind problem effects rpcbind?&lt;BR /&gt;I would think they are completely different.</description>
      <pubDate>Tue, 05 Aug 2008 03:13:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244531#M330496</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2008-08-05T03:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: Patch needed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244532#M330497</link>
      <description>Tanks, all!&lt;BR /&gt;&lt;BR /&gt;We will patch all the dns servers.&lt;BR /&gt;And we advice everybody to do the same&lt;BR /&gt;&lt;BR /&gt;to quote IBM:&lt;BR /&gt;&lt;BR /&gt;So we've moved from "the bad guys are out there" past "the invaders are at the gate" and on to "the bad guys are slipping inside".  If your organization has not yet patched your DNS servers&lt;BR /&gt;&lt;BR /&gt;Other qoute of IBM:&lt;BR /&gt;IBM has anounced specific patch releases as per 20 august 2008. These patches must be applied immidiatly as the exploit is already known to "certain" communities.&lt;BR /&gt;The possistion of the DNS-environment in the landscape is not relevant for this exploit.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Luckly HP has the patch avalable!</description>
      <pubDate>Tue, 05 Aug 2008 06:37:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244532#M330497</guid>
      <dc:creator>F Verschuren</dc:creator>
      <dc:date>2008-08-05T06:37:25Z</dc:date>
    </item>
    <item>
      <title>Re: Patch needed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244533#M330498</link>
      <description>Use Software Assistant to determine your status with all published Security Bulletins.  Get SWA from &lt;A href="https://www.hp.com/go/swa" target="_blank"&gt;https://www.hp.com/go/swa&lt;/A&gt; and then use the command:&lt;BR /&gt;&lt;BR /&gt;# swa report -a SEC -r issue&lt;BR /&gt;&lt;BR /&gt;To see all exposures.  Use the HTML report created as ~/.swa/report/swa_report.html to have direct links to the bulletin text itself.&lt;BR /&gt;&lt;BR /&gt;In the action report all required patches will be listed, and non-patch actions such as product updates and removals will be listed in the manual actions section.&lt;BR /&gt;&lt;BR /&gt;The patch-specific content can be downloaded using the command:&lt;BR /&gt;&lt;BR /&gt;# swa get -t /depots/mySecPatchDepot</description>
      <pubDate>Wed, 06 Aug 2008 16:19:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patch-needed/m-p/4244533#M330498</guid>
      <dc:creator>Bob E Campbell</dc:creator>
      <dc:date>2008-08-06T16:19:06Z</dc:date>
    </item>
  </channel>
</rss>

