<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Patching HP Security Bulletin 175 - dtspcd in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/patching-hp-security-bulletin-175-dtspcd/m-p/3762407#M740765</link>
    <description>Shalom Joe,&lt;BR /&gt;&lt;BR /&gt;You should not harden the 10.20 system, you should look into replacing it with a hardened system.&lt;BR /&gt;&lt;BR /&gt;The OS out of support some three years this July and the tools to harden newer releases are much more extensive.&lt;BR /&gt;&lt;BR /&gt;I'd have to see the data from the scanners and no what tool they are using to further assist. they could be wrong.&lt;BR /&gt;&lt;BR /&gt;You can close the vulnerability by not using the daemon at all. Bastille commonly offers to disable this on newer OS's.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Thu, 30 Mar 2006 13:16:52 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2006-03-30T13:16:52Z</dc:date>
    <item>
      <title>Patching HP Security Bulletin 175 - dtspcd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patching-hp-security-bulletin-175-dtspcd/m-p/3762405#M740763</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;I'm trying to harden an HP-UX 10.20 system to withstand security scans.  The network security folks tell me that I need to patch the CDE Subprocess Control daemon, and this vulnerability corresponds to HP Security Bulletin 175.  &lt;BR /&gt;&lt;BR /&gt;So I use the HP software patch website and download the "recommended patch", PHSS_29201 (s700_800 10.20 CDE Runtime Patch), which is described as an updated version of the patch listed in the bulletin.  It also has two dependencies which I added to the software depot.  I used swinstall to put the depot on the system.  The system said that all 8 packages were installed correctly.&lt;BR /&gt;&lt;BR /&gt;My only problem is that even though I believe the system is patched, the security people say their scanner still finds the vulnerability.  At this point I'm stumped, because I've already tried removing and reinstalling the patches and the scan result remains the same.  Anyone have any pointers on this?&lt;BR /&gt;&lt;BR /&gt;Joe</description>
      <pubDate>Thu, 30 Mar 2006 12:29:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patching-hp-security-bulletin-175-dtspcd/m-p/3762405#M740763</guid>
      <dc:creator>joeone</dc:creator>
      <dc:date>2006-03-30T12:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: Patching HP Security Bulletin 175 - dtspcd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patching-hp-security-bulletin-175-dtspcd/m-p/3762406#M740764</link>
      <description>Do you need dtspcd?  If you don't need it, then comment it out in /etc/inetd.conf and then stop and restart inetd.&lt;BR /&gt;&lt;BR /&gt;This should definitely fix the problem.</description>
      <pubDate>Thu, 30 Mar 2006 12:33:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patching-hp-security-bulletin-175-dtspcd/m-p/3762406#M740764</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2006-03-30T12:33:14Z</dc:date>
    </item>
    <item>
      <title>Re: Patching HP Security Bulletin 175 - dtspcd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patching-hp-security-bulletin-175-dtspcd/m-p/3762407#M740765</link>
      <description>Shalom Joe,&lt;BR /&gt;&lt;BR /&gt;You should not harden the 10.20 system, you should look into replacing it with a hardened system.&lt;BR /&gt;&lt;BR /&gt;The OS out of support some three years this July and the tools to harden newer releases are much more extensive.&lt;BR /&gt;&lt;BR /&gt;I'd have to see the data from the scanners and no what tool they are using to further assist. they could be wrong.&lt;BR /&gt;&lt;BR /&gt;You can close the vulnerability by not using the daemon at all. Bastille commonly offers to disable this on newer OS's.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 30 Mar 2006 13:16:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patching-hp-security-bulletin-175-dtspcd/m-p/3762407#M740765</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-03-30T13:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: Patching HP Security Bulletin 175 - dtspcd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/patching-hp-security-bulletin-175-dtspcd/m-p/3762408#M740766</link>
      <description>Thanks for the tip... for some reason, the security bulletin didn't explicitly say to stop the service.  But I think that stopping it solves the problem better than installing the patch...  &lt;BR /&gt;</description>
      <pubDate>Fri, 07 Apr 2006 16:38:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/patching-hp-security-bulletin-175-dtspcd/m-p/3762408#M740766</guid>
      <dc:creator>joeone</dc:creator>
      <dc:date>2006-04-07T16:38:46Z</dc:date>
    </item>
  </channel>
</rss>

