<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability in Apache OpenSSL  - ALERT SECURITY ISSUE in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806253#M754495</link>
    <description>I just got a mesage about a security&lt;BR /&gt;potential problem = Denial of Service&lt;BR /&gt;&lt;BR /&gt;For HP-UX 11.00 (and up) and Apache SSL&lt;BR /&gt;1.3.26 or lower.&lt;BR /&gt;&lt;BR /&gt;We are using 1.3.22.  &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://online.securityfocus.com/advisories/4469" target="_blank"&gt;http://online.securityfocus.com/advisories/4469&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Can someone tell me if they are reinstalling&lt;BR /&gt;the lastest Apache? I know from MoreNet &lt;BR /&gt;that a whole bunch of Linux servers are&lt;BR /&gt;affected, no unix yet.&lt;BR /&gt;&lt;BR /&gt;Are folks worried? How can I be sure&lt;BR /&gt;about my Apache version and SSL version?&lt;BR /&gt;&lt;BR /&gt;I am trying to understand the URL...What&lt;BR /&gt;do they want us to do?&lt;BR /&gt;Laurie</description>
    <pubDate>Fri, 13 Sep 2002 20:47:56 GMT</pubDate>
    <dc:creator>Laurie_2</dc:creator>
    <dc:date>2002-09-13T20:47:56Z</dc:date>
    <item>
      <title>Vulnerability in Apache OpenSSL  - ALERT SECURITY ISSUE</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806253#M754495</link>
      <description>I just got a mesage about a security&lt;BR /&gt;potential problem = Denial of Service&lt;BR /&gt;&lt;BR /&gt;For HP-UX 11.00 (and up) and Apache SSL&lt;BR /&gt;1.3.26 or lower.&lt;BR /&gt;&lt;BR /&gt;We are using 1.3.22.  &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://online.securityfocus.com/advisories/4469" target="_blank"&gt;http://online.securityfocus.com/advisories/4469&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Can someone tell me if they are reinstalling&lt;BR /&gt;the lastest Apache? I know from MoreNet &lt;BR /&gt;that a whole bunch of Linux servers are&lt;BR /&gt;affected, no unix yet.&lt;BR /&gt;&lt;BR /&gt;Are folks worried? How can I be sure&lt;BR /&gt;about my Apache version and SSL version?&lt;BR /&gt;&lt;BR /&gt;I am trying to understand the URL...What&lt;BR /&gt;do they want us to do?&lt;BR /&gt;Laurie</description>
      <pubDate>Fri, 13 Sep 2002 20:47:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806253#M754495</guid>
      <dc:creator>Laurie_2</dc:creator>
      <dc:date>2002-09-13T20:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Apache OpenSSL  - ALERT SECURITY ISSUE</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806254#M754496</link>
      <description>&lt;BR /&gt;The advisory gives a clear answer, so I'd go with the provided solution. Any other would be dangerous and irresponsible!&lt;BR /&gt;&lt;BR /&gt;Of course the real answer lies within the infrastructure that you have built for protecting servers in the DMZ and servers within your internal network!&lt;BR /&gt;&lt;BR /&gt;Routers, switches, firewalls, filters, bastion hosts (&lt;A href="http://people.hp.se/stevesk/bastion.html)," target="_blank"&gt;http://people.hp.se/stevesk/bastion.html),&lt;/A&gt; static IP routing, expose only what is necessary! I have web servers that are more secure than HP's virtual Vaults OS!&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Sat, 14 Sep 2002 00:51:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806254#M754496</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-09-14T00:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Apache OpenSSL  - ALERT SECURITY ISSUE</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806255#M754497</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;The Slapper worm currently affects only Apache on Linux be it RedHat, Debian or Mandrake etc. running a vulnerable version of OpenSSL.&lt;BR /&gt;&lt;BR /&gt;You should be installing the latest apache 1.3.26 or the vendor's release of a patched apache below version 1.3.26. This is because unpatched versions of apache below 1.3.26 are subject to chunk encoding vulnerabilities.&lt;BR /&gt;&lt;BR /&gt;Unpatched OpenSSL 0.9.6d or below is vulnerable. The slapper worm exploits this vulnerability.&lt;BR /&gt;&lt;BR /&gt;It is likely that HP's release of Apache has the patched OpenSSL built in.&lt;BR /&gt;&lt;BR /&gt;Look at CERT CA-2002-23 and CA-2002-27 w.r.t. OpenSSL vulnerabilities. You can find them at &lt;A href="http://www.cert.org." target="_blank"&gt;http://www.cert.org.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You should get suspicious if you notice a lot of UDP/2002 (src port udp/2002, dst port udp/2002) traffic directed inbound or outbound through your firewalls because this is the communication channel used for commanding DDoS attacks.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Tue, 17 Sep 2002 04:47:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806255#M754497</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-09-17T04:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Apache OpenSSL  - ALERT SECURITY ISSUE</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806256#M754498</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;1) Apache Chunk Encoding Vulnerability (CA-2002-17)&lt;BR /&gt;- &lt;A href="http://www.cert.org/advisories/CA-2002-17.html" target="_blank"&gt;http://www.cert.org/advisories/CA-2002-17.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;2) OpenSSL Vulnerability (CA-2002-23 &amp;amp; CA-2002-27)&lt;BR /&gt;- &lt;A href="http://www.cert.org/advisories/CA-2002-23.html" target="_blank"&gt;http://www.cert.org/advisories/CA-2002-23.html&lt;/A&gt;&lt;BR /&gt;- &lt;A href="http://www.cert.org/advisories/CA-2002-27.html" target="_blank"&gt;http://www.cert.org/advisories/CA-2002-27.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Tue, 17 Sep 2002 04:53:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806256#M754498</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-09-17T04:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Apache OpenSSL  - ALERT SECURITY ISSUE</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806257#M754499</link>
      <description>OK Stupit Question here...&lt;BR /&gt;&lt;BR /&gt;How do I tell what release I am running of&lt;BR /&gt;&lt;BR /&gt;Apache&lt;BR /&gt;OpenSSL</description>
      <pubDate>Tue, 17 Sep 2002 14:16:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806257#M754499</guid>
      <dc:creator>Laurie_2</dc:creator>
      <dc:date>2002-09-17T14:16:42Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Apache OpenSSL  - ALERT SECURITY ISSUE</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806258#M754500</link>
      <description>The cert says:&lt;BR /&gt;A. Background&lt;BR /&gt;    The CERT Advisory CA-2002-23 regarding Multiple Vulnerabilities &lt;BR /&gt;    In OpenSSL, affects the following HP product numbers:&lt;BR /&gt;&lt;BR /&gt;    B9415AA Apache 1.3.x  HP-UX releases 11.00 and 11.11&lt;BR /&gt;    B9416AA Apache 2.x    HP-UX releases 11.00 and 11.11&lt;BR /&gt;    B9415AA Apache 1.3.x  HP-UX releases 11.20 and 11.22&lt;BR /&gt;    B9416AA Apache 2.x    HP-UX releases 11.20 and 11.22&lt;BR /&gt;    B9416BA Apache 2.x    IPv6 HP-UX release 11.11&lt;BR /&gt;&lt;BR /&gt;To verify whether this version is installed or not:&lt;BR /&gt;# swlist |grep -i apache&lt;BR /&gt;&lt;BR /&gt;The cert also says:&lt;BR /&gt;   The command to stop the HP Apache binary is:&lt;BR /&gt;       for 1.3.26:&lt;BR /&gt;            /opt/apache/bin/apachectl stop&lt;BR /&gt;       for 2.0.39:&lt;BR /&gt;            /opt/hpapache2/bin/apachectl stop&lt;BR /&gt;&lt;BR /&gt;So check for the existence of these binaries to determine your version also.&lt;BR /&gt;&lt;BR /&gt;B. Fixing the problem&lt;BR /&gt;The fixes for all versions are in the form of new product bundles, instead of patches.  To retrieve them, go to       &lt;A href="http://www.software.hp.com/ISS_products_list.html" target="_blank"&gt;www.software.hp.com/ISS_products_list.html&lt;/A&gt;&lt;BR /&gt;Install Apache versions 1.3.26.05 or 2.0.39.05. &lt;BR /&gt;&lt;BR /&gt;The cert also says:&lt;BR /&gt;"Installation of this new version of HP Apache over an existing HP Apache installation is supported, while installation over a non-HP Apache is NOT supported."&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Cheryl&lt;BR /&gt;</description>
      <pubDate>Tue, 17 Sep 2002 15:43:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806258#M754500</guid>
      <dc:creator>Cheryl Griffin</dc:creator>
      <dc:date>2002-09-17T15:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Apache OpenSSL  - ALERT SECURITY ISSUE</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806259#M754501</link>
      <description>HP provides automatic notification of Security Bulletins: Connect to the ITRC --&amp;gt; Maintenance &amp;amp; Support tab (at the left of screen) --&amp;gt; under Notifications --&amp;gt; Support &lt;BR /&gt;&lt;BR /&gt;Information Digests --&amp;gt; select the check box for Security Bulletins Digest.  To see archived security digests, scroll to the bottom of the page and follow the link.  &lt;BR /&gt;&lt;BR /&gt;If you subscribe by hitting a checkbox, be sure to hit the UPDATE Subscriptions button at the bottom of the page.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;*** security_patch_check&lt;BR /&gt;security_patch_check is a tool which can be used to download the latest data about security patches and compare it to the software installed on the system.  The tool reports which security patches are missing from a system based on the  It reports the "best" patch to install. Also, any recalled patches which are present on the system will be reported. It works through a firewall, with the help of a web-proxy or similar network device. &lt;BR /&gt;&lt;BR /&gt;security_patch_check tool is supported on 11.00, 11.04, 11i (11.11), and future releases of 11i. security_patch_check  is available for download from &lt;A href="http://software.hp.com/" target="_blank"&gt;http://software.hp.com/&lt;/A&gt; as of March 16, 2001.&lt;BR /&gt;&lt;BR /&gt;Cheryl</description>
      <pubDate>Tue, 17 Sep 2002 15:45:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806259#M754501</guid>
      <dc:creator>Cheryl Griffin</dc:creator>
      <dc:date>2002-09-17T15:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Apache OpenSSL  - ALERT SECURITY ISSUE</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806260#M754502</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;To tell the version of apache or ssl you are running, you can use either netcat or simply telnet:&lt;BR /&gt;&lt;BR /&gt;# telnet my_hp_web_server 80&lt;BR /&gt;HEAD / HTTP/1.0&lt;BR /&gt;&lt;BR /&gt;If your apache httpd.conf did not set ServerSignature to off and ServerTokens to Prod, you will see the version of apache and ssl displayed.&lt;BR /&gt;&lt;BR /&gt;If you want to mask this information off, set ServerSignature to off and ServerTokens to Prod. However, this does not stop the worm because the worm relies on detecting the string "apache" from the header before launching an intrusion attempt. You can't mask off the string "apache".&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Wed, 18 Sep 2002 08:31:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-apache-openssl-alert-security-issue/m-p/2806260#M754502</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-09-18T08:31:13Z</dc:date>
    </item>
  </channel>
</rss>

