<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security issue in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-issue/m-p/2590930#M884331</link>
    <description>Hi ,&lt;BR /&gt;I know about this security issue---&lt;BR /&gt;Lately, there is a security vulnerability in 'rlpdaemons' (remote printing&lt;BR /&gt;daemons) as follow:&lt;BR /&gt;&lt;BR /&gt;===================================================&lt;BR /&gt;HP-UX is shipped with a line printer daemon adapted from BSD UNIX.  &lt;BR /&gt;Many commercial and open-source operating systems are adapted from &lt;BR /&gt;BSD UNIX.  The HP line printer daemon is similar to "in.lpd" in other UNIX&lt;BR /&gt;variants. The Line Printer Daemon is used to allow heterogeneous UNIX&lt;BR /&gt;environments to share printers over a network. &lt;BR /&gt;&lt;BR /&gt;A buffer overflow exists in rlpdaemon that may allow remote attackers&lt;BR /&gt;to send a specially-crafted print request to crash the service, or execute&lt;BR /&gt;arbitrary code with superuser privilege on the target system.  The&lt;BR /&gt;vulnerability is particularly serious because rlpdaemon is installed&lt;BR /&gt;and configured by default and is active even if it is not being used.&lt;BR /&gt;No local account or knowledge of the configuration on the target system&lt;BR /&gt;is needed to successfully exploit this vulnerability.&lt;BR /&gt;&lt;BR /&gt;The following versions are known to be vulnerable:&lt;BR /&gt;&lt;BR /&gt;HP-UX 10.01, 10.10 &lt;BR /&gt;HP-UX 11.00, 11.11 &lt;BR /&gt;&lt;BR /&gt;Solution&lt;BR /&gt;&lt;BR /&gt;All administrators who have not implemented network printing should&lt;BR /&gt;immediately disable rlpdaemon, as well as any other unused services.&lt;BR /&gt;The following patches should be immediately applied to address the &lt;BR /&gt;vulnerability:&lt;BR /&gt;&lt;BR /&gt;10.01           PHCO_24697 &lt;BR /&gt;10.10           PHCO_24698 &lt;BR /&gt;10.20           PHCO_24699 &lt;BR /&gt;11.00           PHCO_24700 &lt;BR /&gt;11.11           PHCO_24701 &lt;BR /&gt;&lt;BR /&gt;This may not be reply of your question..still I wanted to share with you.&lt;BR /&gt;regards&lt;BR /&gt;Animesh&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 08 Oct 2001 04:50:57 GMT</pubDate>
    <dc:creator>Animesh Chakraborty</dc:creator>
    <dc:date>2001-10-08T04:50:57Z</dc:date>
    <item>
      <title>Security issue</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-issue/m-p/2590928#M884329</link>
      <description>Currently, we found that omniback having some weakness to let some hacks application to logon into my HP-UX server. We have proved that could someone having this kind of problem before ? If yes, what is the solution. I heard that need some omniback patches. What pathches ? Thanks in advance.</description>
      <pubDate>Mon, 08 Oct 2001 04:25:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-issue/m-p/2590928#M884329</guid>
      <dc:creator>Kenn Chen</dc:creator>
      <dc:date>2001-10-08T04:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: Security issue</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-issue/m-p/2590929#M884330</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I've not heard of any OmniBack related&lt;BR /&gt;security problems before.&lt;BR /&gt;Follow this link and sign up to receive&lt;BR /&gt;the HP security bulletins. You can also&lt;BR /&gt;look up some of the older bulletins that&lt;BR /&gt;would have been sent out.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://us-support.external.hp.com/digest/bin/doc.pl/sid=48d96b4d0bb6221da4/screen=digestSubscr" target="_blank"&gt;http://us-support.external.hp.com/digest/bin/doc.pl/sid=48d96b4d0bb6221da4/screen=digestSubscr&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;-Michael&lt;BR /&gt;&lt;BR /&gt;PS The OmniBack patch list I gave you before is&lt;BR /&gt;the patch list. If there happen to be any &lt;BR /&gt;security related patches that's where you&lt;BR /&gt;would find them.</description>
      <pubDate>Mon, 08 Oct 2001 04:46:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-issue/m-p/2590929#M884330</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2001-10-08T04:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Security issue</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-issue/m-p/2590930#M884331</link>
      <description>Hi ,&lt;BR /&gt;I know about this security issue---&lt;BR /&gt;Lately, there is a security vulnerability in 'rlpdaemons' (remote printing&lt;BR /&gt;daemons) as follow:&lt;BR /&gt;&lt;BR /&gt;===================================================&lt;BR /&gt;HP-UX is shipped with a line printer daemon adapted from BSD UNIX.  &lt;BR /&gt;Many commercial and open-source operating systems are adapted from &lt;BR /&gt;BSD UNIX.  The HP line printer daemon is similar to "in.lpd" in other UNIX&lt;BR /&gt;variants. The Line Printer Daemon is used to allow heterogeneous UNIX&lt;BR /&gt;environments to share printers over a network. &lt;BR /&gt;&lt;BR /&gt;A buffer overflow exists in rlpdaemon that may allow remote attackers&lt;BR /&gt;to send a specially-crafted print request to crash the service, or execute&lt;BR /&gt;arbitrary code with superuser privilege on the target system.  The&lt;BR /&gt;vulnerability is particularly serious because rlpdaemon is installed&lt;BR /&gt;and configured by default and is active even if it is not being used.&lt;BR /&gt;No local account or knowledge of the configuration on the target system&lt;BR /&gt;is needed to successfully exploit this vulnerability.&lt;BR /&gt;&lt;BR /&gt;The following versions are known to be vulnerable:&lt;BR /&gt;&lt;BR /&gt;HP-UX 10.01, 10.10 &lt;BR /&gt;HP-UX 11.00, 11.11 &lt;BR /&gt;&lt;BR /&gt;Solution&lt;BR /&gt;&lt;BR /&gt;All administrators who have not implemented network printing should&lt;BR /&gt;immediately disable rlpdaemon, as well as any other unused services.&lt;BR /&gt;The following patches should be immediately applied to address the &lt;BR /&gt;vulnerability:&lt;BR /&gt;&lt;BR /&gt;10.01           PHCO_24697 &lt;BR /&gt;10.10           PHCO_24698 &lt;BR /&gt;10.20           PHCO_24699 &lt;BR /&gt;11.00           PHCO_24700 &lt;BR /&gt;11.11           PHCO_24701 &lt;BR /&gt;&lt;BR /&gt;This may not be reply of your question..still I wanted to share with you.&lt;BR /&gt;regards&lt;BR /&gt;Animesh&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 08 Oct 2001 04:50:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-issue/m-p/2590930#M884331</guid>
      <dc:creator>Animesh Chakraborty</dc:creator>
      <dc:date>2001-10-08T04:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Security issue</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-issue/m-p/2590931#M884332</link>
      <description>And this is another reason I'm so frustrated with the patching scheme for HP-UX.  I went to the patch database and couldn't find the patches for this problem.   Where is it?&lt;BR /&gt;Why is so hard to find particular patches?  Why do you have to be a darn Rocket Scientist to figure out what patches to load?&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Nov 2001 15:29:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-issue/m-p/2590931#M884332</guid>
      <dc:creator>Dylan Fahey</dc:creator>
      <dc:date>2001-11-15T15:29:26Z</dc:date>
    </item>
  </channel>
</rss>

