- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Patch needed
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-01-2008 03:27 AM
тАО08-01-2008 03:27 AM
There is a report that there is a big security issue whit DSN does somebody knows if hp has a patch?
more info:
Technical Cyber Security Alert TA08-190B
Multiple DNS implementations vulnerable to cache poisoning
Original release date: July 08, 2008
Last revised: --
Source: US-CERT
Systems Affected
Systems implementing:
* Caching DNS resolvers
* DNS stub resolvers
Affected systems include both client and server systems, and any other
networked systems that include this functionality.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-01-2008 03:51 AM
тАО08-01-2008 03:51 AM
Re: Patch needed
http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01506861-2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-03-2008 11:53 PM
тАО08-03-2008 11:53 PM
Re: Patch needed
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-04-2008 12:45 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-04-2008 08:41 AM
тАО08-04-2008 08:41 AM
Re: Patch needed
I was talking about
http://www.isc.org/index.pl?/sw/bind/bind-security.php
reading this is a system what has /usr/sbin/rpcbind running vulable??
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-04-2008 08:13 PM
тАО08-04-2008 08:13 PM
Re: Patch needed
Are you asking if this bind problem effects rpcbind?
I would think they are completely different.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-04-2008 11:37 PM
тАО08-04-2008 11:37 PM
Re: Patch needed
We will patch all the dns servers.
And we advice everybody to do the same
to quote IBM:
So we've moved from "the bad guys are out there" past "the invaders are at the gate" and on to "the bad guys are slipping inside". If your organization has not yet patched your DNS servers
Other qoute of IBM:
IBM has anounced specific patch releases as per 20 august 2008. These patches must be applied immidiatly as the exploit is already known to "certain" communities.
The possistion of the DNS-environment in the landscape is not relevant for this exploit.
Luckly HP has the patch avalable!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-06-2008 09:19 AM
тАО08-06-2008 09:19 AM
Re: Patch needed
# swa report -a SEC -r issue
To see all exposures. Use the HTML report created as ~/.swa/report/swa_report.html to have direct links to the bulletin text itself.
In the action report all required patches will be listed, and non-patch actions such as product updates and removals will be listed in the manual actions section.
The patch-specific content can be downloaded using the command:
# swa get -t /depots/mySecPatchDepot