Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: HP/UX :: ciace023.txt

HP-UX HP9000 Vue 3.0

                          The U.S. Department of Energy
                       Computer Incident Advisory Capability
                              ___  __ __    _     ___
                             /       |     /_\   /   
                             \___  __|__  /   \  \___

			     Information Bulletin

		Vulnerability in HP-UX systems with HP Vue 3.0

May 18, 1994 1615 PDT                                              Number E-23b

PROBLEM:      A Vulnerability exists in HP-UX systems with HP Vue 3.0.
PLATFORM:     HP 9000 series 300/400/700/800 at HP-UX revision 9.x, with HP 
	      Vue 3.0.
DAMAGE:       Local users can raise their privileges to superuser (root) level. 
SOLUTION:     Apply appropriate patch for your system.

VULNERABILITY CIAC recommends that all systems which have HP Vue 3.0 on their
ASSESSMENT:   systems, whether in use or not, should install this patch.  

   Critical Information about vulnerability in HP-UX systems with HP Vue 3.0

CIAC has received information regarding a vulnerability in HP9000 computers at
revision 9.x which contain HP Vue 3.0.  This vulnerability can allow a local
user to obtain root access.

CIAC recommends that if you have Vue 3.0 on your system you apply the following
patch appropriate to your system.  For an HP 9000 series 300/400 computer,
apply patch PHSS_4055; for an HP 9000 series 700/800 computer, apply patch

Patches can be obtained in one of three methods:

1. Obtain the patch via E-mail from the HP SupportLine Mail Service. Send the
words, without quotes, "send PHSS_4055" (or "send PHSS_4066") in the TEXT
PORTION of a message addressed to (no subject
line is required).  The patch will be E-mailed back to you.

2. Download the patch from  To do this, follow the
instructions in the document located on

3. Contact your local HP Response Center. They will provide you with the patch.

The complete instructions for applying the patch are in the file
PHSS_40xx.text, supplied with the patch release.  Checksums for the patch are
included with the release.  After installing the patch, examine /tmp/update.log
for any relevant WARNING's or ERROR's.  To accomplish this, from the shell
prompt type "tail -60 /tmp/update.log | more" and page through the screens via
the space bar, looking for WARNING or ERROR messages.

ATTENTION: This bulletin contains updated information received from
Hewlett-Packard after the electronic version was distributed.  Patch PHSS_4066
supersedes PHSS_4038, and directions to download the patch have been included.

CIAC would like to thank the CERT-NL for first alerting us to the existance of
this vulnerability and for technical information about this vulnerability, and
John Morris of Hewlett-Packard for patch information and availability.

For additional information or assistance, please contact CIAC:
    Voice:   510-422-8193
    FAX:     510-423-8002
    STU-III: 510-423-2604

CIAC has several self-subscribing mailing lists for electronic publications:

1.  CIAC-BULLETIN for Advisories, highest priority - time critical information
    and Bulletins, important computer security information; 
2.  CIAC-NOTES for Notes, a collection of computer security articles; 
3.  SPI-ANNOUNCE for official news about Security Profile Inspector (SPI)
    software updates, new features, distribution and availability; 
4.  SPI-NOTES, an unmoderated forum for discussion of problems and solutions
    regarding the use of SPI products.  

Our mailing lists are managed by a public domain software package called
ListProcessor, which ignores E-mail header subject lines.  To subscribe (add
yourself) to one of our mailing lists, send the following request as the
E-mail message body, substituting CIAC-BULLETIN, CIAC-NOTES, SPI-ANNOUNCE or
SPI-NOTES for "list-name" and valid information for "LastName" "FirstName" and
"PhoneNumber" when sending

E-mail to
           subscribe  list-name  LastName, FirstName  PhoneNumber
     e.g.: subscribe ciac-notes O'Hara, Scarlett 404-555-1212 x36

You will receive an acknowledgment containing address, initial PIN, and
information on how to change either of them, cancel your subscription, or get

PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins.  If you are not part of these communities, please
contact your agency's response team to report incidents.  Your agency's team
will coordinate with CIAC.  The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization.  A list of FIRST member organizations
and their constituencies can be obtained by sending E-mail to with an empty subject line and a message body
containing the line: send first-contacts.

This document was prepared as an account of work sponsored by an agency of the
United States Government.  Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for the
accuracy, completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately owned
rights.  Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring by
the United States Government or the University of California.  The views and
opinions of authors expressed herein do not necessarily state or reflect those
of the United States Government nor the University of California, and shall not
be used for advertising or product endorsement purposes.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH