From support@us.external.hp.com Wed Mar 13 00:50:48 1996 Date: Wed, 13 Mar 1996 00:59:48 -0800 From: HPSL Mail Service Reply to: support-feedback@us.external.hp.com To: Damien Sorder Subject: RE: send doc HPSBUX9602-030 -------- ## Regarding your request: Send Doc HPSBUX9602-030 The following are the results of your request from the HP SupportLine mail service. =============================================================================== Document Id: [HPSBUX9602-030] Date Loaded: [02-22-96] Description: Security Vulnerability DCE Sec. Service session key gen'rtn. =============================================================================== ------------------------------------------------------------------------- HEWLETT-PACKARD SECURITY BULLETIN: HPSBUX9602-030, 21 Feb 96 ------------------------------------------------------------------------- Hewlett-Packard recommends that the information in the following Security Bulletin should be acted upon as soon as possible. Hewlett- Packard will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ____________________________________________________________________ PROBLEM: A vulnerability in the way that the DCE Security Service generates session keys. PLATFORM: HP 9000/700 and 9000/800 systems running HP DCE/9000 and configured into DCE cells DAMAGE: The security of DCE services and DCE-based applications could be compromised. If integrated login is in use, host security could also be compromised. SOLUTION: Apply patch PHSS_6841 (HP-UX 9.x running HP DCE 1.2 or 1.2.1), or$ PHSS_6842 (HP-UX 9.x running HP DCE 1.4.2), or$ PHSS_6843 (HP-UX 10.01 running HP DCE 1.4), or$ PHSS_6844 (HP-UX 10.10 running HP DCE 1.4.1).$ to any hosts running a DCE Security Servers (secd), and then perform additional followup actions documented here. AVAILABILITY: All patches are available now. ____________________________________________________________________ I. Kerberos keygen A. Background DCE uses randomly-generated session keys as a part of the protocols it uses to authenticate and protect communication between various parties (such as hosts, users, and services). A weakness in the way the DCE Security Service generates keys could allow an attacker to compromise DCE security. Executing such an attack would require direct access to the network hosting a DCE cell. B. Fixing the problem A fix to the DCE Security Server (secd) eliminates this weakness. Cell administrators should obtain and install the fixed secd and then must also execute additional administrative procedures as documented below. C. Recommended Solution 1. Determine which patch is appropriate for your hardware platform and operating system: PHSS_6841 (HP-UX 9.x running HP DCE 1.2 or 1.2.1) PHSS_6842 (HP-UX 9.x running HP DCE 1.4.2) PHSS_6843 (HP-UX 10.01 running HP DCE 1.4) PHSS_6844 (HP-UX 10.10 running HP DCE 1.4.1) 2. Hewlett Packard's HP-UX patches are available via email and World Wide Web To obtain a copy of the HP SupportLine email service user's guide, send the following in the TEXT PORTION OF THE MESSAGE to support@us.external.hp.com (no Subject is required): send guide The users guide explains the process for downloading HP-UX patches via email and other services available. World Wide Web service for downloading of patches is available via our URL: (http://us.external.hp.com) 3. Apply the patch to your HP-UX system. Check for warnings or errors per the patch installation instructions. The logs are: /tmp/update.log (for 9.x) or /var/adm/sw/swinstall.log (for 10.x). This can be done as follows: a. At the shell prompt, type "tail -60 /tmp/update.log | more" on 9.x or "tail -60 /var/adm/sw/swinstall.log | more" on 10.x. b. Page through the next three screens via the space bar, looking for WARNING or ERROR messages. 4. After installing the patch, execute the following additional administrative procedures: All the keys in all keytabs need to be changed. For every machine in the cell: 1) Log in as root 2) Start 'rgy_edit' 3) Do a 'rgy_edit> ktlist' 4) For every unique principal listed, do the following rgy_edit> kta -p -r -a 5) Exit rgy_edit D. Impact of the patch and workaround The patches described above provide a new version of secd that fixes the vulnerability of subsequently-generated keys. After installation of the patch, the administrative procedures described above must be executed to replace existing keys that may be vulnerable. No patches will be available for versions of DCE/9000 prior to 1.2. To protect those affected systems, we recommend upgrading to a currently supported release of HP DCE. E. To subscribe to automatically receive future NEW HP Security Bulletins from the HP SupportLine mail service via electronic mail, send an email message to: support@us.external.hp.com (no Subject is required) Multiple instructions are allowed in the TEXT PORTION OF THE MESSAGE, here are some basic instructions you may want to use: To add your name to the subscription list for new security bulletins, send the following in the TEXT PORTION OF THE MESSAGE: subscribe security_info To retrieve the index of all HP Security Bulletins issued to date, send the following in the TEXT PORTION OF THE MESSAGE: send security_info_list To get a patch matrix of current HP-UX and BLS security patches referenced by either Security Bulletin or Platform/OS, put the following in the text portion of your message: send hp-ux_patch_matrix World Wide Web service for browsing of bulletins is available via our URL: (http://us.external.hp.com) Choose "Support news", then under Support news, choose "Security Bulletins" F. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- of 'get key' (no quotes) to security-alert@hp.com. ________________________________________________________________________$