TITLE: SSRT2301 - HP Tru64 UNIX uudecode Potential Security Vulnerability New Kit Date: 25-NOV-2002 Modification Date: Not Applicable Modification Type: NEW KIT Copyright (c) Hewlett-Packard Company 2002. All rights reserved. PRODUCT: Tru64 UNIX [R] 4.0F SOURCE: Hewlett-Packard Company ECO INFORMATION: ECO Name: DUV40FB18-C0082402-16085-ES-20021115 ECO Kit Approximate Size: 1.9MB Kit Applies To: Tru64 UNIX 4.0F PK7 (BL18) ECO Kit CHECKSUMS: /usr/bin/sum results: 11055 1880 /usr/bin/cksum results: 106529197 1925120 MD5 results: 323949270fe6e731b7ddf68832a88ad4 SHA1 results: c224f5dc2481018104ad946698ae94efd3d9580b ECO KIT SUMMARY: A dupatch-based, Early Release Patch kit exists for Tru64 UNIX 4.0F that contains solutions to the following problem(s): A potential security vulnerability has been discovered in the HP Tru64 UNIX operating system, where under certain circumstances, system integrity may be compromised through improper file access (overwriting of files). This potential vulnerability is in the form of a local security domain risk. The following potential security vulnerability has been corrected: o SSRT2301 uudecode (Severity - Medium) The Patch Kit Installation Instructions and the Patch Summary and Release Notes documents provide patch kit installation and removal instructions and a summary of each patch. Please read these documents prior to installing patches on your system. The patch in this kit will also be available in Tru64 UNIX 4.0F Patch Kit 8. INSTALLATION NOTES: 1) Install this kit with the dupatch utility that is included in the patch kit. You may need to baseline your system if you have manually changed system files on your system. The dupatch utility provides the baselining capability. 2) The patch in this ERP kit does not have any file intersections with any other ERP available at this time for this product version. 3) This ERP kit will NOT install over any Customer Specific Patches (CSPs) which have file intersections with this ERP kit. Contact your normal Service Provider for assistance if the installation of this ERP kit is blocked by any of your installed CSPs. INSTALLATION PREREQUISITES: You must have installed Tru64 UNIX 4.0F PK7 (BL18) prior to installing this Early Release Patch Kit. KNOWN PROBLEMS WITH THE PATCH KIT: None. RELEASE NOTES FOR DUV40FB18-C0082402-16085-ES-20021115: 1 Release Notes This Early Release Patch Kit Distribution contains: - fixes that resolve the problem(s) reported in: o 94472 SSRT2301 * for Digital UNIX V4.0F DUV40FB18AS0007-20020102.tar (BL18) The patches in this kit are being released early for general customer use. Refer to the Release Notes for a summary of each patch and installation prerequisites. Patches in this kit are installed by running dupatch from the directory in which the kit was untarred. For example, as root on the target system: > mkdir -p /tmp/CSPkit1 > cd /tmp/CSPkit1 > > tar -xpvf DUV40D13-C0044900-1285-20000328.tar > cd patch_kit > ./dupatch 2 Special Instructions There are no special instructions for Digital UNIX V4.0F Patch C824.02 3 Summary of CSPatches contained in this kit Digital UNIX V4.0F PatchId Summary Of Fix ---------------------------------------- C824.02 Fix for SSRT2301, uudecode 4 Additional information from Engineering None 5 Affected system files This patch delivers the following files: Digital UNIX V4.0F Patch C824.02 ./usr/bin/uudecode CHECKSUM: 25053 552 SUBSET: OSFBASE440 [R] UNIX is a registered trademark in the United States and other countries licensed exclusively through X/Open Company Limited. Copyright Hewlett-Packard Company 2002. All Rights reserved. This software is proprietary to and embodies the confidential technology of Hewlett-Packard Company. Possession, use, or copying of this software and media is authorized only pursuant to a valid written license from Hewlett-Packard or an authorized sublicensor. This ECO has not been through an exhaustive field test process. Due to the experimental stage of this ECO/workaround, Hewlett-Packard makes no representations regarding its use or performance. The customer shall have the sole responsibility for adequate protection and back-up data used in conjunction with this ECO/workaround.