Print | Rate this content

HPSBTU02232 SSRT071429 rev.1 - Secure Web Server for HP Tru64 UNIX Powered by Apache (SWS) or HP Internet Express for Tru64 UNIX running PHP, Remote Arbitrary Code Execution, Unauthorized Disclosure of Information, or Denial of Service (DoS)

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c01086137

Version: 1

HPSBTU02232 SSRT071429 rev.1 - Secure Web Server for HP Tru64 UNIX Powered by Apache (SWS) or HP Internet Express for Tru64 UNIX running PHP, Remote Arbitrary Code Execution, Unauthorized Disclosure of Information, or Denial of Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2007-06-25

Last Updated: 2007-06-25


Potential Security Impact: Remote Arbitrary Code Execution, Unauthorized Disclosure of Information, or Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY

Potential vulnerabilities have been reported on the PHP Hypertext Processing Engine provided with the Secure Web Server for HP Tru64 UNIX Powered by Apache (SWS) and HP Internet Express for Tru64 UNIX (IX). The vulnerabilities could be exploited by remote users to execute arbitrary code, read arbitrary files, or cause a Denial of Service (DoS).

References: CVE-2006-4625 CVE-2007-0988 CVE-2007-1286 CVE-2007-1380 CVE-2007-1700 CVE-2007-1701 CVE-2007-1710 CVE-2007-1835 CVE-2007-1884 CVE-2007-1885 CVE-2007-1886

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

The following supported software versions running running PHP Hypertext Processing Engine v 4.4.4 are affected:

HP Internet Express for Tru64 UNIX (IX) v 6.6 and earlier
Secure Web Server for HP Tru64 UNIX Powered by Apache (SWS) v 6.6.4 and earlier

BACKGROUND

For a PGP signed version of this security bulletin please write to: security-alert@hp.com

RESOLUTION

HP is providing PHP v 4.4.6 as part of Secure Web Server for HP Tru64 UNIX Powered by Apache (SWS) v 6.6.5, which resolves the potential vulnerabilities.

Until the update is available in the mainstream product release, HP is releasing the following two setld-based kits publicly for use by any customer.

The resolutions contained in the kits are targeted for availability in the following mainstream product release:

HP Internet Express for Tru64 UNIX v 6.7

The kits distribute the following:

Secure Web Server for HP Tru64 UNIX Powered by Apache (SWS) with PHP v 4.4.6 installable kit
Secure Web Server for HP Tru64 UNIX Powered by Apache (SWS) with PHP v 4.4.6 installable kit and source files

Secure Web Server for HP Tru64 UNIX v 6.6.5
PREREQUISITE: HP Tru64 UNIX v 5.1A or later
Name: sws_v6_6_5_kit.tar.gz
Location: http://h30097.www3.hp.com/internet/download.htm#sws
Secure Web Server for HP Tru64 UNIX v 6.6.5 including Source Files
PREREQUISITE: HP Tru64 UNIX v 5.1A or later
Name: sws_v6_6_5_src_kit.tar.gz
Location: http://h30097.www3.hp.com/internet/download.htm#sws

PRODUCT SPECIFIC INFORMATION

HISTORY

Version:1 (rev.1) - 25 June 2007 Initial release

Third Party Security Patches: Third party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

©Copyright 2007 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

Provide feedback

Please rate the information on this page to help us improve our content. Thank you!