-----BEGIN PGP SIGNED MESSAGE----- __________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN HP-UX Netscape Servers Vulnerability August 6, 1998 15:00 GMT Number I-082 ______________________________________________________________________________ PROBLEM: A vulnerability has been identified that affects the use of RSA Data Security encryption algorithms with Netscape server products that support Secure Sockets Layer (SSL). PLATFORM: HP9000 Series 7/800 running HP-UX releases 10.X and 11.00. DAMAGE: If exploited, this vulnerability could potentially be used to discover the key for a particular encrypted session through a process of repeatedly sending approximately one million carefully constructed messages to a target server and observing the server's response. SOLUTION: Apply available patches. ______________________________________________________________________________ VULNERABILITY Hewlett-Packard recommends that the information in this ASSESSMENT: advisory should be acted upon as soon as possible. ______________________________________________________________________________ [ Start Hewlett-Packard Advisories ] Document ID: HPSBUX9807-080 Date Loaded: 19980728 Title: Security Advisory with Netscape servers on HP-UX - ------------------------------------------------------------------------- HEWLETT-PACKARD SECURITY ADVISORY: #00080, 29 July 1998 - ------------------------------------------------------------------------- The information in the following Security Advisory should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Advisory as soon as possible. - ------------------------------------------------------------------------- PROBLEM: The Million Question vulnerability affects the use of RSA Data Security encryption algorithms with Netscape server products that support Secure Sockets Layer (SSL). The nature of the vulnerability is that a single encrypted SSL network conversation could be recorded and subsequently decrypted. PLATFORM: HP9000 Series 7/800 running HP-UX releases 10.X and 11.00 DAMAGE: A cryptanalytic vulnerability could potentially be used to discover the key for a particular encrypted session through a process of repeatedly sending approximately one million carefully constructed messages to a target server and observing the server's response. SOLUTION: Patches for can be downloaded from Netscape directly. See below for the URL. AVAILABILITY: All patches for 3.X servers are available now. Older versions will be available soon. For updated information on availability please check: http://help.netscape.com/products/server/ssldiscovery/index.html - ------------------------------------------------------------------------- I. A. Background According to RSA Data Security, Inc., this potential attack against secure Web communications is currently the subject of research and has not been reported by any users. CERT has made a technical advisory on this vulnerability available at http://www.cert.org/ B. Fixing the problem The following servers and products are affected. Servers impacted: FastTrack, Enterprise and Proxy. Patches are available for those three Servers. Messaging and Collabora. Product replacements are available for these two Servers. C. Recommended solution The URL is: http://help.netscape.com/products/server/ssldiscovery/index.html A README file is included with each package and has detailed instructions for installing the patch, for Enterprise and Proxy Server customer. Please ensure you download the correct version. There is an international version (for customer outside US) as well as a domestic version (for customer within US and Canada). Netscape believes deployments with higher vulnerability are: FastTrack/Enterprise Server applications using SSL to protect communication of sensitive data over the Internet, Proxy servers in secure reverse proxy mode protecting sensitive communications, Messaging and Collabra Servers run exclusively in SSL mode over an unprotected network. HP recommends that products deployed in the above situations be updated as soon as is practical. D. To subscribe to automatically receive future NEW HP Security Bulletins from the HP Electronic Support Center via electronic mail, do the following: Use your browser to get to the HP Electronic Support Center page at: http://us-support.external.hp.com (for US, Canada, Asia-Pacific, & Latin-America) http://europe-support.external.hp.com (for Europe) Login with your user ID and password (or register for one). Remember to save the User ID assigned to you, and your password. Once you are in the Main Menu: To -subscribe- to future HP Security Bulletins, click on "Support Information Digests". To -review- bulletins already released from the main Menu, click on the "Technical Knowledge Database (Security Bulletins only)". Near the bottom of the next page, click on "Browse the HP Security Bulletin Archive". Once in the archive there is another link to our current Security Patch Matrix. Updated daily, this matrix is categorizes security patches by platform/OS release, and by bulletin topic. E. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Netscape, Messaging, Collabora, FastTrack/Enterprise Server and Netscape Server are trademarks of Netscape Communications Corp. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. ______________________________________________________________________ - -----End of Document ID: HPSBUX9807-080-------------------------------------- [ End Hewlett-Packard Advisories ] ______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Hewlett-Packard for the information contained in this bulletin. ______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@llnl.gov For emergencies and off-hour assistance, DOE, DOE contractor sites, and the NIH may contact CIAC 24-hours a day. During off hours (5PM - 8AM PST), call the CIAC voice number 925-422-8193 and leave a message, or call 800-759-7243 (800-SKY-PAGE) to send a Sky Page. CIAC has two Sky Page PIN numbers, the primary PIN number, 8550070, is for the CIAC duty person, and the secondary PIN number, 8550074 is for the CIAC Project Leader. Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ (or http://ciac.llnl.gov -- they're the same machine) Anonymous FTP: ftp.ciac.org (or ciac.llnl.gov -- they're the same machine) Modem access: +1 (925) 423-4753 (28.8K baud) +1 (925) 423-3331 (28.8K baud) CIAC has several self-subscribing mailing lists for electronic publications: 1. CIAC-BULLETIN for Advisories, highest priority - time critical information and Bulletins, important computer security information; 2. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI) software updates, new features, distribution and availability; 3. SPI-NOTES, for discussion of problems and solutions regarding the use of SPI products. Our mailing lists are managed by a public domain software package called Majordomo, which ignores E-mail header subject lines. To subscribe (add yourself) to one of our mailing lists, send the following request as the E-mail message body, substituting ciac-bulletin, spi-announce OR spi-notes for list-name: E-mail to ciac-listproc@llnl.gov or majordomo@tholia.llnl.gov: subscribe list-name e.g., subscribe ciac-bulletin You will receive an acknowledgment email immediately with a confirmation that you will need to mail back to the addresses above, as per the instructions in the email. This is a partial protection to make sure you are really the one who asked to be signed up for the list in question. If you include the word 'help' in the body of an email to the above address, it will also send back an information file on how to subscribe/unsubscribe, get past issues of CIAC bulletins via email, etc. PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) I-072: SunOS Solaris Vulnerabilities (libnsl, SUNWadmap) I-073: multiscan ('mscan') Tool I-074: Buffer Overflow in Some Implementations of IMAP Servers I-075: Microsoft Office 98 Security Vulnerability I-076: SGI IRIX ioconfig(1M) and disk_bandwidth(1M) Vulnerability I-077: Mime Name Vulnerability in Outlook and Messenger I-078: HP-UX ftp Security Vulnerability I-079: IBM AIX "sdrd" daemon Vulnerability I-080: Microsoft Exchange Denial of Service Attacks I-081: HP UX & MPEix Predictive Vulnerability -----BEGIN PGP SIGNATURE----- Version: 4.0 Business Edition iQCVAwUBNcorebnzJzdsy3QZAQFlQgQAjLqp69oT4TqrY90HdFUiXnYts8MCBaVv a7rFPLh7xjQgrJh57WiTuNQ0IZGsOmNWu1PVe2aCn39rlQfpJAQ1YNu0eOR7ca9/ xKjXyP7YKJmemGuTeL/CTU2O8/TWQTeSUkV4R5VSz7IwdDLAzIMZqV8ze67fc9IE U2z1L+Yd440= =9Vnr -----END PGP SIGNATURE-----