Network Security
January 7999
The input access list must block traffic destined for UDP port 514 at any of the Cisco IOS device’s own IP addresses, ...
The input access list must block traffic destined for UDP port 514 at any of the Cisco IOS device’s own IP addresses, as well as at any broadcast or multicast addresses on which the Cisco IOS device may be listening. It’s important to remember to block old-style ‘all zeroes’ broadcasts as well as new-style ‘all-ones’ broadcasts. It is not necessary to block traffic being forwarded to other hosts; only traffic actually addressed to the Cisco IOS device is of interest. There is no single input access list that will work in all configurations. It is very important that you understand the effect of your access list in your specific configuration before you activate the list. Cisco is offering free software correct this updates to vulnerability for all vulnerable customers, regardless of contract However, because status. this about information has been vulnerability disseminated by third parties, Cisco has been forced to release this advisory before updates are available for all software versions, For further information, contact
C/AC on: + I 925 422 8 193; E-mail: caic@//n/.gov.
management server. This problem is not an OpenView-specific problem, but OpenView can be affected when communicating with systems that have an affected agent. The HP OpenView Emanate SNMP Agent has two revisions currently supported, release 2.X and 14.X. HP recommends upgrading to the 14.X release and applying the patch to circumvent this vulnerability.
then be necessary. This means that if a system administrator deinstalls one of the earlier patches after installing the security patch, they will overwrite the security fixes with older software.
The defect is now fixed, such that an unauthorized user cannot use this mechanism. It is advisable to install the appropriate patch:
Security vulnerability in sendmail
Emanate 14.2 version on HP-UX revision 11 ,OO: PHSS_16846 Emanate 14.2 version on HP-UX revision 10.20: PHSS_16845 Emanate 14.2 version on VVOS revision 10.24: PHSS_17083 Emanate 14.0 version on HP-UX revision 10.0X, 10.10: PHSS_16800 Emanate 14.0 version on HP-UX revision 9.X: PHSS_16799 Solaris 2.3 and 2.4 OpenView Emanate 14.0 agent:
Hewlett-Packard Security Bulletin #00089 reveals that some important features provided by Sendmail 8.8.6 includes a new group of rulesets to avoid mail ‘spamming’ and to prevent mail ‘spammers’ from using your host as a mail relay point, Sendmail 8.8.6 provides four new named rulesets which can be used to check and reject abusive mail messages. Patches are available from the Electronic Support Center (ESC) patch hub for HP-UX 10.20, 10.30 and 11 .O. For the following HP-UX releases an official patch is available: HP-UX release 10.20: PHNE_12836
HP- UX vulnerabilities CIAC Advisory J-022 reports on a problem where an SNMP community string in HP OpenView allows access to certain SNMP variables. This may reduce manageability of affected HP-UX systems. An SNMP community string exists in HP OpenView SNMP agent implementations allowing access to certain SNMP variables. This may result in limited manageability of affected HP-UX systems. The system remains operational but will be unable to respond to some queries from a
http://ovweb.externaI.hp.com: 80/cpe/patches/emanate/l4.x/ sparc_2.X.html Installing any earlier HP OV Emanate patch, or reinstalling HP OpenView Network Node Manager (NNM) will reverse the protective effect of the patches listed above. Reinstallation of the above referenced patch will
Sun Solaris dtmail, passwd vulnerabilities Sun Microsystems Security Bulletin #00181 reveals a problem with buffer overflows. The dtmail program is the mail