[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: [security bulletin] HPESBHF03785 rev.1 - HPE B-Series SAN Network Advisor Software, Multiple Remote
From: HPE Product Security Response Team <security-alert () hpe ! com>
Date: 2017-10-30 14:32:09
Message-ID: d85692be08dc4ab486701cdad13cdc61 () G9W8669 ! americas ! hpqcorp ! net
[Download RAW message or body]
-----Original Message-----
From: security-alert@hpe.com [mailto:security-alert@hpe.com]
Sent: Tuesday, October 17, 2017 3:27 PM
Subject: [security bulletin] HPESBHF03785 rev.1 - HPE B-Series SAN Network Advisor \
Software, Multiple Remote Vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03785en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03785en_us
Version: 1
HPESBHF03785 rev.1 - HPE B-Series SAN Network Advisor Software, Multiple Remote \
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as \
possible.
Release Date: 2017-10-17
Last Updated: 2017-10-17
Potential Security Impact: Remote: Multiple Vulnerabilities
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
HPE B-Series SAN Network Advisor Software versions released prior to and including \
v14.0.2 contain several remotely exploitable Directory Traversal Vulnerabilities:
* A FileReceiveServlet vulnerability could allow remote attackers to upload \
malicious file in a section of the file system where it can be \
executed.
* A DashboardFileReceiveServlet vulnerability could allow remote attackers to upload \
malicious file in a section of the file system where it can be \
executed.
* A SoftwareImageUpload vulnerability could allow remote attackers to write to \
arbitrary files, and consequently delete the files.
* A CliMonitorReportServlet vulnerability could allow remote attackers to read \
arbitrary files including files with sensitive user information.
References:
- CVE-2016-8204 - Brocade Network Advisor
- CVE-2016-8205 - Brocade Network Advisor
- CVE-2016-8206 - Brocade Network Advisor
- CVE-2016-8207 - Brocade Network Advisor
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP B-series SAN Network Advisor Software 14.0.2 and prior
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2016-8204
10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2016-8205
10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2016-8206
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)
CVE-2016-8207
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided an update to HPE B-Series SAN Network Advisor Software to address \
the vulnerabilities.
* HPE B-Series SAN Network Advisor 14.0.3 and later
* HPE B-Series SAN Network Advisor 14.1.1 and later
HISTORY
Version:1 (rev.1) - 17 October 2017 Initial release
Third Party Security Patches: Third party security patches that are to be installed \
on systems running Hewlett Packard Enterprise (HPE) software products should be \
applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, \
contact normal HPE Services support channel. For other issues about the content of \
this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts \
via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is \
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title \
by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or \
omissions contained herein. The information provided is provided "as is" without \
warranty of any kind. To the extent permitted by law, neither HP or its affiliates, \
subcontractors or suppliers will be liable for incidental,special or consequential \
damages including downtime cost; lost profits; damages relating to the procurement of \
substitute products or services; or damages for loss of data, or software \
restoration. The information in this document is subject to change without notice. \
Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products \
referenced herein are trademarks of Hewlett Packard Enterprise in the United States \
and other countries. Other product and company names mentioned herein may be \
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBCAAGBQJZ5lZqAAoJELXhAxt7SZaiPPEH/2b/7mvqRQem/R0aZq2Zn/Zt
mhJTuprIXO9ppCPGR9BODUY6uFdHdsvpH4F/AJDn4Vx0PhYZN34+rh3BPsiZb4Jk
ApgipEUlkX1VJhOO/Kd6I4NMKOYHkuADRJcvfeWCxocdwCUWay/N0ssXtEZCauNW
Bakx7WMsKS3ro011d4+DIYRvNl2BDlxNLJ9gFyHtwf73SI6oJrzG+tGBzlBAHxIi
VW6Lwmgr5reTq0/DweIkDEXNuKy7F6Tyo9myI6j2/3b/Osr2Nqb4FksPj2c/Mj5y
jMeamd9x/8YV7u7+/o7eS9hj7sBBo+L5fRUxoFi9PwfhoP+TUkm+dtAp4AkoKpQ=
=Gpoc
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic