|
March
2001
|
|
|
|
HP
identified security breaches on the 3000
For a computer
with a mature, proprietary operating system, the HP 3000 has been
flagged for a glut of security holes in the last few weeks. Some
observers thought the alarm about one regarding AIFs was a matter of
HP security experts discovering the 3000. First, HP
identified a hole in the Java Runtime Environment on the 3000. Sun
passed along that warning, saying it poses a possible security risk
by allowing a trusted class to call into a disallowed class under
certain circumstances. To close this breach, customers must install
the 1.2.2 MPE Version A.22.04 or higher release of Java; anything
older has the hole in it. The problem applies to the MPE/iX releases
certified for Java on the 3000, 6.0, 6.5 and the just-released
7.0. The next breach reaches back even further, to MPE/iX 5.5 systems and others more recent. HP learned that Native Mode Debug does not handle breakpoints correctly, and so users fooling with it can obtain unauthorized privileges. HPs got patches to solve this problem: MPELX89D for MPE/iX 5.5; MPELX89E for MPE/iX 6.0, and MPELX89F for MPE/iX 6.5. The 7.0 release isnt affected. Another problem with linkeditor on 5.5, 6.0 and 6.5 can also allow normal users of the program to gain certain capabilities that are allowed for the system manager. Again, theres patches to close this hole: MPE/iX 6.5 gets LNKLXG1A, MPE/iX 6.0 users should install LNKLXG1B, and MPE/iX 5.5 users can install LNKLXG1C. HPs window on 5.5 patches is only open for three more months, so order soon. As if those three
security warnings were not enough, HP issued a fourth warning
regarding an Architected Interfaces Facility (AIF). These programming
aids have been used by third party vendors and HP for years, and the
AIFCHANGELOGON facility can give users unauthorized access to
databases, let them gain additional privileges and compromise system
availability. Once more, there are patches in play: For MPE/iX 6.5,
install MPELXJ3C, for MPE/iX 6.0, install MPELXJ3B, and for MPE/iX
5.5, install MPELXJ3A. Allegro Consultants Gavin Scott notes
that AIFCHANGELOGON is a privileged routine, so Im fuzzy
on why this is a big deal. Assuming I can call AIFCHANGELOGON, I can
think of lots of ways it could be used to override one or another
common security mechanism but I would think that any
privileged program that is using AIFCHANGELOGON should be required to
know what its doing. If someone writes a program that lets
anyone AIFCHANGELOGON at will, then they shouldnt be too
surprised at the result. Copyright The 3000 NewsWire. All rights reserved |