HP-UX Running Software Distributor (SD) Remote Unauthorized Access (HPSBUX02089)

Original Release Date: January 10, 2006
Last Revised: February 17, 2006
Number: ASA-2006-005
Risk Level: Medium
Advisory Version: 2.0
Advisory Status: Final

1. Overview:

A new security and support alert from Hewlitt-Packard has been issued regarding Software Distributor (SD) and is described as follows.

HPSBUX02089 SSRT5983 rev.1 - HP-UX Running Software Distributor (SD) Remote Unauthorized Access
IMPACT: The vulnerability could be exploited by a remote user to gain unauthorized access.
SUMMARY: A potential vulnerability has been identified with HP-UX running Software Distributor (SD) programs.
AFFECTED SOFTWARE:This vulnerability affects only HP-UX B.11.11.
URL: http://www1.itrc.hp.com/service/cki/docDisplay.do?admit=-682735245+1136955847754+28353475&docId=c00583199.

Certain versions of the Avaya™ Predictive Dialer System (PDS) are affected by this vulnerability. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-4451 to this issue.

2. Avaya System Products using HP-UX Software Distributor on version B.11.11:

Product: Affected S/w Version(s): Actions:
Predictive Dialer System (PDS) PDS v12, APC 3.0 Avaya recommends that customers follow the recommended actions supplied by HP and install patch B.11.11 - PHCO_33822 or subsequent

3.Additional Information:

Additional information may also be available via the Avaya support website and through your Avaya account representative. Please contact your Avaya product support representative, or dial 1-800-242-2121, with any questions.

4. Disclaimer:

ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.

5. Revision History:

V 1.0 - January 10, 2006 - Initial Statement issued.
V 2.0 - February 17, 2006 - Minor Formatting Changes made.

Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or securityalerts@avaya.com.

© 2006 Avaya Inc. All Rights Reserved. All trademarks identified by the ® or ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.