Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Server/CGI)  >   Sun ONE/iPlanet Web Server Vendors:   Netscape, Sun
(HP Issues Patch for Virtual Vault) Re: iPlanet Web Server Allows Remote Users to Execute Arbitrary Code on the Server and to Crash the Server
SecurityTracker Alert ID:  1001729
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jun 12 2001
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): v4.1 SP 3-7
Description:   iPlanet announced that there is a vulnerability in the iPlanet Web Server that allows a remote user to crash the web services. The vulnerability also allows a remote user to gain shell access on the server (note that iPlanet did not mention this latter impact in their advisory).

It is reported that two vulnerabilities have been identified within iPlanet Web Server(iWS).

In the first vulnerability, a remote user can send manipulated HTTP request headers to iPlanet Web Server, Enterprise Edition version 4.1 Service Packs 3 through 7 (iWS4.1sp3-7), to cause a denial of service condition. This applies only to iWS4.1sp3-7 on the Microsoft Windows NT platform (but the vendor still recommends that all customers upgrade, regardless of the platform).

In the second vulnerability , a remote user can send manipulated HTTP request headers to an iPlanet Web Server or Netscape Enterprise Server (NES) that has the Web Publisher feature enabled to cause a denial of service condition. A remote user can also obtain shell access via this vulnerability.

Impact:   A remote user can cause the web server application to crash. In the Web Publisher vulnerability, a remote user can obtain shell access on the server.
Solution:   HP has released patch PHSS_24108 for the HP-UX 11.04 Virtual Vault (VVOS) release. (The iPlanet Web Server is included in Virtual Vault.)
Vendor URL: (Links to External Site)
Cause:   Boundary error, Input validation error
Underlying OS:  UNIX (HP/UX)

Message History:   This archive entry is a follow-up to the message listed below.
May 15 2001 iPlanet Web Server Allows Remote Users to Execute Arbitrary Code on the Server and to Crash the Server

 Source Message Contents

Subject:  security bulletins digest

                        HP Support Information Digests

o  IT Resource Center World Wide Web Service

   If you subscribed through the IT Resource Center and would
   like to be REMOVED from this mailing list, access the
   IT Resource Center on the World Wide Web at:

   Login using your IT Resource Center User ID and Password.
   Then select Support Information Digests (located under
   Maintenance and Support).  You may then unsubscribe from the
   appropriate digest.

Digest Name:  daily security bulletins digest
    Created:  Tue Jun 12  3:00:02 PDT 2001

Table of Contents:

Document ID      Title
---------------  -----------
HPSBUX0106-152   Security Vul. in Virtualvault 4.0 w/ iPlanet WS

The documents are listed below.

Document ID:  HPSBUX0106-152
Date Loaded:  20010611
      Title:  Security Vul. in Virtualvault 4.0 w/ iPlanet WS


The information in the following Security Bulletin should be acted upon
as soon as possible.  Hewlett-Packard Company will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Bulletin as soon as possible.

ISSUE:  The iPlanet Web Server included in Virtualvault 4.0 product
        contains a vulnerability.

PLATFORM: HP9000 S700/800 running HP-UX 11.04 (VVOS), Virtualvault

DAMAGE:   Potential data corruption event.

SOLUTION: Install patch PHSS_24108 for the HP-UX 11.04 release.

AVAILABILITY: The patch is available now.

I.   Background
     iPlanet has identified a vulnerability in the iPlanet Web Server,
     Enterprise Edition 4.X product. This problem does not affect any
     releases of the product prior to the 4.X versions. iWS 4.X is
     embedded in the Virtualvault product.

     Without patch PHSS_24108, the problem will persist and affect your
     site's data security. Hewlett Packard urges all users of
     Virtualvault 4.0 to install this patch immediately to prevent any
     potential data security risks.

II   Recommended actions
      The problem can be eliminated by installing the recommended patch.
      Hewlett-Pachard recommends that the following patch be loaded as

      HP-UX 11.04 (VVOS) with Virtualvault a.04.00:       PHSS_24108

      NOTE: There is a dependency upon patch PHSS_23215.

III.   To subscribe to automatically receive future NEW HP Security
      Bulletins from the HP IT Resource Center via electronic mail,
      do the following:

      Use your browser to get to the HP IT Resource Center page

      Under the Maintenance and Support Menu (Electronic Support
      Center), click on the "more..." link.  Then -

      Use the 'Login' tab at the left side of the screen to login
      using your ID and password.  Check with your system
      administrator to see if you have an existing login or use
      the "Register" button at the left to create a login.  You
      will need to login in order to gain access to many areas of
      the ITRC. Remember to save the User ID assigned to you, and
      your password.

      Under the "Notifications" section (near the bottom of
      the page), select "Support Information Digests".

      To -subscribe- to future HP Security Bulletins or other
      Technical Digests, click the check box (in the left column)
      for the appropriate digest and then click the "Update
      Subscriptions" button at the bottom of the page.


      To -review- bulletins already released, select the link
      (in the middle column) for the appropriate digest.

      To -gain access- to the Security Patch Matrix, select
      the link for "The Security Bulletins Archive".  (near the
      bottom of the page)  Once in the archive the third link is
      to the current Security Patch Matrix. Updated daily, this
      matrix categorizes security patches by platform/OS release,
      and by bulletin topic.  Us our free Security Patch Check
      to completely automate the process of reviewing the patch
      matrix for 11.XX systems.

      For information on the Security Patch Check tool, see:

      The security patch matrix is also available via anonymous ftp:

      On the "Support Information Digest Main" page:
      click on the "HP Security Bulletin Archive".

IV.    To report new security vulnerabilities, send email to

      Please encrypt any exploit information using the security-alert
      PGP key, available from your local key server, or by sending a
      message with a -subject- (not body) of 'get key' (no quotes) to

      Permission is granted for copying and circulating this Bulletin to
      Hewlett-Packard (HP) customers (or the Internet community) for the
      purpose of alerting them to problems, if and only if, the Bulletin
      is not edited or changed in any way, is attributed to HP, and
      provided such reproduction and/or distribution is performed for
      non-commercial purposes.

      Any other use of this information is prohibited. HP is not liable
      for any misuse of this information by any third party.
-----End of Document ID:  HPSBUX0106-152--------------------------------------


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC