SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   HPE integrated Lights Out (iLO) Vendors:   HPE
HP integrated Lights Out Can Be Crashed By Remote Users
SecurityTracker Alert ID:  1010274
SecurityTracker URL:  http://securitytracker.com/id/1010274
CVE Reference:   CVE-2004-0525   (Links to External Site)
Updated:  Jun 8 2004
Original Entry Date:  May 25 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.10 to prior to 1.55
Description:   A vulnerability was reported in HP integrated Lights Out (iLO). A remote user can cause denial of service conditions.

HP reported that a remote user can connect to iLO on a target ProLiant server using port zero to cause iLO to stop responding.

Impact:   A remote user can cause iLO to become unavailable.
Solution:   The vendor has released a fixed version (1.55), available at:

http://h18004.www1.hp.com/support/files/lights-out/us/index.html

HP recommends that you do not use port zero, because it is specified as a reserved port by the Internet Engineering Task Force.

Vendor URL:  www.hp.com/ (Links to External Site)
Cause:   Exception handling error, State error
Underlying OS:  Linux (Any), Windows (NT), Windows (2000), Windows (2003)
Underlying OS Comments:  HP ProLiant Servers

Message History:   None.


 Source Message Contents

Subject:  SSRT4724 - HP integrated Lights Out (iLO) Denial of Service (DoS)


HP SECURITY BULLETIN

HPSBMA01046     REVISION: 0

SSRT4724 - HP integrated Lights Out (iLO) Denial of Service (DoS) using port zero

NOTICE:
	

There are no restrictions for distribution of this Bulletin provided that it remains 
complete and intact.
	

The information in this Security bulletin should be acted upon as soon as possible.
INITIAL RELEASE:   	

24 May 2004

POTENTIAL SECURITY IMPACT:   	

Denial of Service (DoS)
SOURCE:   	

HEWLETT-PACKARD COMPANY
HP Software Security Response Team
REFERENCES:   	

N/A
VULNERABILITY SUMMARY:

LAN management products or other functions that use port zero when
accessing an Integrated Lights Out (iLO) in a ProLiant server will
cause iLO to become unresponsive creating a Denial of Service.
Port zero is specified as a reserved port by the Internet
Engineering Task Force (IETF) and should not be used.
SUPPORTED SOFTWARE VERSIONS*:  ONLY impacted versions are listed.
iLO Firmware V1.10 or Later up to, but not including, V1.55
BACKGROUND:
This problem affects any LAN management product that uses port
zero when accessing iLO in a ProLiant server.  An updated
listing of ProLiant servers with iLO is available at the following URL:
http://h18013.www1.hp.com/products/servers/management/riloe2/supported-servers.html

AFFECTED VERSIONS

    iLO Firmware
    ------------
    action: install revision V1.55 or subsequent

END AFFECTED VERSIONS
RESOLUTION:
Although HP recommends that port zero not be used (as it is specified
as a reserved port by the Internet Engineering Task Force), if it is
necessary to use port zero, upgrade the iLO firmware. iLO Firmware
Version 1.55 allows the use of port zero without causing iLO
to become unresponsive. iLO Firmware Version 1.55 is available
at the following URL:
http://h18004.www1.hp.com/support/files/lights-out/us/index.html
Please write to security-alert@hp.com to request a PGP signed version of this bulletin.
BULLETIN REVISION HISTORY:


* The software product category that this Security Bulletin relates to is represented by 
the 5th and 6th characters of the Bulletin number: GN=General, MA=Management Agents, 
MI=Misc. 3rd party, MP=HP-MPE/iX, NS=HP NonStop Servers, OV=HP OpenVMS, PI=HP Printing & 
Imaging, ST=HP Storage, TU=HP Tru64 UNIX, TL=Trusted Linux, UX=HP-UX, VV=Virtual Vault


SUPPORT: For further information, contact HP Services support channel.

SUBSCRIBE: To initiate a subscription to receive future HP Security Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: Driver and Support Alerts/Notifications Sign-up: Product Selection
Under Step1: your products
1. Select product category: - a minimum of servers must be selected.
2. Select product family or search: - a minimum of one product must be selected.
3. Add a product: - a minimum of one product must be added.
In Step 2: your operating system(s) - check ALL operating systems for which alerts are 
required.
Complete the form and Save.

To update an existing subscription:
http://h30046.www3.hp.com/subSignIn.php
Log in on the web page Subscriber's choice for Business: sign-in.
On the Web page: Subscriber's Choice: your profile summary - use Edit Profile to update 
appropriate sections.

Note: In addition to the individual alerts/notifications for the selected operating 
systems/products, subscribers will automatically receive one copy of alerts for 
non-operating system categories (i.e., a subscriber who signs up for all six operating 
system alerts will only receive one copy of all the non-operating system alerts).

REPORT: To report a potential security vulnerability with any HP supported product, send 
Email to: security-alert@hp.com. It is strongly recommended that security related 
information being communicated to HP be encrypted using PGP, especially exploit 
information. To obtain the security-alert PGP key please send an e-mail message to 
security-alert@hp.com with the Subject of 'get key' (no quotes).

System management and security procedures must be reviewed frequently to maintain system 
integrity. HP is continually reviewing and enhancing the security features of software 
products to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the attention of 
users of the affected HP products the important security information contained in this 
Bulletin. HP recommends that all users determine the applicability of this information to 
their individual situations and take appropriate action. HP does not warrant  that this 
information is necessarily accurate or complete for all user situations and, consequently, 
HP will not be responsible for any damages resulting from user's use or disregard of the 
information provided in this Bulletin. To the extent permitted by law, HP disclaims all 
warranties, either express or implied, including the warranties of merchantability and 
fitness for a particular purpose, title and non-infringement."


Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions 
contained herein. The information provided is provided "as is" without warranty of any 
kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or 
suppliers will be liable for incidental, special or consequential damages including 
downtime cost; lost profits; damages relating to the procurement of substitute products or 
services; or damages for loss of data, or software restoration. The information in this 
document is subject to change without notice. Hewlett-Packard Company and the names of 
Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in 
the United States and other countries. Other product and company names mentioned herein 
may be trademarks of their respective owners.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC