HP-UX Secure Shell Remote Denial of Service (HPSBUX02090)

Original Release Date: January 16, 2006
Last Revised: February 17, 2006
Number: ASA-2006-016
Risk Level: Medium
Advisory Version: 2.0
Advisory Status: Final

1. Overview:

A new security and support alert from Hewlett-Packard has been issued regarding HP-UX Secure Shell and is described as follows.

TITLE: HPSBUX02090 SSRT051058 rev.1 - HP-UX Secure Shell Remote Denial of Service (DoS)
IMPACT: The vulnerability could be exploited as a remote Denial of Service (DoS).
SUMMARY: A potential security vulnerability has been identified with HP-UX running Secure Shell. The vulnerability could be remotely exploited to allow a remote unauthorized user to create a Denial of Service (DoS).
AFFECTED SOFTWARE:This vulnerability affects only HP-UX B.11.00, B.11.11, and B.11.23.
URL: http://www2.itrc.hp.com/service/cki/docDisplay.do?admit=-1335382922+1137467819794+28353475&docId=c00589050.

Certain versions of the Avaya™ Predictive Dialer System (PDS) are affected by this vulnerability. The Common Vulnerabilities and Exposures project has assigned the names CVE-2005-2096 and CAN-2005-2798 to this issue.

2. Mitigating Factors:

Avaya delivers the Secure Shell bundle (HP T1471AA) uninstalled. It is only installed and configured when the customer specifically requests it. Customers' systems where this package has not been installed are not vulnerable.

3. Avaya System Products using HP-UX B.11.00, B.11.11 and B.11.23:

Product: Affected S/W Version(s): Actions:
Predictive Dialer System(PDS) PDS v12

PDS v12 APC 3.0
Install HP-UX Secure Shell version A.04.20.004 or subsequent, if this package is installed and configured.

Recommended Actions:
Download and install HP-UX Secure Shell Version A.04.20.004 or subsequent from HP's support site.

4. Additional Information:

Additional information may also be available via the Avaya support website and through your Avaya account representative. Please contact your Avaya product support representative, or dial 1-800-242-2121, with any questions.

5. Disclaimer:

ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.

6. Revision History:

V 1.0 - January 16, 2006 - Initial Statement issued.
V 2.0 - February 17, 2006 - Minor formatting changes made.

Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or securityalerts@avaya.com.

© 2006 Avaya Inc. All Rights Reserved. All trademarks identified by the ® or ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.