Hewlett-Packard Company Information for VU#749342
Multiple vulnerabilities in H.323 implementations
- Vendor Information Help Date Notified: 12 Jan 2004
- Statement Date: 13 Jan 2004
- Date Updated: 05 Apr 2004
-----BEGIN PGP SIGNED MESSAGE-----
HP SECURITY BULLETIN
HPSBGN01004 REVISION: 0
SSRT3614 - HP OpenCall Multiservice Controller (OCMC) DoS
(Denial of Service)
NOTICE: There are no restrictions for distribution of this
Bulletin provided that it remains complete and intact.
The information in this Security bulletin should be
acted upon as soon as possible.
INITIAL RELEASE: 25 March 2004
POTENTIAL SECURITY IMPACT: Remote Denial of Service (DoS)
SOURCE: HEWLETT-PACKARD COMPANY
HP Software Security Response Team
REFERENCES: CERT CA-2004-01, CISCO Advisory 47843
A potential security vulnerability has been identified in the
HP OpenCall MultiService Controller (OCMC) H.323 stack that may
allow a remote user to create a Denial of Service (DoS).
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
All versions HP OCMC v1.2 and HP OCMC v1.1 for HP-UX 11.0
The HP Software Security Response team has contacted
the source and various other vendors and is not aware
of any malicious exploitation of any of the vulnerabilities
described in this bulletin.
A test suite developed by the U.K. National Infrastructure
Security Co-ordination Centre (NISCC) and the University of
Oulu Security Programming Group (OUSPG) has exposed
vulnerabilities in several implementations of the H.323
The potential vulnerabilities may be exploited to produce a
denial of service (DoS) attack. Such an attack may cause an
affected product to failover or crash and failover. Due to
its robust design OCMC will recover from most attack scenarios.
In the event that OCMC does not recover, the attack can be
stopped by blocking the offending IP address. Attacks may also
be blocked by creating an access list to restrict TCP port 1720
traffic to known, trusted IP addresses.
HP will be providing patches to the impacted versions of OCMC:
OCMC v1.2 released January 2004
OCMC v1.1 patch 46
OCMC v1.1 patch 37
This bulletin will be revised as the patches become available
and patches will be available from the normal HP Services
Please write to email@example.com to request a PGP signed
version of this bulletin.
BULLETIN REVISION HISTORY: N/A
* The software product category that this Security Bulletin
relates to is represented by the 5th and 6th characters of
the Bulletin number: GN=General, MA=Management Agents,
MI=Misc. 3rd party, MP=HP-MPE/iX, NS=HP NonStop Servers,
OV=HP OpenVMS, PI=HP Printing & Imaging, ST=HP Storage,
TU=HP Tru64 UNIX, TL=Trusted Linux, UX=HP-UX,
SUPPORT: For further information, contact HP Services support
SUBSCRIBE: To initiate a subscription to receive future HP
Security Bulletins via Email:
On the web page: Driver and Support Alerts/Notifications Sign-up:
Under Step1: your products
1. Select product category: - a minimum of servers must be
2. Select product family or search: - a minimum of one product
must be selected.
3. Add a product: - a minimum of one product must be added.
In Step 2: your operating system(s) - check ALL operating systems
for which alerts are required.
Complete the form and Save.
To update an existing subscription:
Log in on the web page Subscriber's choice for Business: sign-in.
On the Web page: Subscriber's Choice: your profile summary - use
Edit Profile to update appropriate sections.
Note: In addition to the individual alerts/notifications for the
selected operating systems/products, subscribers will
automatically receive one copy of alerts for non-operating
system categories (i.e., a subscriber who signs up for all
six operating system alerts will only receive one copy of
all the non-operating system alerts).
REPORT: To report a potential security vulnerability with any HP
supported product, send email to: firstname.lastname@example.org
Please encrypt any exploit information using the
security-alert PGP key, available from your local key
server, or by sending a message with a -subject- (not body)
of 'get key' (no quotes) to email@example.com.
System management and security procedures must be reviewed
frequently to maintain system integrity. HP is continually
reviewing and enhancing the security features of software
products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order
to bring to the attention of users of the affected HP products
the important security information contained in this Bulletin.
HP recommends that all users determine the applicability of this
information to their individual situations and take appropriate
action. HP does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently,
HP will not be responsible for any damages resulting from user's
use or disregard of the information provided in this Bulletin.
To the extent permitted by law, HP disclaims all warranties,
either express or implied, including the warranties of
merchantability and fitness for a particular purpose, title and
(c) Copyright 2004 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
provided is provided "as is" without warranty of any kind.
To the extent permitted by law, neither HP or its affiliates,
subcontractors or suppliers will be liable for incidental,
special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute
products or services; or damages for loss of data, or software
restoration. The information in this document is subject to
change without notice. Hewlett-Packard Company and the names
of Hewlett-Packard products referenced herein are trademarks
of Hewlett-Packard Company in the United States and other
countries. Other product and company names mentioned herein may
be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0
-----END PGP SIGNATURE-----
We are not aware of further vendor information regarding this vulnerability.
Please also see NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1:
At the time of writing this document, HP is currently investigating the potential impact to HP's released Operating System software products.
As further information becomes available HP will provide notice of the availability of any necessary patches through standard security bulletin announcements and be available from your normal HP Services support channel.
To report potential security vulnerabilities in HP software, send an E-mail message to: firstname.lastname@example.org.