BugTraq
[security bulletin] HPSBMU03190 rev.1 - HP Helion Cloud Development Platform Community and Commercial Editions, Remote Unauthenticated Access Nov 11 2014 05:41PM
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04500238

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04500238
Version: 1

HPSBMU03190 rev.1 - HP Helion Cloud Development Platform Community and
Commercial Editions, Remote Unauthenticated Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2014-11-10
Last Updated: 2014-11-10

Potential Security Impact: Remote unauthenticated access

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP Helion Cloud
Development Platform Community Edition and HP Helion Cloud Development
Platform Commercial Edition. The vulnerability could be exploited remotely to
allow Unauthenticated access.

Note: On October 28, 2014, HP identified a critical security vulnerability in
the v1.0 release of the HP Helion Development Platform. The vulnerability is
in our Application Lifecycle Service (ALS) and requires immediate attention.

Vulnerability background: During the development process, valid user and host
security keys were unintentionally left on the ALS Seed Node image. These
keys are thus universal on all virtual machines created using the ALS Seed
Node image. If an attacker has a virtual machine (VM) created from the ALS
seed node image, they could potentially use that VM to connect (without
giving a password) to any other VM in any ALS cluster (including ones the
attacker does not own) if the attacker obtains a valid cluster VM IP address
and the cluster was created with an ALS seed node image containing the
vulnerability.

References:

CVE-2014-7878
SSRT101812

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP Helion Development Platform Community Edition v1.0 - Preview, Released
June 30, 2014
HP Helion Development Platform Commercial Edition v1.0, Released October 14,
2014
HP Helion Development Platform Commercial Edition v1.0 Public Cloud Trial,
Released October 14, 2014

Note: Clusters created with ALS seed nodes labeled 1.0.0.0 through 1.0.0.4
available 10/14/2014 to 10/27/2014

BACKGROUND

CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-7878 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following instructions to resolve the vulnerability in HP
Helion Cloud Development Platform Community Edition and HP Helion Cloud
Development Platform Commercial Edition.

HP Helion Development Platform Commercial Edition v1.0 Public Cloud Trial
Starting with the image HP Helion Development Platform CE - Application
Lifecycle Service Seed Node 1.0.0.4.4, HP has resolved the technical issue in
the public cloud. Public cloud customers should immediately take the
following remediation steps:

Follow steps 2-4 for each affected trial VM.
Backup any running applications on an affected trial VM.
Shut down and destroy the trial VM and security groups. A trial VM in the
public cloud will have a name that follows the pattern "<5 random letters>"
and can be identified via the Horizon user console in the list of compute
instances. The trial will have 3 security groups that should be deleted the
security groups will use the same 5 random letters for the start of the name
and will follow the pattern: "<5 random letters>-Core-Router","<5 random
letters>-Internal", "<5 random letters>-SSH".
Reinstall a new trial following the installation steps found here:
http://docs.hpcloud.com/helion/devplatform/ALS-developer-trial-quick-sta
rt/

HP Helion Development Platform Commercial Edition v1.0 and HP Helion
Development Platform Community Edition v1.0 - Preview
HP has resolved the technical issue in the HP Helion Development Platform
Commercial Edition and HP Helion Development Platform Community Edition v1.0
Preview download from the HP HDN as of 11/03/2014. Customers who have
installed the HP Helion Development Platform Commercial Edition should
immediately take the following remediation steps:

Backup any running applications on the affected cluster. Shut down and delete
the cluster:
For Community Edition: Delete all VMs and associated security groups. A
cluster VM can be seen in the compute Instance list and will have a name that
starts with the name of the cluster chosen at the time the cluster was
created, followed by a "-<description of cluster role>". Security groups that
should be deleted will also follow the same pattern.
For Commercial Edition, navigate to the Application Lifecycle Service ->
Clusters tab, select the cluster to delete, then click the Delete button.
Repeat steps 1 and 2 for each affected cluster.
To uninstall ALS images, in the Openstack Horizon interface:

Click on Project
Click on Compute
Click on Images
Select images starting with Application Lifecycle Services
Click Delete Images

To reinstall the ALS images, login to the OpenStack Horizon interface as an
administrator:

Click on Admin
Click on Development Platform
Click on Configure Services
In the Application Lifecycle Services row, click Download
When the download completes, ALS will be ready to use.

Recreate original clusters and redeploy applications following the same
process originally used.

Please contact apaas-support (at) hp (dot) com [email concealed] for any further questions regarding this
alert.

HISTORY
Version:1 (rev.1) - 10 November 2014 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert (at) hp (dot) com. [email concealed]

Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert (at) hp (dot) com [email concealed]

Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)

iEYEARECAAYFAlRhI9kACgkQ4B86/C0qfVl13QCguMSW9oJ4PeZpvUz36kFm+wux
pvkAoMqwQt9aetOdzz1sZbVMFXcKMigZ
=MUYy
-----END PGP SIGNATURE-----

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus