---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: HP OpenView Network Node Manager Java JDK / JRE Multiple Vulnerabilities SECUNIA ADVISORY ID: SA38539 VERIFY ADVISORY: http://secunia.com/advisories/38539/ DESCRIPTION: HP has acknowledged some vulnerabilities in HP OpenView Network Node Manager, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, cause a DoS (Denial of service), or compromise a vulnerable system. The vulnerabilities are caused due to the usage of a vulnerable version of Java JDK/JRE. For more information: SA32991 The vulnerabilities are reported in versions 7.51 and 7.53 running on HP-UX, Linux, Solaris, and Windows. SOLUTION: Apply patches. http://support.openview.hp.com/selfsolve/patches HP-UX (IA): Apply patch PHSS_40374 or subsequent HP-UX (PA): Apply patch PHSS_40375 or subsequent Linux RedHatAS2.1: Apply patch LXOV_00101 or subsequent Linux RedHat4AS-x86_64: Apply patch LXOV_00102 or subsequent Solaris: Apply patch PSOV_03525 or subsequent Windows: Apply patch NNM_01201 or subsequent ORIGINAL ADVISORY: HPSBMA02486 SSRT090049: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02000725 OTHER REFERENCES: SA32991: http://secunia.com/advisories/32991/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------