Summary
Reference
Document ID: KM02992667 (c01179933)
Version: 1
Release Date: 2003-11-24
Last Updated: 2007-10-02
Potential Security Impact: Remote denial of service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A vulnerability in ProCurve 5300 series switches may allow creation of a remote denial of service (DoS).
References: HPSBMI00006
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP ProCurve Switch 5304XL (J4850A), 5348XL (J4849A), 5372XL (J4848A), 5308XL (J4819A).
BACKGROUND
For a PGP signed version of this security bulletin please write to: security-alert@hp.com
Note: This Security Bulletin has been re-released with a new document number but without alteration of content. The purpose of this new number and re-release is to assure the document is available on all customer accessible databases.
This is a reformatted version of Security Bulletin HPSBMI0311-006 SSRT3647 rev.0.
The HP ProCurve Switches potentially suffer an adverse reaction to the presence of the Blaster/Welchia worms. Networking performance deteriorates resulting in the appearance of a Denial of Service for connected end nodes, generally running Microsoft Windows operating systems. HP ProCurve Switches can exhibit deteriorating performance and fail to function in presence of RPC worms such as Welchia and Blaster.
Only the following HP ProCurve Switches are affected: 5304XL (J4850A), 5348XL (J4849A), 5372XL (J4848A), 5308XL (J4819A).
NOTE: This problem does not directly impact HP-UX, MPE/iX, HP NonStop Servers, HP OpenVMS, nor HP Tru64 UNIX/Trucluster Server.
RESOLUTION
The software updates are available from: http://www.hp.com/rnd/software/switches.htm
ProCurve 5300 series switches
|
Install firmware E.07.40, or subsequent
|
Several steps need to be taken to mitigate the problem.
1. Locate and remove worms from infected and connected network clients. To accomplish that task, download the Snort* utility which is designed to identify a network client infected by the Blaster and/or Welchia worms. http://www.snort.org/

Follow the recommended instructions provided to install and to locate and remove these worms from a network.
The following link provides some details of how to detect traffic that is caused by such worms and the data from this link can be used to compare to the traces that captured from a network. http://www.symantec.com


2. Administrators should take actions to prevent worm infiltrations on the network by ensuing that the latest patches for security vulnerabilities are applied to end clients via Microsoft Security releases. http://update.microsoft.com

3. Download and install the new switch software version E.07.40 or subsequent from: http://www.hp.com/rnd/software/switches.htm
If further assistance is required, contact a local ProCurve Customer Care Center, or visit the web site at: https://my.procurve.com/help/help_topics.aspx?CultureCode=en-US

* Snort is not included with HP Operating Systems and is not supported by HP; the information has been included in this document as a reference to customers who may be interested in evaluating it as it applies to this particular subject.
HISTORY
Version: 1 (rev.1) - 02 October 2007 Initial release, with an SPC change MI to GN.
Third Party Security Patches: Third party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."