Abstract: If you scan your fresh new HP Server via a vulnerability scan (e.g Nessus) you might get a "58751 - SSL/TLS Protocol Initialization Vector Implementation Information Disclosure Vulnerability" on Port 2381 but how to fix it?

Warning: This solution is outdated, check the new one here including the reason.

Solution: The message above is in correlation to the vulnerability CVE-2011-3389 and is called "BEAST attack" if you search for in the Internet. It is a "SSLv3.0/TLSv1.0 Protocol Weak CBC Mode Vulnerability" and to fix that in the HP System Management on the affected server you need to disable "block ciphers". This can be done via the following command on the affected Server:

C:\hp\hpsmh\bin\smhconfig.exe -Z 'RC4-SHA'

Like mentioned in the HP Documentation HPSBMU02742 SSRT100740 here.

After that you need to restart the "System Management Homepage".

If you got a error message like "Input is not proper UTF-8, indicate encoding!" you need to check the mentioned XML which is normally C:/hp/hpsmh/conf/smhpd.xml. It could be that you used the wrong apostrophe in the command above which is now in the xml file. You can fix that with Notepad directly on the server if needed.

 

Comments (1)

  1. vivek

Fixing "SSLv3.0/TLSv1.0 Protocol Weak CBC Mode Vulnerability" in HP System Management Homepage


C:\hp\hpsmh\bin\smhconfig.exe -Z 'RC4-SHA' command is not working in windows 2003 sp2 enterprise edition.so please give me a better solution to fix...

Fixing "SSLv3.0/TLSv1.0 Protocol Weak CBC Mode Vulnerability" in HP System Management Homepage


C:\hp\hpsmh\bin\smhconfig.exe -Z 'RC4-SHA' command is not working in windows 2003 sp2 enterprise edition.so please give me a better solution to fix the issue.

Read More
  Attachments
 
There are no comments posted here yet

Leave your comments

Posting comment as a guest.
Attachments (0 / 3)
Share Your Location