what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

271040.htm

271040.htm
Posted Oct 26, 2004
Site seer.support.veritas.com

Veritas Security Advisory - A security flaw which allows for potential unauthorized root access in VERITAS Cluster Server (tm) for all UNIX platforms has been discovered.

tags | advisory, root
systems | unix
SHA-256 | 08e56b40c9a6a0ed1cdbd56faa7d866efaba73331c328a322f2963e1fd012126

271040.htm

Change Mirror Download
    <HTML>
<HEAD>
<TITLE>
A security flaw which allows for potential unauthorized root access in VERITAS Cluster Server (tm) for all UNIX platforms has been discovered
</TITLE>
<!-- META -->
<META http-equiv="Content-Type" content="text/html; charset=us-ascii">
<META http-equiv="Content-Style-Type" content="text/css">
<META http-equiv="Expires" Content="21 Jan 2002"><META NAME="Lang" CONTENT="English (US)"><META NAME="PRODUCT_ENTITY" CONTENT="15066,50088"><META NAME="VERSION_ENTITY" CONTENT="20784,20785,20779,20786,20787,20788,20789,20790,20791,20792,20793,20794,20795,20796,50294,50295,20780,21810,50264,20798,20799,20800,20801,20802,20781,50301,20803,20804,20813,50086,50358,50395,50568,50297,50303,20782,21811,20806,50305,20807,20808,50307,50572,20809,50310,20810,50299,50368,50369,50492,50493,20783,21809,50710,50089,50377"><META NAME="VERSIONS_TEXT" CONTENT="1.0.1 (Solaris),1.0.2 (Solaris),1.1 (Solaris),1.1.1 (Solaris),1.1.2 (Solaris),1.3.0 (Solaris),1.3.0 (Solaris) PRE-GA,1.3.0P1,1.3.0P2,1.3.0P3,1.3.0P4,1.3.1 (HPUX),1.3.1P3,2.0 (AIX),2.0 (Linux),2.0 (Solaris),2.0 (Solaris) BETA,2.0 (Solaris) GA,2.0P1,2.0P2,2.0P3,2.0P4,2.1,2.1 (Linux),2.1 P1 (Linux),2.2,2.2 (Linux),2.2 MP1,2.2 MP1P1 (Linux),2.2 MP2,3.5 (AIX),3.5 (HPUX),3.5 (Solaris),3.5 (Solaris) BETA,3.5 MP1,3.5 MP1 (Solaris),3.5 MP1J,3.5 MP2,3.5 MP2 (Solaris),3.5 MP3 (Solaris),3.5 P1,3.5 Update 1 (HPUX),3.5 Update 2 (HPUX),3.5.1 (AIX),4.0 (AIX),4.0 (AIX) Beta,4.0 (Linux),4.0 (Linux) BETA,4.0 (Solaris),4.0 (Solaris) BETA,4.0 MP1 (Solaris),4.0,4.0 BETA"><META NAME="FCODE" CONTENT="CLUSTERSERVER, CCAvail"><META NAME="VERSION" CONTENT="CLUSTERSERVERPVER23, CLUSTERSERVERPVER101, CLUSTERSERVERPVER102, CLUSTERSERVERPVER1041, CLUSTERSERVERPVER1042, CLUSTERSERVERPVER1849, CLUSTERSERVERPVER15665, CLUSTERSERVERPVER14706, CLUSTERSERVERPVER14705, CLUSTERSERVERPVER14704, CLUSTERSERVERPVER6568, CLUSTERSERVERPVER3123, CLUSTERSERVERPVER14702, CLUSTERSERVERPVER14698, CLUSTERSERVERPVER14697, CLUSTERSERVERPVER4124, CLUSTERSERVERPVER15725, CLUSTERSERVERPVER15724, CLUSTERSERVERPVER5995, CLUSTERSERVERPVER5988, CLUSTERSERVERPVER5990, CLUSTERSERVERPVER6570, CLUSTERSERVERPVER9157, CLUSTERSERVERPVER14694, CLUSTERSERVERPVER9160, CLUSTERSERVERPVER13331, CLUSTERSERVERPVER14699, CLUSTERSERVERPVER15928, CLUSTERSERVERPVER16129, CLUSTERSERVERPVER16669, CLUSTERSERVERPVER14696, CLUSTERSERVERPVER14693, CLUSTERSERVERPVER5890, CLUSTERSERVERPVER15727, CLUSTERSERVERPVER6842, CLUSTERSERVERPVER14692, CLUSTERSERVERPVER7250, CLUSTERSERVERPVER12673, CLUSTERSERVERPVER14691, CLUSTERSERVERPVER16668, CLUSTERSERVERPVER7590, CLUSTERSERVERPVER14690, CLUSTERSERVERPVER9227, CLUSTERSERVERPVER14695, CLUSTERSERVERPVER16028, CLUSTERSERVERPVER16029, CLUSTERSERVERPVER16468, CLUSTERSERVERPVER16486, CLUSTERSERVERPVER12630, CLUSTERSERVERPVER15660, CLUSTERSERVERPVER17068, CCAvailPVER15272, CCAvailPVER16079"><META NAME="Publish_Date" CONTENT="10/14/2004"><META NAME="Publish_Date_Sort" CONTENT="200428864881"><META NAME="SUBJECTS_TEXT" CONTENT="Application Informational,Application Alert,Application Informational,Application Patches,Publishing Status Techalert,Application Patches,Publishing Status Techalert,Application Informational,Application Patches,Applications Information,Applications Patches,Application Informational,Application Patches,"><META NAME="DOCSUB" CONTENT="osaixSUB6882, CLUSTERSERVERSUB487, CLUSTERSERVERSUB251, CLUSTERSERVERSUB2761, CLUSTERSERVERSUB4004, CCAvailSUB13601, CCAvailSUB12785, oshpuxSUB5404, oshpuxSUB5408, oslinuxSUB5743, oslinuxSUB5744, osolarisSUB5382, osolarisSUB5021"><META NAME="OS_ENTITY" CONTENT="1593,1593,1593,1593,1608,1608,1630,1630,1630,1630,1610,1610,1610,1610,50090"><META NAME="OS_VERSION_ENTITY" CONTENT="10731,10264,10732,10734,10037,10742,10797,50021,50022,50023,10060,11030,50722,50104,50560"><META NAME="DOCOS" CONTENT="OS6008, OS6013, OS6017, OS6018, OS10107"><META NAME="OVERSIONS" CONTENT="6008OVER2075, 6008OVER12529, 6008OVER5514, 6008OVER4669, 6013OVER2061, 6013OVER5428, 6017OVER2048, 6017OVER13208, 6017OVER13209, 6017OVER13210, 6018OVER6468, 6018OVER13048, 6018OVER17128, 6018OVER13269, 10107OVER16608"><META NAME="AVAILABILITY" CONTENT="2"><META NAME="STATUS" CONTENT="6"><META NAME="Generator" CONTENT="Atlas"><META NAME="doctype" CONTENT="doctype1">
<!-- CSS -->
<link rel="Stylesheet" href="http://seer.support.veritas.com/css/WWW.css" type="text/css"><STYLE TYPE=text/css> @import url(http://seer.support.veritas.com/css/generated.css);.bodytext, .link, A { font-size: small; font-face: Arial; }#watermark { background-color: #FFFFFF; }</STYLE>


<SCRIPT LANGUAGE="JavaScript" TYPE="text/javascript">
<!--
function openSubWin(strURL, pixW, pixH)
{
strLocation = strURL;
strWHandle = "sdcSubWin";
strProps = "resizable=yes,scrollbars=yes,toolbar=no,location=no,directories=no,status=no,menubar=no,width=" + pixW + ",height=" + pixH + ",top=10,left=10";
window.open(strLocation, strWHandle, strProps);
}//-->
</script>

<script language="JavaScript1.2" type="text/javascript">
function CheckBrowser() {
//used on load of page to check for older versions of Netscape and hide the feedback form
//due to compatibility issues

var browserName=navigator.appName;
var browserVer=parseInt(navigator.appVersion);

if (browserName=="Netscape")
{
if (browserVer < 5)
{
hideMe();
}
}
}
function SendFeedback(form) {
//used to hide the comment field and submit the data
hideMe();

form.args = "width=500, height=320, scrollbars, status, resizable=yes";

_win = window.open('',form.target,form.args);
if(typeof(focus)=="function")
_win.focus();
return true;


}


function CheckCommentField() {
//Used to possibly clear the comment field if user uses form
var szComentValue = document.TechNoteFeedback.strBODY.value;

if (szComentValue == '(Enter comment here)') {
document.TechNoteFeedback.strBODY.value='';
}

}


//The rest of this JavaScript is dedicated to the module navigation and function
isIE=document.all;
isNN=!document.all&&document.getElementById;
isN4=document.layers;
isHot=false;

function ddInit(e){
topDog=isIE ? "BODY" : "HTML";
whichDog=isIE ? document.all.theLayer : document.getElementById("theLayer");
hotDog=isIE ? event.srcElement : e.target;
while (hotDog.id!="titleBar"&&hotDog.tagName!=topDog){
hotDog=isIE ? hotDog.parentElement : hotDog.parentNode;
}
if (hotDog.id=="titleBar"){
offsetx=isIE ? event.clientX : e.clientX;
offsety=isIE ? event.clientY : e.clientY;
nowX=parseInt(whichDog.style.left);
nowY=parseInt(whichDog.style.top);
ddEnabled=true;
document.onmousemove=dd;
}
}

function dd(e){
if (!ddEnabled) return;
whichDog.style.left=isIE ? nowX+event.clientX-offsetx : nowX+e.clientX-offsetx;
whichDog.style.top=isIE ? nowY+event.clientY-offsety : nowY+e.clientY-offsety;
return false;
}

function ddN4(whatDog){
if (!isN4) return;
N4=eval(whatDog);
N4.captureEvents(Event.MOUSEDOWN|Event.MOUSEUP);
N4.onmousedown=function(e){
N4.captureEvents(Event.MOUSEMOVE);
N4x=e.x;
N4y=e.y;
}
N4.onmousemove=function(e){
if (isHot){
N4.moveBy(e.x-N4x,e.y-N4y);
return false;
}
}
N4.onmouseup=function(){
N4.releaseEvents(Event.MOUSEMOVE);
}
}

function hideMe(){
if (isIE||isNN) whichDog.style.visibility="hidden";
else if (isN4) document.theLayer.visibility="hide";
}

function showMe(){
if (isIE||isNN) whichDog.style.visibility="visible";
else if (isN4) document.theLayer.visibility="show";
}

document.onmousedown=ddInit;
document.onmouseup=Function("ddEnabled=false");

</script>

<!-- SiteCatalyst code version: G.6.

Copyright 1997-2004 Omniture, Inc. More info available at

http://www.omniture.com --><script language="JavaScript"><!--

/* You may give each page an identifying name, server, and channel on

the next lines. */

var s_pageName=""
var s_server="http://seer.support.veritas.com/"
var s_channel="271040"
var s_pageType=""
var s_prop1=""
var s_prop2=""
var s_prop3=""
var s_prop4=""
var s_prop5=""
var s_prop6=""
var s_prop7=""
var s_prop8=""
var s_prop9=""
var s_prop10=""
/* E-commerce Variables */
var s_campaign=""
var s_state=""
var s_zip=""
var s_events=""
var s_products=""
var s_purchaseID=""
var s_eVar1=""
var s_eVar2=""
var s_eVar3=""
var s_eVar4=""
var s_eVar5=""
var s_eVar6=""
var s_eVar7=""
var s_eVar8=""
var s_eVar9=""
var s_eVar10=""
/********* INSERT THE DOMAIN AND PATH TO YOUR CODE BELOW ************/

//--></script><script type="text/javascript" src="http://www.veritas.com/js/site_catalyst.js"></script>

<!-- End SiteCatalyst code version: G.6. -->

</HEAD>
<BODY>
<DIV CLASS="bodytext" ID="header">

</DIV>
<DIV ID="watermark" class="bodytext">
<DIV>
<SPAN CLASS="LABELL" ID="DOCUMENT_ID">
<SPAN CLASS="BodySubtitle">Document ID:</SPAN> 271040 <BR>
<!-- link (public only) -->
<A HREF="http://support.veritas.com/docs/271040" CLASS=link>http://support.veritas.com/docs/271040</a>
</SPAN>
<SPAN CLASS="LABELR" ID="EMAIL_COLLEAGUE">
<A HREF="javascript:openSubWin('http://seer.support.veritas.com/email_forms/tnote_sndml.asp?docID=http://seer.support.veritas.com/docs/271040', 475, 500)" class="link"><IMG SRC='http://seer.support.veritas.com/images/icoemail.gif' ALT='E-Mail Colleague Icon' WIDTH='20' HEIGHT='15' BORDER='0'>E-Mail this document to a colleague</A>
</SPAN>
</DIV>
<BR>
<DIV CLASS="TITLE" ID="TITLE">
A security flaw which allows for potential unauthorized root access in VERITAS Cluster Server (tm) for all UNIX platforms has been discovered
</DIV>
<HR NOSHADE>
<DIV CLASS=bodytext ID="EXACT_ERROR"></DIV>
<DIV CLASS="bodytext" ID="DETAILS">
<SPAN CLASS="BodyToolboxHeader">Details:</SPAN><BR>


<div class="Normal">The potential for a serious system security breach has been

found to exist in VERITAS Cluster Server for Solaris, HP-UX, AIX, and Linux.

This issue does not exist on any version of VERITAS Cluster Server for Windows.

The potential problem has been addressed for Solaris, HP-UX, AIX, and Linux

versions of Cluster Server in the patches listed below. &nbsp;If you have

VERITAS Cluster Server 4.0 on Solaris and have already applied MP1, then this

issue is already resolved in your environment. It is highly recommended that all

installations of Cluster Server be updated to include the fix for this potential

security issue because root access can be achieved by unauthorized

users.<br><br>To obtain the patch needed for your installation of Cluster

Server, follow these steps:<br><br>1. Find the appropriate UNIX platform and

version in the list below<br>2. Verify that you have the appropriate version of

Cluster Server installed on which to apply the patch (check the table

below)<br>3. Open and read the listed TechFile for your platform (the TechFile

numbers in the list below are links to the document)<br>4. Download the patch

directly from that TechFile<br><br>Note: If using VERITAS CommandCentral (tm)

Availability, you must apply the Command Central Availability patch from

TechFile &nbsp;<A HREF="http://support.veritas.com/docs/270142">http://support.veritas.com/docs/270142</A>

for Command Central Availability to work with Cluster Server after having

applied any of the patches

below.<br><br> &nbsp;<TABLE BORDER='0' ID='PATCHINFORMATION'><TR><TH ALIGN=LEFT>Platform</TH><TH ALIGN=LEFT>CD release version</TH><TH ALIGN=LEFT>VCS version</TH><TH ALIGN=LEFT>TechFile</TH><TH ALIGN=LEFT>Checking the VCS version</TH></TR><TR><TD>Solaris</TD><TD>3.5 MP3</TD><TD>3.5p3</TD><TD><a href="http://support.veritas.com/docs/270071">270071</a></TD><TD>pkginfo VRTSvcs</TD></TR><TR><TD>Solaris</TD><TD>4.0</TD><TD>4.0</TD><TD><a href="http://support.veritas.com/docs/269487">269487</a></TD><TD>pkginfo VRTSvcs</TD></TR><TR><TD>HP-UX</TD><TD>3.5 Update 2</TD><TD>3.5p1</TD><TD><a href="http://support.veritas.com/docs/270074">270074</a></TD><TD>swlist VRTSvcs</TD></TR><TR><TD>AIX</TD><TD>3.5 MP1</TD><TD>3.5p1</TD><TD><a href="http://support.veritas.com/docs/270090">270090</a></TD><TD>lslpp -L VRTSvcs.rte</TD></TR><TR><TD>RedHat Advanced Server 2.1 i686</TD><TD>2.2 MP2</TD><TD>2.2p2</TD><TD><a href="http://support.veritas.com/docs/270095">270095</a></TD><TD>rpm -qa VRTSvcs</TD></TR><TR><TD>RedHat Enterprise Linux 3.0 i686</TD><TD>2.2 MP2</TD><TD>2.2p2</TD><TD><a href="http://support.veritas.com/docs/270096">270096</a></TD><TD>rpm -qa VRTSvcs</TD></TR><TR><TD>RedHat Enterprise Linux 3.0 update 2 IA64</TD><TD>2.2 MP2</TD><TD>2.2p2</TD><TD><a href="http://support.veritas.com/docs/270097">270097</a></TD><TD>rpm -qa VRTSvcs</TD></TR><TR><TD>SuSE SLES 8 SP3</TD><TD>2.2 MP2</TD><TD>2.2p2</TD><TD><a href="http://support.veritas.com/docs/270092">270092</a></TD><TD>rpm -qa VRTSvcs</TD></TR><TR><TD>ESX</TD><TD>2.2 MP2</TD><TD>2.2p2</TD><TD><a href="http://support.veritas.com/docs/271277">271277</a></TD><TD>rpm -qa VRTSvcs</TD></TR></TABLE>

<br><br></div>

<div class="Normal" style=' margin-top:5pt; margin-bottom:5pt;'>Note: Because

this is a security issue, VERITAS will not publicly disclose details of this

issue. If you require assistance in applying the patch or insuring that your

system is upgraded to the necessary levels, or assistance in determining which

systems are potentially vulnerable to this issue, please contact VERITAS

Technical Support.<br></div>

<div class="Normal"><br></div>
<BR>
</DIV>
<DIV CLASS="bodytext" ID="RELATED_DOCUMENTS">
<SPAN CLASS="BodyToolboxHeader">Related Documents:</SPAN><BR><BR><SPAN class=related><a href="http://support.veritas.com/docs/269487" target=new class="link">269487</a>:&nbsp;<B>ss_cfs.4.0MP1.sol.tar_269487.gz </B>&nbsp;VERITAS Storage Solutions and Cluster File Solutions 4.0 Maintenance Pack 1 for Solaris</SPAN><BR><SPAN STYLE="text-align:right;width:100%">&nbsp;<a href="http://support.veritas.com/docs/269487" target=new class="link">http://support.veritas.com/docs/269487</a></SPAN><BR><BR><BR><SPAN class=related></SPAN><BR><BR><BR><SPAN class=related></SPAN><BR><BR><BR><SPAN class=related></SPAN><BR><BR><BR><SPAN class=related></SPAN><BR><BR><BR><SPAN class=related></SPAN><BR><BR><BR><SPAN class=related></SPAN><BR><BR><BR><SPAN class=related></SPAN><BR><BR><BR><SPAN class=related></SPAN><BR><BR><BR><SPAN class=related></SPAN><BR><BR>
</DIV>
<DIV CLASS="bodytext" ID="S_MATERIAL">
<BR><SPAN CLASS="BodyToolboxHeader">Supplemental Material:</SPAN><BR><BR><TABLE CLASS="smaterial"><TR><TD CLASS="smaterial"><SPAN CLASS="subhdr1blue">System: Ref.#</SPAN></TD><TD CLASS="subhdr1blue">Description</TD></TR><TR><TD CLASS="smaterial"><SPAN CLASS="subhdr2">iTools: <SPAN STYLE="font-weight:bold;"> 147547 </SPAN></SPAN></TD><TD CLASS="bodytext"><SPAN CLASS="italic">Potential security flaw found</SPAN></TD></TR></TABLE><BR>
</DIV>
<DIV CLASS="bodytext" ID="ACKNOWLEDGEMENTS">

</DIV>
<HR NOSHADE>
<A NAME="Summary"></A>
<DIV class="bodytext" ID="SUMMARY">
<DIV CLASS=LABELL ID="PRODUCTS">
<SPAN CLASS=BodySubtitle>Products Applied:</SPAN> <BR>
<SPAN>&nbsp;Cluster Server for UNIX 1.0.1 (Solaris), 1.0.2 (Solaris), 1.1 (Solaris), 1.1.1 (Solaris), 1.1.2 (Solaris), 1.3.0 (Solaris), 1.3.0 (Solaris) PRE-GA, 1.3.0P1, 1.3.0P2, 1.3.0P3, 1.3.0P4, 1.3.1 (HPUX), 1.3.1P3, 2.0 (AIX), 2.0 (Linux), 2.0 (Solaris), 2.0 (Solaris) BETA, 2.0 (Solaris) GA, 2.0P1, 2.0P2, 2.0P3, 2.0P4, 2.1, 2.1 (Linux), 2.1 P1 (Linux), 2.2, 2.2 (Linux), 2.2 MP1, 2.2 MP1P1 (Linux), 2.2 MP2, 3.5 (AIX), 3.5 (HPUX), 3.5 (Solaris), 3.5 (Solaris) BETA, 3.5 MP1, 3.5 MP1 (Solaris), 3.5 MP1J, 3.5 MP2, 3.5 MP2 (Solaris), 3.5 MP3 (Solaris), 3.5 P1, 3.5 Update 1 (HPUX), 3.5 Update 2 (HPUX), 3.5.1 (AIX), 4.0 (AIX), 4.0 (AIX) Beta, 4.0 (Linux), 4.0 (Linux) BETA, 4.0 (Solaris), 4.0 (Solaris) BETA, 4.0 MP1 (Solaris) <I>(Fixed)</I><BR>&nbsp;CommandCentral Availability 4.0, 4.0 BETA<BR></SPAN> <BR>
</DIV>
<DIV CLASS=LABELR ID="ACTIVITY">
<SPAN CLASS=BodySubtitle ID="LAST_UPDATE">Last Updated:</SPAN> October 14 2004 06:01 PM GMT <BR>
<SPAN CLASS=BodySubtitle ID="EXPIRES_ON">Expires on:</SPAN> 02-22-2005 <BR>
<A HREF="http://maillist.support.veritas.com/notification.asp?doc=271040" target=new class="link"><IMG SRC='http://seer.support.veritas.com/images/icoemail.gif' ALT='Subscribe Via E-Mail Icon' WIDTH='20' HEIGHT='15' BORDER='0'>Subscribe to this document</A> <BR>
</DIV>
<BR>
<DIV>
<SPAN CLASS=BodySubtitle ID="SUBJECTS">Subjects:</SPAN> <BR>
&nbsp;AIX <BR>&nbsp;&nbsp; Application: Informational<BR>Cluster Server for UNIX <BR>&nbsp;&nbsp; Application: Alert, Informational, Patches<BR>&nbsp;&nbsp; Publishing Status: Techalert<BR>CommandCentral Availability <BR>&nbsp;&nbsp; Application: Patches<BR>&nbsp;&nbsp; Publishing Status: Techalert<BR>HP-UX <BR>&nbsp;&nbsp; Application: Informational, Patches<BR>Linux <BR>&nbsp;&nbsp; Applications: Information, Patches<BR>Solaris <BR>&nbsp;&nbsp; Application: Informational, Patches
</DIV>
<BR>
<DIV>
<SPAN CLASS=BodySubtitle ID="LANGUAGES">Languages:</SPAN> <BR>
&nbsp;English (US)
</DIV>
<BR>
<DIV>
<SPAN CLASS=BodySubtitle ID="OS">Operating Systems:</SPAN> <BR>
<SPAN>AIX<P CLASS=nopad><SPAN CLASS="justified">4.3.3, 4.3.4, 5.1, 5.2</SPAN><BR><BR>HP-UX<P CLASS=nopad><SPAN CLASS="justified">11.0, 11.11</SPAN><BR><BR>Solaris<P CLASS=nopad><SPAN CLASS="justified">2.6, 7.0, 8.0, 9.0</SPAN><BR><BR>Linux<P CLASS=nopad><SPAN CLASS="justified">RedHat Advanced Server 2.1, RedHat Enterprise Linux 3.0 (AS, ES, WS), RedHat Enterprise Linux 3.0 U2 (AS, ES, WS), SLES 8 SP2/SP2a</SPAN><BR><BR>VMWare ESX<P CLASS=nopad><SPAN CLASS="justified">2.1</SPAN><BR><BR></SPAN>
</DIV>
<HR NOSHADE>
</DIV>
<DIV class="bodytext" ID="FOOTER">
<DIV CLASS=contact><SPAN CLASS=LOGOFOOT><img src='http://seer.support.veritas.com/docs/images/tnlogoV.gif' alt="VERITAS Technical Services Document"><BR></SPAN><SPAN CLASS=ADDRESS STYLE="color:#990000;"><SPAN CLASS=centered><B>VERITAS Software <BR> 350 Ellis Street <BR> Mountain View, California 94043</B><BR>
World Wide Web: <A HREF="http://www.veritas.com" CLASS="link">http://www.veritas.com</A>, <BR>
Tech Support Web: <A HREF="http://support.veritas.com/" CLASS="link">http://support.veritas.com</A>, <BR>
E-Mail Support: <A HREF="http://seer.support.veritas.com/email_forms" CLASS="link">http://seer.support.veritas.com/email_forms</A>, <BR>
FTP: <A HREF="ftp://ftp.support.veritas.com" CLASS="link">ftp://ftp.support.veritas.com</A> or <A HREF="http://ftp.support.veritas.com" CLASS="link">http://ftp.support.veritas.com</A></SPAN></SPAN><A NAME="disclaimer">&nbsp;</A></DIV><BR><DIV CLASS="disclaimer">THE INFORMATION PROVIDED IN THE VERITAS SOFTWARE KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. VERITAS SOFTWARE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL VERITAS SOFTWARE OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,EVEN IF VERITAS SOFTWARE OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.</DIV>
</DIV>
</DIV>
<DIV ID="theLayer" style="position:absolute;width:250;left:700;top:50;visibility:visible">

<table border="0" width="250" bgcolor="Black" cellspacing="0" cellpadding="1">
<tr>
<td width="100%">
<table border="0" width="100%" cellspacing="0" cellpadding="1" height="36" style="background-color: #CC0000;">
<tr>
<td colspan=2 id="titleBar" style="cursor:move" width="100%" align="center">
<ilayer width="100%" onSelectStart="return false">
<layer width="100%" onMouseover="isHot=true;if (isN4) ddN4(theLayer)" onMouseout="isHot=false">
<span class="ModuleHeaderText">Was this article helpful to you?</span>
</layer>
</ilayer>
</td>
</tr>
<tr>
<td width="100%" bgcolor="#FFFFFF" style="padding:4px" class="ModuleText" colspan="2" align="center">
<form action="http://seer.support.veritas.com/email_forms/technotefeedback/SendFeedback.asp" method="get" id="TechNoteFeedback" name="TechNoteFeedback" target="feedback" onSubmit="return SendFeedback(this);">
<!-- Product Code -->
<INPUT TYPE="HIDDEN" NAME="ddProduct" VALUE="CLUSTERSERVER">

<!-- Document ID -->
<INPUT TYPE="HIDDEN" NAME="strDocID" VALUE="271040">

<INPUT TYPE="HIDDEN" NAME="type" VALUE="9">
<span class="ModuleRadioText">
<input type="radio" name="helpState" value="1">Yes&nbsp;&nbsp;
<input type="radio" name="helpState" value="2">No
</span>
<br><br>
If any information was unclear, or the information you were seeking was not provided, please let us know.
Your feedback will help us improve this service.<br>
<textarea name="strBODY" rows="3" cols="40" onClick="CheckCommentField();">(Enter comment here)</textarea><br>
<span style="text-align:left;width:100%;">
<input type="submit" value=" Submit " name="Submit">
<INPUT TYPE=reset>
</span>
</form>
<span class="ModuleTextBold">NOTE:</span> Comments entered here will NOT receive a personal e-mail response. If you need a VERITAS Technical Support representative to respond
to your issue, please <A href="http://seer.support.veritas.com/email_forms/">click here</A> to send us an e-mail.
</td>
</tr>
</table>
</td>
</tr>
</table>

</DIV>
</BODY>
</HTML>
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close