Notification of RSCD Agent security issues in TrueSight Server Automation
Issues
The following RSCD Agent security issues and other low severity issues have been addressed in this hotfix:
Severity | Affected RSCD Agents | Issue |
---|---|---|
High | Windows and UNIX RSCD Agents | Local privilege escalation |
Medium | Windows RSCD Agents | On a Windows domain controller, the BladeLogicRSCDDC user is assigned a default password. |
We recommend that you immediately apply the hotfix as described in this topic.
Resolution
Download the hotfix required for your platform from the Patches tab of the following EPD website page and apply the hotfix. You must provide your BMC Support credentials to access the EPD website. You might also be prompted to complete the Export Compliance form.
EPD Download Link | Item name | File name | md5 checksum | Build number |
---|---|---|---|---|
TSSA 21.3.00 Server Automation [x64] RSCD Agent Hotfix | RSCD_SecurityFixes_21-3_HF_V2.zip | 38b4a3bf3a4515b6c38a50a76b26fceb | 21.3.00.63 |
Applying the hotfix
Depending on your requirements, apply the hotfix as described in the following sections:
- Applying the hotfix to the standalone RSCD Agents
- Applying the hotfix to the RSCD Agents installed on Application Servers and Repeaters
- (Optional) Replacing the existing Patch Downloader utility for Windows
If you haven't already applied Rolling-Update-1-for-version-21-3 and planning to download Windows Server 2022 patches and bulletins, replace the existing Patch Downloader utility with the utility bundled in the hotfix after you update the RSCD Agent.
Applying the hotfix to the standalone RSCD Agents
Upgrade the standalone existing RSCD Agents or install them.
- Upgrading an existing RSCD Agent that is installed on a target server
- Installing (fresh) an RSCD Agent on a target server
Upgrading an existing RSCD Agent that is installed on a target server
Before you begin
Before upgrading an RSCD Agent on Windows domain controllers, ensure that the following prerequisites are met on each domain controller:
- Change the BladeLogicRSCDDC password as per your company's password policies by using the chapw command. For instructions on changing the password, see Changing-the-BladeLogicRSCDDC-account-password-on-domain-controllers.
- Ensure that Administrators do not have the Delete permission on the HKEY_LOCAL_MACHINE\SAM\SAM node in the Windows Registry. By default, Administrators have the Read Control and Write DAC registry access permissions.
To upgrade an existing RSCD Agent that is installed on a target server
Download and extract the RSCD_SecurityFixes_<version>_HF.zip file to a temporary directory.
The extracted directory contains the TSSA<version>-RSCDAgents.zip file.
Extract the TSSA<version>-RSCDAgents.zip file.
The extracted directory contains the RSCD Agent installers (RSCD<version>-<platform>).
- Use one of the following methods to upgrade the RSCD Agent:
- (Method 1) Create and run the Agent Installer Job. For more information, see Creating-an-agent-bundle and Creating-an-Agent-Installer-Job.
(Method 2) Use one of the methods described in the following table:
Method
Reference (Windows)
Reference (Linux/Unix)
Interactive installation
Silent installation
- If any of the Configuration Objects (COs) are missing after upgrade, distribute the COs again. For more information, see Creating-or-modifying-Distribute-Configuration-Objects-Jobs.
Installing (fresh) an RSCD Agent on a target server
Download and extract the RSCD_SecurityFixes_<version>_HF.zip file to a temporary directory.
The extracted directory contains TSSA<version>-RSCDAgents.zip.
Extract the TSSA<version>-RSCDAgents.zip file.
The extracted directory contains the RSCD Agent installers (RSCD<version>-<platform>).
- Use one of the following methods to install the RSCD Agent:
- (Method 1) Create and run the Agent Installer Job. For more information, see Creating-an-agent-bundle and Creating-an-Agent-Installer-Job.
(Method 2) Use one of the methods described in the following table:
Method
Reference (Windows)
Reference (Linux/Unix)
Interactive installation
Installing-the-RSCD-agent-Windows
(Required only when installing the RSCD Agent on a domain controller) During installation, provide password (mandatory) for the BladeLogicRSCDDC user.
Silent installation
Using-silent-mode-to-install-an-RSCD-agent-Windows
(Required only when installing the RSCD Agent on a domain controller) During installation, provide password (mandatory) for the BladeLogicRSCDDC user by using the following command:
msiexec /I RSCD.msi <Existing options> BLADELOGICDCUSERPASSWORD=<password>
Applying the hotfix to the RSCD Agents installed on Application Servers and Repeaters
Depending on the platform, use the instructions described in one of the following tabs:
Download and extract the RSCD_SecurityFixes_<version>_HF.zip file to a temporary directory.
The extracted directory contains TSSA<version>-RSCDAgents.zip file and the Windows_Appserver directory.
- Use one of the following methods to upgrade the RSCD Agent on the Windows Application Server or Windows Repeater:
- (Method 1) Create and run the Agent Installer Job. For more information, see Creating-an-agent-bundle and Creating-an-Agent-Installer-Job.
(Method 2) Use one of the methods described in the following table:
Method
Reference (Windows)
Interactive installation
Silent installation
- If you haven't applied the Rolling Update for version 21.3 already and you want support for Windows Server 2022, do the following steps:
- Copy and extract the /tmp/RSCD_SecurityFixes_<version>_HF /Windows_Appserver/RU2.zip file to temporary directory (for example /tmp1) on the Application Server.
From the RU2 directory, execute the rollingUpdateInstaller.sh script by using the following command in shell terminal:
nsh rollingUpdateInstaller.nshThe following message is displayed when the installation completes successfully and the logs also generated in same location:
#### Rolling Update Completed Successfully ####
Repeat the steps a to c on every Application Server one by one.
- If any of the Configuration Objects (COs) are missing after upgrade, distribute the COs again. For more information, see Creating-or-modifying-Distribute-Configuration-Objects-Jobs.
Download and extract the RSCD_SecurityFixes_<version>_HF.zip file to a temporary directory.
The extracted directory contains TSSA<version>-RSCDAgents.zip file and the Linux_Appserver directory.
- Do the following steps to upgrade the RSCD Agent on an Application Server:
- Copy and extract the /tmp/RSCD_SecurityFixes_<version>_HF/Linux_Appserver/RU2.zip file to temporary directory (for example /tmp1) on the Application Server.
From the RU2 directory, execute the rollingUpdateInstaller.sh script by using the following command in shell terminal:
sh rollingUpdateInstaller.sh
The following message is displayed when the installation completes successfully and the logs also generated in same location.
#### Rolling Update Completed Successfully ####
Repeat the steps a to c on every Application Server one by one.
- If any of the Configuration Objects (COs) are missing after upgrade, distribute the COs again. For more information, see Creating-or-modifying-Distribute-Configuration-Objects-Jobs.
Replacing the Patch Downloader Utility for Microsoft Windows
If you haven't applied Rolling-Update-1-for-version-21-3 and planning to download Windows Server 2022 patches and bulletins, replace the existing utility with the utility bundled in the hotfix after you update the RSCD Agents.
Before you begin
Back up the configuration file that you had prepared for the existing utility.
To replace the existing utility
- Extract RSCD_SecurityFixes_<version>_HF.zip to a temporary directory. The extracted directory contains the following files:
- Windows_Appserver\All-OS-Patch-Downloaders-linux-build-<version>.tar.gz
- Linux_Appserver\All-OS-Patch-Downloaders-windows-build-<version>.zip
- Depending on the platform, extract the compressed files:
- (Windows) Extract the ZIP files using a file compression utility.
- (Linux) Run the following command: tar -xvf All-OS-Patch-Downloaders-<platform>-<build>-<version>.tar.gz
- (Linux only) Grant the permission to modify the extracted files: chmod -R 777 All-OS-Patch-Downloaders-<platform>-<build>-<version>
Depending on the platform, use the instructions in the following topics to set up the utility.
While preparing the configuration file for a platform, use the backed up configuration file as a reference.Platform
Topics
Linux
Windows
Add the following subscription tag in the sample-windows-downloader-config.xml file:
<subscription>
<products>
<include-product>
<product-category>Microsoft Windows Server 2022</product-category>
<product-category-language>English</product-category-language>
</include-product>
</products>
</subscription>-Patch-Downloades-windows-build-21.3.00.zi