Symantec Messaging Gateway 10.6.x ACE Library Static Link to Vulnerable SSL Version

Messaging Gateway

0 more products

1364

05 March 2020

12 May 2016

CLOSED

MEDIUM

5.3

SUMMARY

 

Symantec Messaging Gateway (SMG) Appliance 10.6.x management console was susceptible to potential unauthorized loss of privileged information due to an inadvertent static link of an updated component library to a version of SSL susceptible to the Heartbleed vulnerability (CVE-2014-0160) .

AFFECTED PRODUCTS

 

Symantec Messaging Gateway Appliance

CVE

Affected Version(s)

Remediation

CVE-2014-0160

10.6.0, 10.6.1

Update to SMG Appliance maintenance patch 10.6.1-3

 

ISSUES

 

CVE-2014-0160

Severity/CVSSv3:

Medium / 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

References:

Impact:

Securityfocus: BID 66690  / NVD: CVE-2014-0160

Static Link to SSL Version Vulnerable to Heartbleed

Description:

Symantec became aware of a recently updated ACE library shipped in SMG 10.6.x that was statically linked inadvertently to a version of SSL susceptible to CVE-2014-0160, Heartbleed vice dynamically linked to the non-vulnerable SSL version in the shipping OS of the Appliance.

 

The susceptible port, is a privileged/protected non-standard port that is not exposed external to the authorized network. This default configuration should restrict exposure to an internal-only malicious user. The affected data channel is used to store email logs for reporting purposes but doesn’t not contain complete email bodies in the logs. However, a non-privileged but authorized user who could successfully exploit this issue, could potential retrieve unauthorized information from these logs for further malicious attempts.

 

MITIGATION

 

Symantec Response 
Symantec product engineers have addressed these issues in SMG Appliance maintenance release 10.6.1-3. Customers should update to the latest maintenance release as soon as possible to address this issue.

 

Symantec is not aware of exploitation or adverse customer impact from this issue.

 

Update Information

Symantec Mail Gateway Appliance maintenance release 10.6.1-3 is available through the software update facility.

 

Best Practices

 

As part of normal best practices, Symantec strongly recommends the following:

 

  • Restrict access to administrative or management systems to authorized privileged users.

  • Restrict remote access, if required, to trusted/authorized systems only.

  • Run under the principle of least privilege where possible to limit the impact of potential exploit.

  • Keep all operating systems and applications current with vendor patches.

  • Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection to both inbound and outbound threats.

  • Deploy network- and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.