SA88 : OpenSSL Security Advisory 08-Jan-2015
SUMMARY
Blue Coat products using affected versions of OpenSSL 1.0.1, 1.0.0, and 0.9.8 are vulnerable to one or more vulnerabilities. A remote attacker may exploit these vulnerabilities to cause a downgrade of the security of the session, a loss of forward secrecy, a crash, or a denial of service due to memory consumption.
AFFECTED PRODUCTS
The following products are vulnerable to one or more of these vulnerabilities:
BCAAA
BCAAA 5.5 and 6.1 are likely vulnerable to CVE-2014-3570, CVE-2014-3572, CVE-2014-8275, and CVE-2015-0204 when configured to use the CoreID or the Novell SSO.
CacheFlow
CacheFlow 3.x prior to 3.4.2.1 are vulnerable to CVE-2014-3570, CVE-2014-8275, and CVE-2015-0204. CacheFlow 2.2 is vulnerable to CVE-2014-8275 and CVE-2015-0204. In 3.4.2.1, both SSL v2, SSL v3, and export grade cipher suites are disabled by default for newly reinitialized systems.
Content Analysis System
CAS 1.1 prior to 1.1.5.6, and 1.2 prior to 1.2.3.1 are vulnerable. CAS 1.3 and later releases are not vulnerable.
Director
Director 6.x prior to 6.1.18.1 is vulnerable to CVE-2014-3570, CVE-2014-8275, and CVE-2015-0204.
IntelligenceCenter
IC 3.2 and 3.3 are vulnerable to all CVEs.
IntelligenceCenter Data Collector
DC 3.2 and 3.3 are vulnerable to all CVEs.
Malware Analysis Appliance
MAA prior to 4.2.2 are vulnerable.
Malware Analyzer G2
All versions of MAG2 are vulnerable.
Management Center
MC 1.x prior to 1.3.2.1 is vulnerable to CVE-2014-3570, CVE-2014-8275, CVE-2015-0205, CVE-2015-0206. MC 1.4 and later releases are not vulnerable.
Norman Shark Industrial Control System Protection
All versions of ICSP 5.x prior to 5.3.2 are vulnerable.
Norman Shark Network Protection
All versions of NNP 5.x prior to 5.3.2 are vulnerable.
Norman Shark SCADA Protection
All versions of NSP 5.x prior to 5.3.2 are vulnerable.
PacketShaper
PacketShaper 9.2 prior to 9.2.11 is vulnerable to CVE-2014-3570, CVE-2014-3572, and CVE-2015-0204.
PacketShaper S-Series
PS S-Series 11.x prior to 11.3.1.2 is vulnerable to CVE-2014-3570 and CVE-2014-8275. PS S-Series 11.4 and later releases are not vulnerable.
PolicyCenter
PolicyCenter 9.2 prior to 9.2.11 is vulnerable to CVE-2014-3570, CVE-2014-3572, and CVE-2015-0204.
ProxyAV
ProxyAV 3.4 prior to 3.4.3.1, and ProxyAV 3.5 prior to 3.5.3.1 are vulnerable to CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, and CVE-2015-0206.
ProxySG
SGOS 5.5.x, 6.2 prior to 6.2.16.3, and 6.5 prior to 6.5.6.2 are vulnerable to CVE-2014-3570, CVE-2014-8275, and CVE-2015-0204. SGOS 6.6 and later releases are not vulnerable.
Reporter
Reporter 9.4 and 9.5 prior to 9.5.3.1 are vulnerable to CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, and CVE-2015-0206. Reporter 10.1 and later releases are not vulnerable.
Security Analytics Platform
SA 6.6 prior to 6.6.11, 7.0, and 7.1 prior to 7.1.7 are vulnerable to CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, and CVE-2015-0204. SA 7.2 and later releases are not vulnerable.
SSL Visibility
SSLV 3.8 prior to 3.8.3, and 3.7 and prior are vulnerable to CVE-2014-3572, CVE-2015-0204, CVE-2014-3570, and CVE-2014-8275. SSLV 3.8.4FC and later versions are not vulnerable.
The following products contain a vulnerable version of OpenSSL, but are not vulnerable to known vectors of attack:
X-Series
XOS 11.0, 10.0, 9.7, 9.6, and 9.5 include versions of OpenSSL that are vulnerable to one or more of the CVEs. The only SSL/TLS enabled service shipped with XOS is an embedded web server and it does not use OpenSSL. Third party applications running on XOS could make use of vulnerable versions of OpenSSL. There are no known third party applications that utilize the OpenSSL implementation in XOS.
Patches
BCAAA
BCAAA 6.1 - a fix will not be provided. CoreID is no longer supported and an updated Novell SDK is not available.
BCAAA 5.5 - a fix will not be provided. CoreID is no longer supported and an updated Novell SDK is not available.
CacheFlow
A fix is available in 3.x to disable SSL v2 and v3 by default and to disable export grade cipher suites for newly reinitialized or installed systems. Customers who cannot reinitialize their system should follow the workarounds to disable SSL v2 and v3 as described in the Workarounds section.
CacheFlow 3.x - a fix is available in 3.4.2.1 for newly reinitialized systems.
CacheFlow 2.2 - a fix will not be provided. Please upgrade to a later release with the vulnerability fix.
Content Analysis System
CAS 1.2 - a fix is available in 1.2.3.1.
CAS 1.1 - a fix is available in 1.1.5.6.
Director
Director 6.1 - a fix is available in 6.1.18.1.
IntelligenceCenter
IC 3.3 - a fix will not be provided. NetDialog NetX is a replacement product for IntelligenceCenter. Please switch to a version of NetX with the vulnerability fixes.
IC 3.2 - a fix will not be provided. Please upgrade to a later release with the vulnerability fix.
IntelligenceCenter Data Collector
DC 3.3 - a fix will not be provided. NetDialog NetX is a replacement product for IntelligenceCenter. Please switch to a version of NetX with the vulnerability fixes.
DC 3.2 - a fix will not be provided. Please upgrade to a later release with the vulnerability fix.
Malware Analysis Appliance
MAA 4.2 - a fix is is available in 4.2.2.
MAA 4.1 - a will not be provided. Please upgrade to a later release with the vulnerability fix.
Malware Analyzer G2
MAG2 4.1 and prior – a patch will not be provided. Please upgrade to a later MAA 4.x release with the vulnerability fix.
Management Center
MC 1.3 - a fix is available in 1.3.2.1.
MC 1.2 and earlier - a fix will not be provided. Please upgrade to a later version with the vulnerability fix.
Norman Shark Industrial Control System Protection
ICSP 5.3 - a fix is available in 5.3.2.
ICSP 5.2 and earlier - a fix will not be provided. Please upgrade to a later version with the vulnerability fix.
Norman Shark Network Protection
NNP 5.3 – a fix is available in 5.3.2.
NNP 5.2 and earlier – a fix will not be provided. Please upgrade to a later version with the vulnerability fix.
Norman Shark SCADA Protection
NSP 5.3 – a fix is available in 5.3.2.
NSP 5.2 and earlier – a fix will not be provided. Please upgrade to a later version with the vulnerability fix.
PacketShaper
PacketShaper 9.2 - a fix is available in 9.2.11.
PacketShaper S-Series
PS S-Series 11.x - a fix is available in 11.3.1.2.
PolicyCenter
PolicyCenter 9.2 - a fix available in 9.2.11.
ProxyAV
ProxyAV 3.5 - a fix is available in 3.5.3.1.
ProxyAV 3.4 - a fix is available in 3.4.3.1.
ProxySG
SGOS 6.5 - a fix is available in 6.5.6.2.
SGOS 6.4 - a fix will not be provided. Please upgrade to the latest SGOS release with the vulnerability fix.
SGOS 6.3 - a fix will not be provided. Please upgrade to the latest SGOS release with the vulnerability fix.
SGOS 6.2 - a fix is available in 6.2.16.3.
SGOS 6.1 - a fix will not be provided. Please upgrade to the latest SGOS release with the vulnerability fix.
SGOS 5.5 - a fix will not be provided. Please upgrade to the latest SGOS release with the vulnerability fix.
Reporter
Reporter 9.5 - a fix is available in 9.5.3.1.
Reporter 9.4 - a fix will not be provided. Please upgrade to a later release with the vulnerability fix.
Security Analytics Platform
SA 7.1 - a fix is available in 7.1.7.
SA 7.0 - a patch RPM to update the version of OpenSSL is available through Blue Coat Support.
SA 6.6 - a fix is available in 6.6.11.
SSL Visibility
SSLV 3.8 - a fix is available in 3.8.3.
SSLV 3.7 and prior - a fix will not be provided. Please upgrade to the latest SSLV release with the vulnerability fix.
X-Series
XOS 11.0 - a fix for CVE-2014-3572, CVE-2015-0205, and CVE-2016-0206 is available in XOS 11.0.1. A fix for CVE-2014-8275 and CVE-2015-0204 is available in XOS 11.0.2. A fix for CVE-2014-3570 and CVE-2014-3571 is not available at this time.
XOS 10.0 and prior - a fix for CVE-2014-3572, CVE-2015-0205, and CVE-2016-0206 is available in XOS 10.0.5. A fix for CVE-2014-8275 and CVE-2015-0204 is available in XOS 10.0.6. A fix for CVE-2014-3570 and CVE-2014-3571 is not available at this time.
XOS 9.7 and prior - a fix will not be provided. Please upgrade to the latest XOS release with the vulnerability fix.
ADDITIONAL PRODUCT INFORMATION
Blue Coat products act as both client and server. Blue Coat hosts services such as WebPulse and licensing services that Blue Coat products may connect with as a client.
Some Blue Coat products that can be installed on a client or on non-Blue Coat hardware use the version of OpenSSL that is already installed. Blue Coat urges our customers to update the versions of OpenSSL that are installed for Reporter on Linux, Unified Agent on Linux, and ProxyClient.
The following products are not vulnerable to any of these vulnerabilities:
Advanced Secure Gateway
Android Mobile Agent
AuthConnector
Client Connector
Cloud Data Protection for Salesforce
Cloud Data Protection for Salesforce Analytics
Cloud Data Protection for ServiceNow
Cloud Data Protection for Oracle CRM On Demand
Cloud Data Protection for Oracle Field Service Cloud
Cloud Data Protection for Oracle Sales Cloud
Cloud Data Protection Integration Server
Cloud Data Protection Communication Server
Cloud Data Protection Policy Builder
General Auth Connector Login Application
K9
Mail Threat Defense
OPIC
PolicyCenter S-Series
ProxyAV ConLog and ConLogXP
ProxyClient
Unified Agent
Web Isolation
Blue Coat no longer provides vulnerability information for the following products:
DLP
Please, contact Digital Guardian technical support regarding vulnerability information for DLP.
ISSUES
Eight vulnerabilities were announced in OpenSSL Security Advisory January 8, 2015.
- CVE-2014-3569 is a flaw in the handshake that allows an attacker to cause a crash in OpenSSL deployments built with the no-ssl3 option by sending an SSL v3 ClientHello.
- CVE-2014-3570 is a flaw in the BN_sqr implementation that may make it easier for an attacker to weaken or bypass cryptographic protection mechanisms.
- CVE-2014-3571 is a flaw in the DTLS implementation that allows an attacker to send specially crafted messages that will cause a segmentation fault due to a NULL pointer dereference.
- CVE-2014-3572 is a flaw in the client implementation that allows an attacking server to downgrade ECDHE to ECDH and bypass the forward secrecy that should be provided by the SSL/TLS session.
- CVE-2014-8275 is a flaw in the implementation of constraints on the encoding of a certificate. This flaw allows an attacker to modify a certificate such that it has a different fingerprint but can still be validated. This allows an attacker to bypass fingerprint-based certificate blacklists.
- CVE-2015-0204 is a flaw in the client implementation that allows an attacking server to provide a much weaker key, thereby decreasing the security of the session.
- CVE-2015-0205 is a flaw in the client certificate verification that allows an attacker to authenticate with a client certificate without proving possession of the associated private key. This flaw only affects servers that accept certificates with Diffie-Hellman keys.
- CVE-2015-0206 is a flaw in the implementation of DTLS that allows an attacker to send specially crafted messages that will cause memory exhaustion and possibly a crash.
MITIGATION
CVE-2015-0204 for CacheFlow can be remediated by diabling SSL v2 and SSL v3, and the export grade cipher suites. Customers with systems that were initialized on versions prior to 3.4.2.1 must manually disabled SSL v2 and SSL v3 as well as export grade cipher suites. The following steps can be used to disable SSL v3 from config mode in CacheFlow 2.x and 3.x:
ssl edit ssl-device-profile default protocol TLSv1 exit exit management-services edit HTTPS-Console attribute ssl-versions TLSv1 exit exit
REFERENCES
OpenSSL Security Advisory - https://www.openssl.org/news/secadv/20150108.txt
REVISION
2020-04-18 Advisory status moved to Closed.
2019-10-02 Web Isolation is not vulnerable.
2019-08-16 Fixes for IntelligenceCenter 3.3 and IntelligenceCenter Data Collector 3.3 will not be provided. NetDialog NetX is a replacement product for IntelligenceCenter. Please switch to a version of NetX with the vulnerability fixes.
2019-01-20 Security Analytics 8.0 is not vulnerable.
2019-01-18 Reporter 9.4 and 9.5 prior to 9.5.3.1 are vulnerable. Reporter 10.1 and later are not vulnerable. IC 3.x and DC 3.x are vulnerable to all CVEs. A fix for Reporter 9.4, IC 3.2, and DC 3.2 will not be provided. Please upgrade to a later release with the vulnerability fix.
2018-04-22 PacketShaper S-Series 11.10 is not vulnerable.
2017-08-02 SSLV 4.1 is not vulnerable.
2017-07-24 PacketShaper S-Series 11.9 is not vulnerable.
2017-07-20 MC 1.10 is not vulnerable.
2017-06-22 Security Analytics 7.3 is not vulnerable.
2017-06-05 PacketShaper S-Series 11.8 is not vulnerable.
2017-05-16 CAS 2.1 is not vulnerable.
2017-03-06 ProxySG 6.7 is not vulnerable. SSLV 4.0 is not vulnerable. MC 1.8 is not vulnerable. PacketShaper S-Series 11.7 is not vulnerable. Vulnerability inquiries for DLP should be addressed to Digital Guardian technical support.
2016-12-04 SSLV 3.11 is not vulnerable.
2016-11-17 Cloud Data Protection for Oracle Field Service Cloud is not vulnerable.
2016-11-14 MC 1.6 and 1.7 are not vulnerable.
2016-11-11 SSLV 3.10 is not vulnerable.
2016-09-15 Advanced Secure Gateway is not vulnerable.
2016-08-11 Security Analytics 7.2 is not vulnerable.
2016-07-17 SGOS 6.6 is not vulnerable.
2016-07-15 Fixes for CVE-2014-3572, CVE-2015-0205, and CVE-2016-0206 are available in XOS 10.0.5 and 11.0.1. Fixes for CVE-2014-8275 and CVE-2015-0204 are available in XOS 10.0.6 and 11.0.2.
2016-07-15 SSLV 3.8.4FC and 3.9 are not vulnerable.
2016-06-30 PacketShaper S-Series 11.6 is not vulnerable.
2016-06-27 A fix for PacketShaper S-Series 11.x is available in 11.3.1.2. PacketShaper S-Series 11.4 and 11.5 are not vulnerable.
2016-06-16 XOS 11.0 has a vulnerable version of OpenSSL, but is not vulnerable to known vectors of attack. A fix is not available at this time.
2016-05-26 IntelligenceCenter is not vulnerable.
2016-05-24 PolicyCenter S-Series is not vulnerable.
2016-05-21 MC 1.4 and 1.5 are not vulnerable. General Auth Connector Login Application and K9 are not vulnerable.
2016-05-20 CAS 1.2 is not vulnerable.
2016-05-11 No Cloud Data Protection products are vulnerable.
2016-04-23 Mail Threat Defense is not vulnerable.
2015-12-02 All fixes are available for Security Analytics
2015-10-02 Fixes are available for ProxyAV 3.4 and 3.5; updated link to OpenSSL security advisory
2015-10-01 Fix is available in ProxySG 6.2; fix is available in SSLV 3.8
2015-09-30 Fix is available for CAS 1.1
2015-07-26 Fixes are available for CacheFlow, PacketShaper, and PolicyCenter
2015-06-08 Fix is available for Director
2015-03-12 BCAAA is vulnerable and no fixes can be provided; PacketShaper and PolicyCenter are vulnerable
2015-03-10 Fix is available for SGOS 6.5, a fix will not be provided for 5.5
2015-03-05 PacketShaper and PolicyCenter are under investigation
2015-03-04 Earlier versions of MC are vulnerable but will not be fixed
2015-03-03 Norman Shark products are no longer under investigation; ProxyAV ConLog and ConLogXP are not vulnerable; fix is available for MC 1.3
2015-03-02 Director is vulnerable to CVE-2015-0204 but not CVE-2014-3572.
2015-02-20 Norman Shark products are vulnerable and fixes are available.
2015-02-19 PacketShaper S-Series 11.x is vulnerable
2015-02-17 Android Mobile Agent, Client Connector, OPIC, ProxyClient, and Unified Agent are not vulnerable
2015-02-12 MAA is vulnerable and a fix is available
2015-02-12 Initial public release