Linux Kernel Aug 2017 - Sep 2018 Vulnerabilities

ASG-S200

33 more products

1467

10 January 2022

28 November 2018

OPEN

Critical

9.8

SUMMARY

Symantec Network Protection products that include a vulnerable version of the Linux kernel are susceptible to multiple vulnerabilities.  A remote attacker, with access to the management interface, can obtain unauthorized read/write access to local files, cause denial of service, and possible execute arbitrary code.
 

AFFECTED PRODUCTS

Advanced Secure Gateway (ASG)
CVE Supported Version(s) Remediation
CVE-2018-5390 6.6 Upgrade to later release with fixes.
6.7 Upgrade to 6.7.4.8.
7.1 Upgrade to later release with fixes.
7.2 Not vulnerable, fixed

 

Content Analysis (CA)
CVE Supported Version(s) Remediation
CVE-2018-5391 1.3, 2.1, 2.2, 2.3 Upgrade to later version with fixes.
2.4, 3.0 Not available at this time
3.1 Not vulnerable, fixed in 3.1.0.0.

 

Director
CVE Supported Version(s) Remediation
CVE-2017-18017, CVE-2018-5390,
CVE-2018-5391
6.1 Upgrade to a version of MC with the fixes.

 

Malware Analysis (MA)
CVE Supported Version(s) Remediation
CVE-2018-5390, CVE-2018-5391 4.2 Upgrade to a version of Content Analysis with fixes.

 

Mail Threat Defense (MTD)
CVE Supported Version(s) Remediation
CVE-2018-5391 1.1 Upgrade to a version of CAS and SMG with the fixes.

 

Management Center (MC)
CVE Supported Version(s) Remediation
CVE-2018-5391 2.0 - 2.4 Upgrade to later release with fixes.
3.0 and later Not vulnerable, fixed in 3.0.1.1

 

PacketShaper (PS) S-Series
CVE Supported Version(s) Remediation
CVE-2018-5390, CVE-2018-5391 11.6, 11.9, 11.10 A fix will not be provided. Allot Secure Services Gateway (SSG) is a replacement product for PS S-Series. Switch to a version of SSG with the vulnerability fixes.

 

PolicyCenter (PC) S-Series
CVE Supported Version(s) Remediation
CVE-2018-5390, CVE-2018-5391 1.1 A fix will not be provided. Allot NetXplorer is a replacement product for PC S-Series. Switch to a version of NetXplorer with the vulnerability fixes.

 

ProxySG
CVE Supported Version(s) Remediation
CVE-2018-5390 6.5, 6.6 Upgrade to later release with fixes.  
6.7 Upgrade to 6.7.4.8.
7.1 Upgrade to later release with fixes.
7.2 Not vulnerable, fixed in 7.2.0.1.

 

Reporter
CVE Supported Version(s) Remediation
CVE-2018-5391 9.5 Not vulnerable
10.1, 10.2, 10.3, 10.4 Upgrade to later release with fixes.
10.5 Not vulnerable, fixed in 10.5.1.1.

 

Security Analytics
CVE Supported Version(s) Remediation
CVE-2018-5390, CVE-2018-5391 7.2, 7.3, 8.0 Upgrade to later release with fixes.
8.1 Not vulnerable, fixed in 8.1.1.

 

SSL Visibility (SSLV)
CVE Supported Version(s) Remediation
CVE-2018-5390 3.10, 3.11, 3.12, 5.0 Upgrade to later release with fixes.
4.2, 4.3, 4.4 Not vulnerable
4.5 Not available at this time
5.2 Not vulnerable, fixed in 5.2.1.1.
CVE-2018-5391 3.10, 3.11, 3.12, 4.2, 4.3, 4.4, 5.0 Upgrade to later release with fixes.
4.5 Not available at this time
5.2 Not vulnerable, fixed in 5.2.1.1.

 

X-Series XOS
CVE Supported Version(s) Remediation
CVE-2018-5390, CVE-2018-5391 10.0, 11.0 A fix will not be provided.

 

ADDITIONAL PRODUCT INFORMATION

The following products are not vulnerable:
AuthConnector
BCAAA
CacheFlow
Cloud Data Protection for ServiceNow
Cloud Data Protection for Oracle CRM On Demand
Cloud Data Protection Integration Server
Cloud Data Protection Communication Server

General Auth Connector Login Application
HSM Agent for the Luna SP
IntelligenceCenter
IntelligenceCenter Data Collector

PacketShaper
PolicyCenter
ProxyAV
ProxyAV ConLog and ConLogXP
Unified Agent
Web Isolation
WSS Mobile Agent

ISSUES 

CVE-2017-13715
Severity / CVSSv3 Critical / 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
References SecurityFocus: BID 100517 / NVD: CVE-2017-13715
Impact Denial of service, code execution
Description A flaw in internal state initialization allows a remote attacker to send a crafted MPLS packet and cause denial of source through a system crash, or possibly execute arbitrary code.

 

CVE-2017-1000251
Severity / CVSSv3 High / 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
References SecurityFocus: BID 100809 / NVD: CVE-2017-1000251
Impact Code execution
Description A flaw in L2CAP configuration responses in the native Bluetooth stack allows a remote attacker to send crafted responses and execute arbitrary code.

 

CVE-2017-18017
Severity / CVSSv3 Critical / 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
References SecurityFocus: BID 102367 / NVD: CVE-2017-18017
Impact Denial of service
Description A flaw in TCPMSS firewall target processing allows a remote attacker to send crafted packets and cause denial of service or unspecified other impact.

 

CVE-2018-5390 (SegmentSmack)
Severity / CVSSv3 High / 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
References SecurityFocus: BID 104976 / NVD: CVE-2018-5390
Impact Denial of service
Description A flaw in TCP fragment reassembly allows a remote attacker to send crafted TCP fragments and cause denial of service through CPU exhaustion.

 

CVE-2018-5391 (FragmentSmack)
Severity / CVSSv3 High / 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
References SecurityFocus: BID 105108 / NVD: CVE-2018-5391
Impact Denial of service
Description A flaw in IP fragment reassembly allows a remote attacker to send crafted IP fragments and cause denial of service.

 

CVE-2018-5703
Severity / CVSSv3 Critical / 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
References NVD: CVE-2018-5703
Impact Denial of service
Description A flaw in the TLS implementation allows a remote attacker to send crafted packets and cause a system crash, resulting in denial of service.

 

CVE-2018-1000028
Severity / CVSSv3 High / 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
References NVD: CVE-2018-1000028
Impact Security control bypass
Description A flaw in NFS access control allows a remote attacker to get unauthorized read/write access to local files.

 

CVE-2018-10938
Severity / CVSSv3 Medium / 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
References SecurityFocus: BID 105154 / NVD: CVE-2018-10938
Impact Denial of service
Description A flaw in packet handling allows a remote attacker to send crafted packets and cause denial of service through an infinite loop.

 

CVE-2018-14641
Severity / CVSSv3 Medium / 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
References NVD: CVE-2018-14641
Impact Denial of service
Description A flaw in IP fragment reassembly allows a remote attacker to send crafted IP fragments and cause denial of service.

 

REVISION

2021-07-20 A fix for SSLV 4.4 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2021-07-15 A fix for Security Analytics 7.2 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2021-06-07 A fix for SSLV 3.10, SSLV 3.12, and SSLV 5.0 will not be provided.  Please upgrade to a later version with the vulnerability fixes.  SSLV 5.2 is not vulnerable because a fix is available in 5.2.1.1.
2021-02-18 A fix for CA 2.3 and MC 2.4 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2020-11-30 MC 3.0 is not vulnerable because a fix is available in 3.0.1.1.
2020-11-19 A fix for MTD 1.1 will not be provided.  Please upgrade to a version of CAS and SMG with the vulnerability fixes.  A fix for SA 7.3 and 8.0 will not be provided.  Please upgrade to a later version with the vulnerability fixes.  A fix for XOS 9.7, 10.0, and 11.0 will not be provided.  A fix for Director 6.1 will not be provided.  Please upgrade to a version of MC with the vulnerability fixes.  A fix for Reporter 10.4 will not be provided.  Please upgrade to a later version with the vulnerability fixes. 
2020-11-12 Content Analysis 3.1 is not vulnerable because a fix is available in 3.1.0.0.
2020-08-19 A fix for MC 2.3 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2020-04-30 A fix will not be provided for ProxySG 6.5. Please upgrade to a later version with the vulnerability fixes.
2020-04-08 Content Analysis 3.0 is vulnerable to CVE-2018-5391. Reporter 10.5 is not vulnerable because a fix is available in 10.5.1.1. Security Analytics 8.1 is not vulnerable because a fix is available in 8.1.1. Fixes will not be provided for Management Center 2.2 and Reporter 10.3. Please upgrade to later versions with the vulnerability fixes.
2020-04-04 A fix for PacketShaper S-Series will not be provided. Allot Secure Services Gateway (SSG) is a replacement product for PacketShaper S-Series. Switch to a version of SSG with the vulnerability fixes. A fix for PolicyCenter S-Series will not be provided. Allot NetXplorer is a replacement product for PolicyCenter S-Series. Switch to a version of NetXplorer with the vulnerability fixes.
2020-01-28 A fix will not be provided for ASG 7.1 and ProxySG 7.1.  Please upgrade to a later version with the vulnerability fix.  ASG and ProxySG 7.2 are not vulnerable because fixes are available in 7.2.0.1 EA.
2020-01-19 A fix will not be provided for Malware Analysis.  Please upgrade to a version of Content Analysis with the vulnerability fixes. PacketShaper and ProxyAV are not vulnerable.
2019-10-02 Web Isolation is not vulnerable.
2019-09-05 A fix for MC 2.1 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-30 Reporter 10.4 is vulnerable to CVE-2018-5390 and CVE-2018-5391.
2019-08-19 CA, MTD, MC, Reporter 10.x, and SSLV 4.2-4.4 are not vulnerable to CVE-2018-5390. SSLV 3.12 and 4.5 are vulnerable to CVE-2018-5390 and CVE-2018-5391. CA 2.4 is vulnerable to CVE-2018-5391.
2019-08-13 MC 2.2 and MC 2.3 are vulnerable to CVE-2018-5390 and CVE-2018-5391. A fix for MC 2.0 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-07 A fix for ASG 6.6 and ProxySG 6.6 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-06 A fix for Reporter 10.1 and 10.2 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-06 A fix for SSLV 4.3 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-07-25 It was previously reported that a fix for CVE-2018-5390 in ASG 6.7 is available in 6.7.4.141 EA. Further investigation has shown that ASG 6.7.4.141 EA is still vulnerable. A fix for CVE-2018-5390 in ASG 6.7 and ProxySG 6.7 is available in 6.7.4.8.  ASG and ProxySG are not vulnerable to CVE-2018-5391.
2019-02-04 A fix for CA 1.3 and CA 2.2 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2019-01-18 SSLV 5.0 is vulnerable to CVE-2018-5390 and CVE-2018-5391.  A fix for SSLV 3.11 and 4.2 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2019-01-14 Reporter 10.3 is vulnerable to CVE-2018-5390 and CVE-2018-5391.
2019-01-13 SSLV 3.x and 4.x are vulnerable to CVE-2018-5390 and CVE-2018-5391.  A fix is not available at this time.
2019-01-11 A fix for CA 2.1 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2018-11-28 initial public release