===========================================================================
             AUSCERT External Security Bulletin Redistribution             
                                                                           
                               ESB-2024.1867                               
  SVD-2024-0303: Third-Party Package Updates in Splunk Enterprise - March  
                                   2024                                    
                               28 March 2024                               
                                                                           
===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Splunk Enterprise                                       
Publisher:         Splunk                                                  
Operating System:  UNIX                                                    
                   Windows                                                 
Resolution:        Patch/Upgrade                                           
CVE Names:         CVE-2021-32559 CVE-2023-39325 CVE-2023-5678             
                   CVE-2024-0727                                           

Original Bulletin:
   https://advisory.splunk.com//advisories/SVD-2024-0303

Comment: CVSS (Max):  7.5 CVE-2023-39325 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
         CVSS Source: NIST                                                 
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H


- --------------------------BEGIN INCLUDED TEXT--------------------

Third-Party Package Updates in Splunk Enterprise - March 2024

Advisory ID: SVD-2024-0303

CVE ID: Multiple

Published: 2024-03-27

Last Update: 2024-03-27

Description

Splunk remedied common vulnerabilities and exposures (CVEs) in Third Party
Packages in Splunk Enterprise versions 9.2.1, 9.1.4, 9.0.9 and higher,
including the following:

    Package               Remediation                    CVE           Severity
Openssl          Upgraded to 1.0.2zj           CVE-2024-0727,          Low
                                               CVE-2023-5678
net, go [1 ]     Upgraded to 0.2.0             CVE-2023-39325          High
go [2 ]          Upgraded from 1.20.10 to      multiple                See
                 1.21.5                                                vendor
hive-exec        Upgraded from 3.1.3 to        multiple                See
                 4.0.0-beta-1                                          vendor
curl [3 ]        Upgraded from 8.0.1 to 8.5.0  multiple                See
                                                                       vendor
pywin32          Upgraded to b306              CVE-2021-32559          Medium
jackson-databind Upgraded from 2.9.10 to       multiple                See
[4 ]             2.13.5                                                vendor

[ 1 ] Upgraded in Splunk Assist

[ 2 ] Upgraded in Splunk Assist

[ 3 ] Splunk Enterprise is not affected by CVE-2023-38545

[ 4 ] Removed jackson-databind-2.9.10 nested within $SPLUNK_HOME/bin/jars/
thirdparty/common/parquet-hive-bundle-1.11.2.jar and added
jackson-databind-2.13.5 under $SPLUNK_HOME/bin/jars/common

Solution

Upgrade Splunk Enterprise to versions 9.2.1, 9.1.4, and 9.0.9, or higher.

Product Status

     Product      Version Component Affected Version Fix Version
Splunk Enterprise 9.2               9.2.0 to 9.2.0.1 9.2.1
Splunk Enterprise 9.1               9.1.0 to 9.1.3   9.1.4
Splunk Enterprise 9.0               9.0.0 to 9.0.8   9.0.9

Severity

For the CVEs in this list, Splunk adopted the vendor's severity rating, when
available, or the national vulnerability database (NVD) common vulnerability
scoring system (CVSS) rating, otherwise.

- --------------------------END INCLUDED TEXT----------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================