Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2017.0218 McAfee Security Bulletin - OpenSSL update for vulnerabilities CVE-2017-3735 and CVE-2017-3736 22 December 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: McAfee Products Operating System: Virtualisation Network Appliance Windows UNIX variants (UNIX, Linux, OSX) Resolution: Patch/Upgrade CVE Names: CVE-2017-3736 CVE-2017-3735 Member content until: Sunday, January 21 2018 Reference: ASB-2017.0202 ESB-2017.3218 ESB-2017.3217 ESB-2017.3215.3 ESB-2017.3120 ESB-2017.3100 OVERVIEW It has been discovered that several well known OpenSSL vulnerabilities affect numerous McAfee products. [1] The vendor advises the following product's status with respect to the vulnerabilities: "Vulnerable and Updated DXL Broker 4.0.0 NSP Sensor 8.x, 9.x SIEM 9.6.x, 10.x TIE Server 1.x, 2.x Vulnerable and Not Yet Updated Advanced Threat Defense (ATD) 3.6, 3.8, 3.10, 4.0 McAfee Active Response (MAR) 2.x McAfee Email Gateway (MEG) 7.x McAfee Web Gateway (MWG) 7.7.2.x, 7.8.0.x Network Data Loss Prevention (NDLP) 9.3.x SaaS Email Protection and Continuity (SaaS Email) VirusScan Enterprise for Linux (VSEL) 1.x, 2.x Not Vulnerable ePolicy Orchestrator (ePO) 5.x VirusScan Enterprise (VSE) for Windows 8.8"[1] IMPACT The vendor has provided the following details regarding the vulnerabilities: "CVE-2017-3735 While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g. https://nvd.nist.gov/vuln/detail/CVE-2017-3735 CVE-2017-3736 There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2, and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen. https://nvd.nist.gov/vuln/detail/CVE-2017-3736 Workaround TIE Server: CVE-2017-3736: You can restrict the allowed cipher suites by customizing the ssl_ciphers property in /data/tieserver_pg/postgresql.conf. Then, run these commands to apply the changes: # service tieserver stop # service tieserver start Follow the steps in KB90067 to upgrade to the OpenSSL 1.0.2m library in TIE Server. Mitigations None. "[1] MITIGATION The vendor recommends users of known vulnerable McAfee products to review their product and apply any patches as appropriate: "Go to the McAfee Downloads site and download the applicable product patch/hotfix file". [1] REFERENCES [1] McAfee Security Bulletin - OpenSSL update for vulnerabilities CVE-2017-3735 and CVE-2017-3736 https://kc.mcafee.com/corporate/index?page=content&id=SB10220 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWjxscox+lLeg9Ub1AQj9tg//cdEWxmoJDB9HdUYKrZzameyxLZNJ4qLQ 609f5u3vZ5IzrGrIDjeefnOXRGIyLZIEJ0swQpXRzympEKVatr7xQF37VO/QrJcp D8XeEIha9OVRU9igE1zRKKoMmOqAxB3L3pXXns6ffUPOh3yH7NiAHhk08IRgS8YT OyywF6ksAviyC2Kl3Mmonm4PVOkbQDLM9sGeyQIBgKjcca+VxmmTVAejuMXS4nq2 yoZECvtiv+uT/NEiTG4WxNeXOwUB8amiK7NyiDUA8k/dhb4bU/pJ6SPq5mVlM/mc x45s6703vXJvBdMGhNPnsIWak3DS2xHemiWgansxV3Hd8N44lP6wH9eD4fJVoOm4 Zn5uxUmzUdTgmde5cg3NsGgTUJzpGBWPizPSSRFbY+JI4m/iDXU2RDZKzM+ztn1C NAZTQdc4vejmft8FklXeV1XmW/VaKgrY6/dEQOc5WhF90bxolIXdW9ulLS5UJAwc TmNjtwkaoOoZAgRv5bUaMPz+4jHwlnMwMDTqmpfYZbjaDykXV+OyRwskAyNrLhKH sntnQYgVmJ3kFLgtX8TsRiluSb2gmAio3e+7JLxIrbH/kc+sOhpVvOH+SrA2iZz+ CQ7thTPTrQ4gOAwoPXk+KOP6ptysWjDiW+9nxqKJEz9cTvqY1kLyIjiOQ6xVByi5 HS/9bl3ayZw= =cwVQ -----END PGP SIGNATURE-----