-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0962
        AIX OpenSSL SSL/TLS Man In The Middle (MITM) vulnerability
                               12 June 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM AIX OpenSSL
Publisher:         IBM
Operating System:  AIX
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-3470 CVE-2014-0224 CVE-2014-0221
                   CVE-2014-0198 CVE-2014-0195 

Reference:         ASB-2014.0069.2
                   ASB-2014.0068
                   ESB-2014.0952
                   ESB-2014.0951
                   ESB-2014.0888
                   ESB-2014.0887
                   ESB-2014.0755
                   ESB-2014.0751

Original Bulletin: 
   https://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM SECURITY ADVISORY

First Issued: Wed Jun 11 06:39:27 CDT 2014

The most recent version of this document is available here:

http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
https://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
ftp://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
===============================================================================
                           VULNERABILITY SUMMARY

1.VULNERABILITY:   AIX OpenSSL SSL/TLS Man In The Middle (MITM) vulnerability

    PLATFORMS:       AIX 5.3, 6.1 and 7.1
                     VIOS 2.2.*

    SOLUTION:        Apply the fix as described below.

    THREAT:          See below

    CVE Numbers:     CVE-2014-0224

    Reboot required?    NO
    Workarounds?        NO
    Protected by FPM?   NO
    Protected by SED?   NO

2. VULNERABILITY:   AIX OpenSSL DTLS recursion flaw

    PLATFORMS:       AIX 5.3, 6.1 and 7.1
                     VIOS 2.2.*

    SOLUTION:        Apply the fix as described below.

    THREAT:          See below

    CVE Numbers:     CVE-2014-0221

    Reboot required?    NO
    Workarounds?        NO
    Protected by FPM?   NO
    Protected by SED?   NO
3. VULNERABILITY:   AIX OpenSSL DTLS invalid fragment vulnerability

    PLATFORMS:       AIX 5.3, 6.1 and 7.1
                     VIOS 2.2.*

    SOLUTION:        Apply the fix as described below.

    THREAT:          See below

    CVE Numbers:     CVE-2014-0195

    Reboot required?    NO
    Workarounds?        NO
    Protected by FPM?   NO
    Protected by SED?   NO

4. VULNERABILITY:   AIX OpenSSL SSL_MODE_RELEASE_BUFFERS NULL pointer
dereference

    PLATFORMS:       AIX 5.3, 6.1 and 7.1
                     VIOS 2.2.*

    SOLUTION:        Apply the fix as described below.

    THREAT:          See below

    CVE Numbers:     CVE-2014-0198

    Reboot required?    NO
    Workarounds?        NO
    Protected by FPM?   NO
    Protected by SED?   NO

5. VULNERABILITY:   AIX OpenSSL Anonymous ECDH denial of service

    PLATFORMS:       AIX 5.3, 6.1 and 7.1
                     VIOS 2.2.*

    SOLUTION:        Apply the fix as described below.

    THREAT:          See below

    CVE Numbers:     CVE-2014-3470

    Reboot required?    NO
    Workarounds?        NO
    Protected by FPM?   NO
    Protected by SED?   NO

===============================================================================
                           DETAILED INFORMATION

I. DESCRIPTION

    1. CVE-2014-0224
    OpenSSL could allow a Man-in-the-middle(MITM) attacker to force the use of
    weak keying material in OpenSSL SSL/TLS clients and servers. The attacker
    can decrypt and modify traffic from the attacked client and server. The
    attack can only be performed between a vulnerable client *and* server.

    2. CVE-2014-0221
    OpenSSL could allow an attacker to cause Denial of Service information.
    The attacker can send a invalid DTLS handshake to an OpenSSL DTLS client,
    resulting recursive execution of code and eventual crash.

    3. CVE-2014-0195
    OpenSSL could allow an attacker to cause a "buffer overrun" situation. This
    is triggered when an attacker sends an invalid DTLS fragments to an OpenSSL
    DTLS client or server, and thus forcing it to run arbitrary code on a
    vulnerable client or server.

    4. CVE-2014-0198
    OpenSSL could allow an attacker to cause Denial of Service information.
    The attacker will be able to exploit the flaw in the do_ssl3_write function
    via a NULL pointer dereference.

    5. CVE-2014-3470
    OpenSSL could allow an attacker to cause Denial of Service information.
    The attacker will be able to exploit the software's anonymous ECDH cipher
    suites present within OpenSSL clients.

II. CVSS

    1. CVE-2014-0224
    CVSS Base Score: 5.8
    CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/93586
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N)

    2. CVE-2014-0221
    CVSS Base Score: 4.3
    CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/93587
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N)

    3. CVE-2014-0195
    CVSS Base Score: 7.5
    CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/93588
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N)

    4. CVE-2014-0198
    CVSS Base Score: 4.3
    CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/93000
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N)

    5. CVE-2014-3470
    CVSS Base Score: 4.3
    CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/93589
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N)


III. PLATFORM VULNERABILITY ASSESSMENT

        To determine if your system is vulnerable, execute the following
        command:

        lslpp -L openssl.base

        The following fileset levels are vulnerable:

    A. CVE-2014-0198

        AIX Fileset      Lower Level  Upper Level   KEY
        --------------------------------------------------------
        openssl.base     1.0.1.500    1.0.1.510    key_w_fs

    B. CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-3470

        AIX Fileset      Lower Level  Upper Level   KEY
        --------------------------------------------------------
        openssl.base     1.0.1.500     1.0.1.510      key_w_fs
        openssl.base     0.9.8.401     0.9.8.2501     key_w_fs
        openssl.base     12.9.8.1100   12.9.8.2501    key_w_fs

IV. SOLUTIONS

    A fix is available, and it can be downloaded from:

    https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp

    To extract the fixes from the tar file:

    For Openssl 1.0.1 version -
        zcat openssl-1.0.1.511.tar.Z | tar xvf -
    For Openssl 0.9.8 version -
        zcat openssl-0.9.8.2502.tar.Z | tar xvf -
    For Openssl 12.9.8 version -
        zcat openssl-12.9.8.2502.tar.Z | tar xvf -

    IMPORTANT: If possible, it is recommended that a mksysb backup
    of the system be created.  Verify it is both bootable and
    readable before proceeding.

    To preview the fix installation:

    installp -apYd . openssl

    To install the fix package:

    installp -aXYd . openssl


V. WORKAROUNDS

    No workarounds.

VI. CONTACT INFORMATION

    If you would like to receive AIX Security Advisories via email,
    please visit:

        http://www.ibm.com/systems/support

    and click on the "My notifications" link.

    To view previously issued advisories, please visit:

        http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq

    Comments regarding the content of this announcement can be
    directed to:

        security-alert@austin.ibm.com

    To obtain the OpenSSL public key that can be used to verify the
    signed advisories and ifixes:

        Download the key from our web page:

       
http://www.ibm.com/systems/resources/systems_p_os_aix_security_pgpkey.txt

    To obtain the PGP public key that can be used to communicate
    securely with the AIX Security Team you can either:

        A. Send an email with "get key" in the subject line to:

            security-alert@austin.ibm.com

        B. Download the key from a PGP Public Key Server. The key ID is:

            0x28BFAA12

    Please contact your local IBM AIX support center for any
    assistance.

VII. REFERENCES:

    Note: Keywords labeled as KEY in this document are used for parsing
purposes.

    eServer is a trademark of International Business Machines
    Corporation.  IBM, AIX and pSeries are registered trademarks of
    International Business Machines Corporation.  All other trademarks
    are property of their respective holders.

    Complete CVSS Guide: http://www.first.org/cvss/cvss-guide.html
    On-line Calculator V2:
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2
    X-Force Vulnerability Database: http://xforce.iss.net/xforce/xfdb/93586
    X-Force Vulnerability Database: http://xforce.iss.net/xforce/xfdb/93587
    X-Force Vulnerability Database: http://xforce.iss.net/xforce/xfdb/93588
    X-Force Vulnerability Database: http://xforce.iss.net/xforce/xfdb/93000
    X-Force Vulnerability Database: http://xforce.iss.net/xforce/xfdb/93589
    CVE-2014-0224 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
    CVE-2014-0221 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
    CVE-2014-0195 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
    CVE-2014-0198 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
    CVE-2014-3470 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470

    *The CVSS Environment Score is customer environment specific and will
    ultimately impact the Overall CVSS Score. Customers can evaluate the
    impact of this vulnerability in their environments by accessing the links
    in the Reference section of this Flash.

    Note: According to the Forum of Incident Response and Security Teams
    (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry
    open standard designed to convey vulnerability severity and help to
    determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES
    "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF
    MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE
    RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY
    VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=+mrI
-----END PGP SIGNATURE-----