Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.0987 NAM and OpenSSL SSL/TLS MITM vulnerability (CVE-2014-0224) 16 June 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: NetIQ Access Manager NetIQ Access Gateway NetIQ Identity Server NetIQ SSLVPN server NetIQ Admininstration Console Server Publisher: Novell Operating System: SUSE Red Hat Windows Impact/Access: Access Privileged Data -- Remote/Unauthenticated Provide Misleading Information -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-0224 Reference: ASB-2014.0071 ASB-2014.0069.2 ESB-2014.0889 ESB-2014.0888 ESB-2014.0887 Original Bulletin: http://www.novell.com/support/kb/doc.php?id=7015158 - --------------------------BEGIN INCLUDED TEXT-------------------- NAM and OpenSSL SSL/TLS MITM vulnerability (CVE-2014-0224) Document ID: 7015158 Creation Date: 09-JUN-14 Modified Date: 13-JUN-14 NetIQAccess Manager (NAM) This document (7015158) is provided subject to the disclaimer at the end of this document. Environment NetIQ Access Manager 3.2 NetIQ Access Manager 4.0 NetIQ Access Gateway NetIQ Identity Server NetIQ SSLVPN server NetIQ Admininstration Console Server Situation All of the NAM components with the exception of the Access Gateway are not impacted by the version of openssl shipping with the Operating System (SLES, RHEL or Windows). These non-AG components (AC and IDP ) are tomcat based and do not use OpenSSL at all. All these above operating systems have been patched and it is recommended that the NAM hosts be updated with the patched openssl versions as a best practice anyway. With the Access Gateway the dependency on openssl depends on the type of platform you are running on, as well as whether or not the appliance or service is running. The following list acknowledges whether or not the issue exist, and how one can mitigate it: 1) Access Gateway Service (AGS) AGS on SLES: Uses OpenSSL that comes with the base OS; SUSE updates will patch the vulnerability AGS on RHEL: NAM includes OpenSSL 0.9.8 libraries. Needs to be patched through a NAM hotfix which will be available in NAM 4.0.1 HF1, and 3.2 SP3. AGS on Windows: NAM includes OpenSSL 0.9.8 libraries. Needs to be patched through a NAM hotfix which will be available in NAM 4.0.1 HF1, and 3.2 SP3. 2) Access Gateway and Access Manager Appliance 3.2: NAM ships with openssl 0.98r. This needs to be updated via the NAM security update channel 4.0: NAM uses the openssl that ships with the OS. This needs to be updated via the NAM security update channel. 3) OpenSSL 1.0.1g based AG (only available with NAM 4.0 HF1 and newer). For those customers that have manually copied over the openssl files shipping with NAM 4.0 FH1 and greater, both the AG appliance and service are vulnerable and need to be updated to openssl 1.0.1h. This will be available in the upcoming 4.0.1 HF1 hotfix. Additional Information For Access Manager 3.1.5 to be exploited by the CVE-2014-0224 OpenSSL Vulnerability: the network must be compromised - an attacker needs access to snoop SSL traffic the client and server must BOTH be running susceptible version of OpenSSL for the vulnerability to be exploited the NAM 3.1.5 LAG in server mode is NOT susceptible - when processing SSL requests from browsers the NAM 3.1.5 LAG in client mode IS susceptible - when proxying requests to SSL Web servers To mitigate the vulnerability when NAM 3.1.5 is in client mode, make sure that all back end SSL enabled Web servers have OpenSSL patches installed at the OS level. With this configuration both client and server are not running a susceptible version and the SSL connection cannot be exploited by this vulnerability. The other 3.1.5 components (IDP and Admin Console) should upgrade openssl on the underlying OS to an unaffected version. Disclaimer This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU55cCRLndAQH1ShLAQLUixAArO3AZAM0PD1vkkEGgS5iht+w3e40J7UU GWTMTNM0ean9pFbFeUsA3pCnGUaMakoLOS5TYcHPZdaXTKEN7xAc77Hohf6XigZb BFNyJt44JFdl180zkap9o+CMpSAn5zvTYsnTScnpshSRyER0WBDgVb6IaNKB4UPe RcOSXFAPvrAOZZ35S/4qB03yY4NMakr5z5ppsywAxIZmVKr444wbeyP5O5VjQVkM 9IjfdGtt6Ratihq9VfrgQBDHm6QHmnsnzAzElcdtZb7j0A9ecz6CSoylRH2jFPZT rD3MrHg/W96DYygdMb/M+JZBt+3uL8QrEzR/FebaHhUqyA6bdWsuyNdEp+3eYwsI n7kJmYZm7i3pP2NCVbBkie2q2ZARTJd4sRSZ/+XBU5bS00LLdJssEfRK+T+cdBsE XFy3meIQ8y8yR9jw1KExMaqn2pDgkInxslnb941YYUgA1HY/M1TXI8qcfJp4cqJm XqYINwcP6AyeT586zk2A/Sl4HSsy8But4uyVM/Hc10l+Mw++IK9mkVyrvD9Hpl8q fMSfYhWVUoU34B8MNKBbvXenSRX0MO7ELNVQLmFIzyxsgyp+OTMj2v/K3vTUqgzt fyNcEF3pylFOurAvux0J0Ir06wkbAHc0q8Cg3rUbyK/Qgd56fHXqKy1nyoNLewhB YkwUseNhAmM= =tkRl -----END PGP SIGNATURE-----