copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.0987 - [Win][RedHat][SUSE] NetIQ products: Multiple vulnerabilities

Date: 16 June 2014
References: ESB-2014.0887  ESB-2014.0888  ESB-2014.0889  ASB-2014.0069.2  ASB-2014.0071  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0987
        NAM and OpenSSL SSL/TLS MITM vulnerability (CVE-2014-0224)
                               16 June 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           NetIQ Access Manager
                   NetIQ Access Gateway
                   NetIQ Identity Server
                   NetIQ SSLVPN server
                   NetIQ Admininstration Console Server
Publisher:         Novell
Operating System:  SUSE
                   Red Hat
                   Windows
Impact/Access:     Access Privileged Data         -- Remote/Unauthenticated
                   Provide Misleading Information -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0224  

Reference:         ASB-2014.0071
                   ASB-2014.0069.2
                   ESB-2014.0889
                   ESB-2014.0888
                   ESB-2014.0887

Original Bulletin: 
   http://www.novell.com/support/kb/doc.php?id=7015158

- --------------------------BEGIN INCLUDED TEXT--------------------

NAM and OpenSSL SSL/TLS MITM vulnerability (CVE-2014-0224)

Document ID:	7015158 
Creation Date:	09-JUN-14
Modified Date:	13-JUN-14 
NetIQAccess Manager (NAM)

This document (7015158) is provided subject to the disclaimer at the end of 
this document.

Environment

NetIQ Access Manager 3.2

NetIQ Access Manager 4.0

NetIQ Access Gateway

NetIQ Identity Server

NetIQ SSLVPN server

NetIQ Admininstration Console Server

Situation

All of the NAM components with the exception of the Access Gateway are not 
impacted by the version of openssl shipping with the Operating System (SLES, 
RHEL or Windows). These non-AG components (AC and IDP ) are tomcat based and 
do not use OpenSSL at all. All these above operating systems have been patched
and it is recommended that the NAM hosts be updated with the patched openssl 
versions as a best practice anyway.

With the Access Gateway the dependency on openssl depends on the type of 
platform you are running on, as well as whether or not the appliance or 
service is running. The following list acknowledges whether or not the issue 
exist, and how one can mitigate it:

1) Access Gateway Service (AGS)

AGS on SLES: Uses OpenSSL that comes with the base OS; SUSE updates will patch
the vulnerability

AGS on RHEL: NAM includes OpenSSL 0.9.8 libraries. Needs to be patched through
a NAM hotfix which will be available in NAM 4.0.1 HF1, and 3.2 SP3.

AGS on Windows: NAM includes OpenSSL 0.9.8 libraries. Needs to be patched 
through a NAM hotfix which will be available in NAM 4.0.1 HF1, and 3.2 SP3.

2) Access Gateway and Access Manager Appliance

3.2: NAM ships with openssl 0.98r. This needs to be updated via the NAM 
security update channel

4.0: NAM uses the openssl that ships with the OS. This needs to be updated via
the NAM security update channel.

3) OpenSSL 1.0.1g based AG (only available with NAM 4.0 HF1 and newer). For 
those customers that have manually copied over the openssl files shipping with
NAM 4.0 FH1 and greater, both the AG appliance and service are vulnerable and
need to be updated to openssl 1.0.1h. This will be available in the upcoming 
4.0.1 HF1 hotfix.

Additional Information

    For Access Manager 3.1.5 to be exploited by the CVE-2014-0224 OpenSSL 
Vulnerability:

    the network must be compromised - an attacker needs access to snoop SSL 
traffic

    the client and server must BOTH be running susceptible version of OpenSSL
for the vulnerability to be exploited

    the NAM 3.1.5 LAG in server mode is NOT susceptible - when processing SSL
requests from browsers

    the NAM 3.1.5 LAG in client mode IS susceptible - when proxying requests 
to SSL Web servers

To mitigate the vulnerability when NAM 3.1.5 is in client mode, make sure that
all back end SSL enabled Web servers have OpenSSL patches installed at the OS
level. With this configuration both client and server are not running a 
susceptible version and the SSL connection cannot be exploited by this 
vulnerability. The other 3.1.5 components (IDP and Admin Console) should 
upgrade openssl on the underlying OS to an unaffected version.

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE 
customers and parties interested in our products and solutions to acquire 
information, ideas and learn from one another. Materials are provided for 
informational, personal or non-commercial use within your organization and are
presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=tkRl
-----END PGP SIGNATURE-----