copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
Search this site

On this site

 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login


ESB-2014.0987 - [Win][RedHat][SUSE] NetIQ products: Multiple vulnerabilities

Date: 16 June 2014
References: ESB-2014.0887  ESB-2014.0888  ESB-2014.0889  ASB-2014.0069.2  ASB-2014.0071  

Click here for printable version
Click here for PGP verifiable version
Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

        NAM and OpenSSL SSL/TLS MITM vulnerability (CVE-2014-0224)
                               16 June 2014


        AusCERT Security Bulletin Summary

Product:           NetIQ Access Manager
                   NetIQ Access Gateway
                   NetIQ Identity Server
                   NetIQ SSLVPN server
                   NetIQ Admininstration Console Server
Publisher:         Novell
Operating System:  SUSE
                   Red Hat
Impact/Access:     Access Privileged Data         -- Remote/Unauthenticated
                   Provide Misleading Information -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0224  

Reference:         ASB-2014.0071

Original Bulletin:

- --------------------------BEGIN INCLUDED TEXT--------------------

NAM and OpenSSL SSL/TLS MITM vulnerability (CVE-2014-0224)

Document ID:	7015158 
Creation Date:	09-JUN-14
Modified Date:	13-JUN-14 
NetIQAccess Manager (NAM)

This document (7015158) is provided subject to the disclaimer at the end of 
this document.


NetIQ Access Manager 3.2

NetIQ Access Manager 4.0

NetIQ Access Gateway

NetIQ Identity Server

NetIQ SSLVPN server

NetIQ Admininstration Console Server


All of the NAM components with the exception of the Access Gateway are not 
impacted by the version of openssl shipping with the Operating System (SLES, 
RHEL or Windows). These non-AG components (AC and IDP ) are tomcat based and 
do not use OpenSSL at all. All these above operating systems have been patched
and it is recommended that the NAM hosts be updated with the patched openssl 
versions as a best practice anyway.

With the Access Gateway the dependency on openssl depends on the type of 
platform you are running on, as well as whether or not the appliance or 
service is running. The following list acknowledges whether or not the issue 
exist, and how one can mitigate it:

1) Access Gateway Service (AGS)

AGS on SLES: Uses OpenSSL that comes with the base OS; SUSE updates will patch
the vulnerability

AGS on RHEL: NAM includes OpenSSL 0.9.8 libraries. Needs to be patched through
a NAM hotfix which will be available in NAM 4.0.1 HF1, and 3.2 SP3.

AGS on Windows: NAM includes OpenSSL 0.9.8 libraries. Needs to be patched 
through a NAM hotfix which will be available in NAM 4.0.1 HF1, and 3.2 SP3.

2) Access Gateway and Access Manager Appliance

3.2: NAM ships with openssl 0.98r. This needs to be updated via the NAM 
security update channel

4.0: NAM uses the openssl that ships with the OS. This needs to be updated via
the NAM security update channel.

3) OpenSSL 1.0.1g based AG (only available with NAM 4.0 HF1 and newer). For 
those customers that have manually copied over the openssl files shipping with
NAM 4.0 FH1 and greater, both the AG appliance and service are vulnerable and
need to be updated to openssl 1.0.1h. This will be available in the upcoming 
4.0.1 HF1 hotfix.

Additional Information

    For Access Manager 3.1.5 to be exploited by the CVE-2014-0224 OpenSSL 

    the network must be compromised - an attacker needs access to snoop SSL 

    the client and server must BOTH be running susceptible version of OpenSSL
for the vulnerability to be exploited

    the NAM 3.1.5 LAG in server mode is NOT susceptible - when processing SSL
requests from browsers

    the NAM 3.1.5 LAG in client mode IS susceptible - when proxying requests 
to SSL Web servers

To mitigate the vulnerability when NAM 3.1.5 is in client mode, make sure that
all back end SSL enabled Web servers have OpenSSL patches installed at the OS
level. With this configuration both client and server are not running a 
susceptible version and the SSL connection cannot be exploited by this 
vulnerability. The other 3.1.5 components (IDP and Admin Console) should 
upgrade openssl on the underlying OS to an unaffected version.


This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE 
customers and parties interested in our products and solutions to acquire 
information, ideas and learn from one another. Materials are provided for 
informational, personal or non-commercial use within your organization and are

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email:
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.