OpenSSL vulnerability [CVE-2014-3567]
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2014-003 | CVE-2014-3567 | 10/16/2014 | medium | v1 |
Vulnerability details
A memory leak allows remote attackers to cause a denial of service via a crafted session ticket that triggers an integrity-check failure.
Impacted products
Products | Severity | Detail |
---|---|---|
Stormshield Network Security | low | SNS uses a vulnerable version of OpenSSL |
Stormshield Endpoint Security | medium | SES uses a vulnerable version of OpenSSL |
Fast360 | medium | Fast360 uses a vulnerable version of OpenSSL |
Netasq | low | Netasq uses a vulnerable version of OpenSSL |
Revisions
Version | Date | Description |
---|---|---|
v1 | 10/23/2014 | Initial release |

Stormshield Network Security |
CVSS v2 Overall Score: 2.8
|
Analysis |
Impacted version |
The vulnerability can be exploited on the SSL proxy and administration and authentication portal components. The attack can be performed when these services are available on the attacker’s network. |
|
Workaround solution |
Solution |
Disable the implicit filtering rules on authentication, webadmin and SSL VPN, then replace them with more restrictive rules on sources of connections. |
A new version of the product will provide the security patches needed. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Network | Low | None | None | None | Partial |
CVSS Base score: 5 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Official fix | Confirmed |
CVSS Temporal score: 3.7 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
None | Medium [26-75%] |
CVSS Environmental score: 2.8 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:N/TD:M/CR:ND/IR:ND/AR:ND) |

Stormshield Endpoint Security |
CVSS v2 Overall Score: 4.3
|
Analysis |
Impacted version |
The successful exploitation of this vulnerability could allow an attacker to cause a denial of service on the Apache server bundled with the Stormshield Endpoint Security server. The successful exploitation of this vulnerability could also allow an attacker to cause a denial of service on the framework.exe process (either on an agent or a server). Stormshield Endpoint Security is configured to automatically restart those processes in case of unexpected failure; the interruption of service is limited. The temporary unavailability of the Apache process on a server may delay the registration of newly installed agents. The temporary unavailability of the framework.exe process running on a server may delay the processing of new logs and the application of a new security policy on agents. The temporary unavailability of the framework.exe process running on an agent has no security impact: the security policy is still applied even if the framework.exe process is unavailable. |
|
Workaround solution |
Solution |
There is no workaround solution. |
The 6.0.17 and 7.1.04 updates are correcting this vulnerability. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Network | Low | None | None | None | Partial |
CVSS Base score: 5 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Official fix | Confirmed |
CVSS Temporal score: 3.7 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
Low | High [76-100%] |
CVSS Environmental score: 4.3 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:L/TD:H/CR:ND/IR:ND/AR:ND) |

Fast360 |
CVSS v2 Overall Score: 4.5
|
Analysis |
Impacted version |
To cause a denial of service, an attacker must exploit the vulnerability on one of the following components:
The denial of service makes the appliance rebooting for versions equal or later than 5.0/29 and 6.0/1 For prior versions, the denial of service results in some services being randomly killed. |
|
Workaround solution |
Solution |
To limit the scope of the attack, check that ‘Admin from’ network and filtering rules using Akauth are set to be as restrictive as possible. |
A new version of the product will provide the security patches needed. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Adjacent Network | Low | None | None | None | Complete |
CVSS Base score: 6.1 | CVSS Vector: (AV:A/AC:L/Au:N/C:N/I:N/A:C) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Official fix | Confirmed |
CVSS Temporal score: 4.5 | CVSS Vector: (AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
None | High [76-100%] |
CVSS Environmental score: 4.5 | CVSS Vector: (AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND) |

Netasq |
CVSS v2 Overall Score: 3.7
|
Analysis |
Impacted version |
The vulnerability can be exploited on the SSL proxy and administration and authentication portal components. The attack can be performed when these services are available on the attacker’s network. |
|
Workaround solution |
Solution |
Disable the implicit filtering rules on authentication, webadmin and SSL VPN, then replace them with more restrictive rules on sources of connections. |
A new version of the product will provide the security patches needed.
|
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Network | Low | None | None | None | Partial |
CVSS Base score: 5 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Official fix | Confirmed |
CVSS Temporal score: 3.7 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
None | High [76-100%] |
CVSS Environmental score: 3.7 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND) |
