OpenSSL vulnerability [CVE-2014-3567]

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2014-003 CVE-2014-3567 10/16/2014 medium v1

Vulnerability details

A memory leak allows remote attackers to cause a denial of service via a crafted session ticket that triggers an integrity-check failure.

Impacted products

ProductsSeverityDetail
Stormshield Network Security low SNS uses a vulnerable version of OpenSSL
Stormshield Endpoint Security medium SES uses a vulnerable version of OpenSSL
Fast360 medium Fast360 uses a vulnerable version of OpenSSL
Netasq low Netasq uses a vulnerable version of OpenSSL

Revisions

Version Date Description
v1 10/23/2014 Initial release

 



Stormshield Network Security

CVSS v2 Overall Score: 2.8      

Analysis

Impacted version

The vulnerability can be exploited on the SSL proxy and administration and authentication portal components.

The attack can be performed when these services are available on the attacker’s network.

  • SNS 1.0.0 to 1.1.3

Workaround solution

Solution

Disable the implicit filtering rules on authentication, webadmin and SSL VPN, then replace them with more restrictive rules on sources of connections.

A new version of the product will provide the security patches needed.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Low None None None Partial
CVSS Base score: 5 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 3.7 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
None Medium [26-75%]
CVSS Environmental score: 2.8 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:N/TD:M/CR:ND/IR:ND/AR:ND)


Stormshield Endpoint Security

CVSS v2 Overall Score: 4.3      

Analysis

Impacted version

The successful exploitation of this vulnerability could allow an attacker to cause a denial of service on the Apache server bundled with the Stormshield Endpoint Security server. The successful exploitation of this vulnerability could also allow an attacker to cause a denial of service on the framework.exe process (either on an agent or a server). Stormshield Endpoint Security is configured to automatically restart those processes in case of unexpected failure; the interruption of service is limited.

The temporary unavailability of the Apache process on a server may delay the registration of newly installed agents.

The temporary unavailability of the framework.exe process running on a server may delay the processing of new logs and the application of a new security policy on agents.

The temporary unavailability of the framework.exe process running on an agent has no security impact: the security policy is still applied even if the framework.exe process is unavailable.

  • SES 6.0.15 and 7.1.02

Workaround solution

Solution

There is no workaround solution.

The 6.0.17 and 7.1.04 updates are correcting this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Low None None None Partial
CVSS Base score: 5 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 3.7 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
Low High [76-100%]
CVSS Environmental score: 4.3 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:L/TD:H/CR:ND/IR:ND/AR:ND)


Fast360

CVSS v2 Overall Score: 4.5      

Analysis

Impacted version

To cause a denial of service, an attacker must exploit the vulnerability on one of the following components:

  • Administration. In this case, attacks can be performed from the ‘Admin from’ network
  • Akauth. If Akauth is enabled, attacks can be performed from networks and hosts used as sources in filtering rules using Akauth

The denial of service makes the appliance rebooting for versions equal or later than 5.0/29 and 6.0/1

For prior versions, the denial of service results in some services being randomly killed.

  • Fast360 5.0/16 to 5.0/32
  • Fast360 6.0/1 to 6.0/6

Workaround solution

Solution

To limit the scope of the attack, check that ‘Admin from’ network and filtering rules using Akauth are set to be as restrictive as possible.

A new version of the product will provide the security patches needed.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Adjacent Network Low None None None Complete
CVSS Base score: 6.1 CVSS Vector: (AV:A/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 4.5 CVSS Vector: (AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
None High [76-100%]
CVSS Environmental score: 4.5 CVSS Vector: (AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND)


Netasq

CVSS v2 Overall Score: 3.7      

Analysis

Impacted version

The vulnerability can be exploited on the SSL proxy and administration and authentication portal components.

The attack can be performed when these services are available on the attacker’s network.

  • Netasq 9.0.0 to 9.1.3

Workaround solution

Solution

Disable the implicit filtering rules on authentication, webadmin and SSL VPN, then replace them with more restrictive rules on sources of connections.

A new version of the product will provide the security patches needed.


Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Low None None None Partial
CVSS Base score: 5 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 3.7 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
None High [76-100%]
CVSS Environmental score: 3.7 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND)