Certificate verify crash with missing PSS parameter [CVE-2015-3194]

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2015-017 CVE-2015-3194 12/04/2015 low v1

Vulnerability details

The signature verification routines of OpenSSL will crash with a NULL pointer dereference if presented with an ASN.1 signature using the RSA PSS algorithm and absent mask generation function parameter. This vulnerability could be exploited to conduct denial of service attacks.

Impacted products

ProductsSeverityDetail
Stormshield Network Security low The product embeds a vulnerable version of OpenSSL.
Stormshield Endpoint Security low The product embeds a vulnerable version of OpenSSL.
Netasq low The product embeds a vulnerable version of OpenSSL.

Revisions

Version Date Description
v1  12/07/2015 Initial release

 



Stormshield Network Security

CVSS v2 Overall Score: 3.7      

Analysis

Impacted version

Stormshield Network Security (SNS) products embed a vulnerable version of the OpenSSL library.

This vulnerability can be exploited on the SSL proxy, administration and authentication portal components.

The CVE-2015-3194 vulnerability could allow a denial of service attack on these services, that crash and restart (services automatically restart on abnormal termination).

The attack can be performed when these services are available on the attacker’s network.

  • SNS 2.3.0
  • SNS 2.0.0 to 2.2.3
  • SNS 1.0.0 to 1.4.2

Workaround solution

Solution

Limit access to administration portal to trusted IP only.

The 2.3.1, 2.2.4, and 1.4.3 updates will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Low None None None Partial
CVSS Base score: 5 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 3.7 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
None High [76-100%]
CVSS Environmental score: 3.7 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND)


Stormshield Endpoint Security

CVSS v2 Overall Score: 3.7      

Analysis

Impacted version

Stormshield Endpoint Security (SES) product embeds a vulnerable version of the OpenSSL library.

The successful exploitation of this vulnerability could allow an attacker to cause a denial of service on the framework.exe process (either on an agent or a server). Stormshield Endpoint Security is configured to automatically restart those processes in case of unexpected failure; the interruption of service is limited.

The temporary unavailability of the framework.exe process running on a server may delay the processing of new logs and the application of a new security policy on agents.

The temporary unavailability of the framework.exe process running on an agent has no security impact: the security policy is still applied even if the framework.exe process is unavailable.

  • SES 6.0.20
  • SES 7.1.07
  • SES 7.2.04

Workaround solution

Solution

There is no workaround solution.

The 6.0.21, 7.1.08 and 7.2.05 updates fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Low None None None Partial
CVSS Base score: 5 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 3.7 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
None High [76-100%]
CVSS Environmental score: 3.7 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND)


Netasq

CVSS v2 Overall Score: 3.7      

Analysis

Impacted version

Netasq products embed a vulnerable version of the OpenSSL library.

This vulnerability can be exploited on the SSL proxy, administration and authentication portal components.

The CVE-2015-3194 vulnerability could allow a denial of service attack on these services, that crash and restart (services automatically restart on abnormal termination).

The attack can be performed when these services are available on the attacker’s network.

  • Netasq 9.0.0 to 9.1.6

Workaround solution

Solution

Limit access to administration portal to trusted IP only.

The 9.1.7 update will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Low None None None Partial
CVSS Base score: 5 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 3.7 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
None High [76-100%]
CVSS Environmental score: 3.7 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND)