-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2012.0154
   A vulnerability exists in McAfee Email and Web Security Appliance 5.6
                              7 November 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              McAfee Email and Web Security
Operating System:     Network Appliance
Impact/Access:        Provide Misleading Information -- Remote/Unauthenticated
Resolution:           Mitigation
CVE Names:            CVE-2009-0021  
Member content until: Friday, December  7 2012
Reference:            ESB-2009.0025

OVERVIEW

        McAfee have provided a fix for an NTP vulnerability in McAfee Email 
        and Web Security Appliance 5.6


IMPACT

        The vendor have provided the following information:
        
        "CVE-2009-0021 has been reported against Network Time Protocol (NTP) 
        allows remote attackers to bypass validation of the certificate chain 
        via a malformed SSL/TLS signature for DSA and ECDSA keys." [1]


MITIGATION

        The vendor advises the following options:
        
        "Solution 1
        
        * Always site the Appliance behind an enterprise firewall.
        * Configure Secure Shell, User Interface, and Remote Access to restrict 
          the allowed connections.
        * If you have an out-of-band interface, enable it and disable in-band 
          management.
        
        Solution 2
        
        This issue will be resolved in Email and Web Security 5.6 Patch 5." [1]


REFERENCES

        [1] McAfee Appliance: Response to vulnerability CVE-2009-0021
            https://kc.mcafee.com/corporate/index?page=content&id=KB76646

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=KRKo
-----END PGP SIGNATURE-----