-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2012.0172
         OpenSSL vulnerabilities have been discovered in Bluecoat
                      IntelligenceCenter and ProxySG
                             12 December 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Bluecoat IntelligenceCenter
                      Bluecoat ProxySG
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                      Denial of Service               -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2012-2131 CVE-2012-2110 
Member content until: Friday, January 11 2013
Reference:            ESB-2012.0408
                      ESB-2012.0388

OVERVIEW

        Multiple OpenSSL vulnerabilities have been discovered in Bluecoat
        IntelligenceCenter and ProxySG.


IMPACT

        The following information is from the Bluecoat website:
        
        "CVE-2012-2110 is a buffer overflow flaw in OpenSSLs BIO and FILE based
        functions.  Using this vulnerability, a remote attacker can send
        specially crafted DER or MIME formatted data to an application to cause
        memory corruption or even to remotely execute code on the system. 
        
        CVE-2012-2131 is an integer signedness flaw in the fix issued for
        CVE-2012-2110.  Using this vulnerability, a remote attacker can send
        specially crafter DER formatted data to an application to conduct buffer
        overflow attacks and to cause a denial of service." [1]
        
        All versions of IntelligenceCenter and ProxySG are vulnerable. [1]


MITIGATION

        Fixes are not yet available for IntelligenceCenter but are being
        investigated. Fixes are available for some versions of ProxySG. [1]


REFERENCES

        [1] December 4, 2012  OpenSSL ASN.1 BIO buffer overflow (CVE-2012-2110
            and CVE-2012-2131)
            https://kb.bluecoat.com/index?page=content&id=SA70

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=uoBn
-----END PGP SIGNATURE-----