Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0102 ePO updates fix multiple Java and OpenSSL vulnerabilities 5 September 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: McAfee ePolicy Orchestrator Operating System: Network Appliance Impact/Access: Access Privileged Data -- Remote/Unauthenticated Modify Arbitrary Files -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-4264 CVE-2014-4263 CVE-2014-4244 CVE-2014-3511 Member content until: Sunday, October 5 2014 Reference: https://kc.mcafee.com/corporate/index?page=content&id=SB10083 https://kc.mcafee.com/corporate/index?page=content&id=SB10084 OVERVIEW Several vulnerabilities in Java have been discovered which McAfee ePolicy Orchestrator (ePO) prior to ePO 4.5.7, ePO 4.6.8 and ePO 5.1.1. [1] A vulnerability in OpenSSL has been discovered which affects McAfee ePolicy Orchestrator (ePO). [2] IMPACT The vendor has provided the following details regarding these vulnerabilities: CVE-2014-4264: "Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect availability via unknown vectors related to Security. (Client & Server)". [1] CVE-2014-4263: "Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to "Diffie-Hellman key agreement." [1] CVE-2014-4244: "Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security. (Client & Server" [1] CVE-2014-3511: "The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue." [2] MITIGATION The vendor recommends users of ePO 4.5.x and 4.6.x should upgrade to ePO 4.6.8 and apply hotfix EPOHF983759, and users of ePO 5.0.x and 5.1.x should upgrade to ePO 5.1.1 and apply hotfix EPOHF983758 to remediate the Java vulnerabilities. [1] The vendor also recommends users running ePO 5.1.1 apply the ePO 5.1.1 HF988208 hotfix to remediate the OpenSSL vulnerability. [2] REFERENCES [1] McAfee Security Bulletin - ePO update fixes multiple Java vulnerabilities reported by Oracle's Q3 2014 Critical Patch Update https://kc.mcafee.com/corporate/index?page=content&id=SB10083 [2] McAfee Security Bulletin - ePO update fixes a security vulnerability reported by OpenSSL https://kc.mcafee.com/corporate/index?page=content&id=SB10084 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVAlSsRLndAQH1ShLAQIpjhAAufeKQir/tiDPnsPR5dgEmam2OCfuH0T/ r80m2q7VwSxqFd73D4YykUSoGVJgHyBLKFX6jE+bUKyK5wGCzooKKEqHztC6pvIa 9rb4xOdnyYoPi3pEMyLbvG0d8B5x4qFRnWqSkOZlcEYhp3sfVP1dHarOzVQDMpQu fKzXTyXlkLSubff9h5NCa/8qSpyiNOeELjPORV2iTnHj7bxMpoax3u/V51gnOYsn TG9+Vc9Bkb6Exs6u9WjjLandTjx5fdJKr7nsA1dtuaWFYkWHIqbRFJz0B+Tae5E5 pkyuSFsKUcNO1qqvwSMQ4vO3wajj4e09J7Z5ACK61yhT2D5jAEDCHRSIzGKQJsfa EvZ9XHWTqREFC564hXbSr6KbdSOsVjBvVpJUcVK9fRao3I0pKyHxARRt6L1v5HAR mfJPOTPRku1dU9+vcwH/cmzAgMDJjEu870J+H0IBCnfOaQHbFhLdTAXbK+hyAdiz 6P0dCzQoMab/y1GB5pIE0+VokdfnC8SbT7VKXM2pnD84j61FpQb4N5flDv4Lm5HT aoi6Evj9HARujKISz775LxZgK22euqWeFBuysfVLssE65KlMwbUp5FFNIam16/P4 4ELRckR6J/3CyYP6j7GcpdIe9PtgGou4rmRM507YiHZhmscV1NwKCcbtDoyMzy4U ksyZyTP8h2w= =yDCY -----END PGP SIGNATURE-----