-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2014.0111
GNU Bash Shellshock command injection vulnerabilities in Blue Coat products
                             30 September 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Blue Coat Director
                      Blue Coat Content Analysis System
                      Blue Coat Malware Analysis Appliance
                      Blue Coat Analyzer G2
                      Blue Coat Management Centre
                      Blue Coat Security Analytics Platform
                      Blue Coat X-Series XOS
                      Blue Coat PacketShaper S-Series
                      Blue Coat SSL Visibility
Operating System:     Network Appliance
                      VMware ESX Server
                      Windows
                      Linux variants
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                      Denial of Service               -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2014-7187 CVE-2014-7186 CVE-2014-7169
                      CVE-2014-6278 CVE-2014-6277 CVE-2014-6271
Member content until: Thursday, October 30 2014
Reference:            https://kb.bluecoat.com/index?page=content&id=SA82

OVERVIEW

        Multiple vulnerabilities have been discovered in Blue Coat products
        using GNU Bash.
        
        Blue Coat warns "A remote attacker may exploit the flaws to execute
        arbitrary code with elevated privileges or cause a denial of 
        service." [1]


IMPACT

        The vendor provides the following information regarding the impact 
        of these vulnerabilities:
        
        CVE-2014-6271, CVE-2014-6277,CVE-2014-6278, and CVE-2014-7169: "are
        command injection flaws in the bash command interpreter. An attacker
        could use these flaws to create specially crafted environment 
        variables that override or bypass environment restrictions to 
        execute shell commands with elevated privileges." [1]
        
        CVE-2014-7186 and CVE-2014-7187: 
        "are vulnerabilities discovered during the analysis of GNU Bash that 
        an attacker could use to cause a denial of service, and possibly execute 
        code with elevated privileges. These vulnerabilities are still under 
        investigation." [1]
        
        "Blue Coat products that install GNU Bash, and that do not provide 
        additional protections against command injection through environment
        variables, are vulnerable.
        
        PacketShaper S-Series includes a vulnerable version of bash. 
        However, the product is not vulnerable to any known vectors of 
        attack. The S-Series does not use Apache services, mod_CGI, 
        mod_cgid, PHP, or DHCP. And, the shell that is available to 
        administrators is a custom shell that accepts only limited commands.
        As other vectors of attack may be forthcoming, customers are 
        encouraged to upgrade to the latest release that addresses the 
        vulnerabilities in bash.
        
        SSL Visibility includes a vulnerable version of bash. However, the 
        product is not vulnerable to any known vectors of attack. The web 
        server does not utilize CGI or Apache services. The DHCP client 
        sanitizes DHCP server responses. SSH access is restricted to 
        authenticated users. And, there is no general purpose user shell 
        that is accessible. As other vectors of attack may be forthcoming, 
        customers are encouraged to upgrade to the latest release that 
        addresses the vulnerabilities in bash.
        
        X-Series customers running Check Point applications should contact 
        Check Point directly regarding a resolution to CVE-2014-6271. 
        Additional information can be found in the secure knowledge base 
        under sk102673." [1]
        
        Blue Coat warns the following products are vulnerable:
        
        "Director (Director 6.x and 5.x)
        
        Content Analysis System (CAS 1.x)
        
        Malware Analysis Appliance (MAA 1.1.x and 4.1.x)
        
        Malware Analyzer G2 (All versions)
        
        Management Center (1.1 and 1.2)
        
        Reporter (ISO virtualized Reporter 9.4)
        
        Security Analytics Platform (SA 7.1, 7.0, and 6.x)
        
        X-Series XOS (All verions)
        
        The following products contain a vulnerable version of bash, but are 
        not vulnerable to known vectors of attack:
        
        PacketShaper S-Series 
        All versions of the S-Series have a vulnerable version of bash.
        
        SSL Visibility
        All versions of SSL Visibility have a vulnerable version of bash." [1]


MITIGATION

        The vendor has provided the following information regarding patches:
        
        "Fixes provided below address CVE-2014-6271 and CVE-2014-7169. 
        CVE-2014-6277, CVE-2014-6278, CVE-2014-7186 and CVE-2014-7187 are 
        still under investigation and may or may not be addressed by the 
        fixes below. More information will be provided as the investigation
        continues.
        
        Content Analysis System (CAS 1.1) - a fix is not yet available.
        
        Director (6.1) -  a fix is not yet available.
        
        Director (5.5) -  patch will not be provided. Please upgrade to the 
        latest Director release with the vulnerabilty fix.
        
        Malware Analysis Appliance (MAA 4.1) - a fix is not yet available.
        
        Malware Analyzer G2 (MAG2 4.1 and prior) - a patch will not be provided. 
        Please upgrade to the latest MAA 4.x release with the vulnerability fix.
        
        Management Center (1.2) - a fix is not yet available.
        
        Management Center (1.1) - a patch will not be provided. Please upgrade
        to the latest Management Center release with the vulnerability fix.
        
        PacketShaper S-Series (11.1) - a fix is not yet available.
        
        Reporter (9.4) - a fix is not yet available.
        
        Security Analytics Platform (SA 7.1) - a fix is not yet available.
        			    (SA 7.0) - a fix is not yet available.
        			    (SA 6.6) - a fix is not yet available.
                                    (SA 6.0) - a fix is not yet available.
        
        SSL Visibility (3.8) - a fix is not yet available.
                       (3.7 and earlier) - a patch will not be provided. 
        Please upgrade to the latest SSL Visibility release with the 
        vulnerability fix.
        
        X-Series (10.0) - a fix is available in 10.0.2.0 and later.
                  (9.7) - a fix is available in 9.7.5.0 and later.
                  (9.6) - a fix is available in 9.6.9.0 and later.
                  (9.5) - a fix is not yet available.
                  (prior to 9.5) - a patch will not be provided. 
        Please upgrade to the latest XOS release with the vulnerability fix." [1]


REFERENCES

        [1] September 25, 2014 - GNU Bash Shellshock command injection
            vulnerabilities
            https://kb.bluecoat.com/index?page=content&id=SA82

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=dDmI
-----END PGP SIGNATURE-----