Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0111 GNU Bash Shellshock command injection vulnerabilities in Blue Coat products 30 September 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Blue Coat Director Blue Coat Content Analysis System Blue Coat Malware Analysis Appliance Blue Coat Analyzer G2 Blue Coat Management Centre Blue Coat Security Analytics Platform Blue Coat X-Series XOS Blue Coat PacketShaper S-Series Blue Coat SSL Visibility Operating System: Network Appliance VMware ESX Server Windows Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-7187 CVE-2014-7186 CVE-2014-7169 CVE-2014-6278 CVE-2014-6277 CVE-2014-6271 Member content until: Thursday, October 30 2014 Reference: https://kb.bluecoat.com/index?page=content&id=SA82 OVERVIEW Multiple vulnerabilities have been discovered in Blue Coat products using GNU Bash. Blue Coat warns "A remote attacker may exploit the flaws to execute arbitrary code with elevated privileges or cause a denial of service." [1] IMPACT The vendor provides the following information regarding the impact of these vulnerabilities: CVE-2014-6271, CVE-2014-6277,CVE-2014-6278, and CVE-2014-7169: "are command injection flaws in the bash command interpreter. An attacker could use these flaws to create specially crafted environment variables that override or bypass environment restrictions to execute shell commands with elevated privileges." [1] CVE-2014-7186 and CVE-2014-7187: "are vulnerabilities discovered during the analysis of GNU Bash that an attacker could use to cause a denial of service, and possibly execute code with elevated privileges. These vulnerabilities are still under investigation." [1] "Blue Coat products that install GNU Bash, and that do not provide additional protections against command injection through environment variables, are vulnerable. PacketShaper S-Series includes a vulnerable version of bash. However, the product is not vulnerable to any known vectors of attack. The S-Series does not use Apache services, mod_CGI, mod_cgid, PHP, or DHCP. And, the shell that is available to administrators is a custom shell that accepts only limited commands. As other vectors of attack may be forthcoming, customers are encouraged to upgrade to the latest release that addresses the vulnerabilities in bash. SSL Visibility includes a vulnerable version of bash. However, the product is not vulnerable to any known vectors of attack. The web server does not utilize CGI or Apache services. The DHCP client sanitizes DHCP server responses. SSH access is restricted to authenticated users. And, there is no general purpose user shell that is accessible. As other vectors of attack may be forthcoming, customers are encouraged to upgrade to the latest release that addresses the vulnerabilities in bash. X-Series customers running Check Point applications should contact Check Point directly regarding a resolution to CVE-2014-6271. Additional information can be found in the secure knowledge base under sk102673." [1] Blue Coat warns the following products are vulnerable: "Director (Director 6.x and 5.x) Content Analysis System (CAS 1.x) Malware Analysis Appliance (MAA 1.1.x and 4.1.x) Malware Analyzer G2 (All versions) Management Center (1.1 and 1.2) Reporter (ISO virtualized Reporter 9.4) Security Analytics Platform (SA 7.1, 7.0, and 6.x) X-Series XOS (All verions) The following products contain a vulnerable version of bash, but are not vulnerable to known vectors of attack: PacketShaper S-Series All versions of the S-Series have a vulnerable version of bash. SSL Visibility All versions of SSL Visibility have a vulnerable version of bash." [1] MITIGATION The vendor has provided the following information regarding patches: "Fixes provided below address CVE-2014-6271 and CVE-2014-7169. CVE-2014-6277, CVE-2014-6278, CVE-2014-7186 and CVE-2014-7187 are still under investigation and may or may not be addressed by the fixes below. More information will be provided as the investigation continues. Content Analysis System (CAS 1.1) - a fix is not yet available. Director (6.1) - a fix is not yet available. Director (5.5) - patch will not be provided. Please upgrade to the latest Director release with the vulnerabilty fix. Malware Analysis Appliance (MAA 4.1) - a fix is not yet available. Malware Analyzer G2 (MAG2 4.1 and prior) - a patch will not be provided. Please upgrade to the latest MAA 4.x release with the vulnerability fix. Management Center (1.2) - a fix is not yet available. Management Center (1.1) - a patch will not be provided. Please upgrade to the latest Management Center release with the vulnerability fix. PacketShaper S-Series (11.1) - a fix is not yet available. Reporter (9.4) - a fix is not yet available. Security Analytics Platform (SA 7.1) - a fix is not yet available. (SA 7.0) - a fix is not yet available. (SA 6.6) - a fix is not yet available. (SA 6.0) - a fix is not yet available. SSL Visibility (3.8) - a fix is not yet available. (3.7 and earlier) - a patch will not be provided. Please upgrade to the latest SSL Visibility release with the vulnerability fix. X-Series (10.0) - a fix is available in 10.0.2.0 and later. (9.7) - a fix is available in 9.7.5.0 and later. (9.6) - a fix is available in 9.6.9.0 and later. (9.5) - a fix is not yet available. (prior to 9.5) - a patch will not be provided. Please upgrade to the latest XOS release with the vulnerability fix." [1] REFERENCES [1] September 25, 2014 - GNU Bash Shellshock command injection vulnerabilities https://kb.bluecoat.com/index?page=content&id=SA82 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVCouQxLndAQH1ShLAQJ+gQ/+JLhsM2ejjBlI1sm92uvYsh7mXNm8Yxl9 gjpM93gOSzIiL3N9hEZ5gHM1OQ6J0pcpdsTv45tOZOy/gqftuuUd4Vbdt0dJAf2O /PXzhQUzyMInJH8bwH02E/11SCVEjeAEfwZbqOH9u8WjFrP1C7HJhxR+cQOYXaS6 DGGhTwNcNShy/YU0QKezqvjT2iOCqOyABjutubICvyHI8VmtZ9uj2S898+RN5r08 qgwHCl7Gvb48/vIEnbC5MKYgrDsaro4Of/s9x40P3rMHAZPof42rcH2P+HfFOfee 2f9ueVnXOVqsAXIgdESU2dJuEue/OfvUzxAqFvONCEPBt7T5tQZY1AsMkIdABdfO wu2pqH2h17v0yRENTxS5dSrBsNUFZlvF/Yxv0bihDPgJwlonLq0qsX2NEqZBFYm/ gaLrLew//2KsTaS/oXiSbX2scloLwsIv6+66q4AHt7aT6ifL1p3CAadKLGJrm5uW GL+5VlmC3V0844LbAHv34V9I+SYxldg8MuX6t9tnlOzQBZX/xZmJ/WleoBtPsE5I HJhxwXHKBb12cDmcNS6nCr3MCVNAhA8t4hJT1k5tswD/pyyvUzFHLiyXVyb4lNgO 3TPgocRHjOz14zNORElaCtHWiStoKhV+ZFbxoW8486xgmzdibC8lbV7TQjOiRSzN TJfxki6y64A= =dDmI -----END PGP SIGNATURE-----