Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2015.0075 A vulnerability has been identified in Logstash 24 July 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Logstash Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Access Privileged Data -- Remote/Unauthenticated Provide Misleading Information -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-5378 Member content until: Sunday, August 23 2015 OVERVIEW A vulnerability has been identified in Logstash prior to versions 1.5.3 and 1.4.4. [1] IMPACT The vendor has provided the following details regarding these vulnerabilities: CVE-2015-5378: "Logstash 1.5.2 and prior versions are vulnerable to a SSL/TLS security issue called the FREAK attack. If you are using the Lumberjack input, FREAK allows an attacker to successfully implement a man in the middle attack, intercepting communication between the Logstash Forwarder agent and Logstash server. Note: Only deployments using the Logstash Forwarder or the Lumberjack input are affected by this vulnerability." [1] MITIGATION The vendor recommends updating to the latest versions of Logstash to correct this issue. [1] REFERENCES [1] Logstash SSL/TLS FREAK Vulnerability CVE-2015-5378 https://discuss.elastic.co/t/logstash-ssl-tls-freak-vulnerability-cve-2015-5378/26023 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVbGEcH6ZAP0PgtI9AQLicg/+IVU/DKFA19BllV0YRNi9Ku6Wl40obhnL Scs33XMofgDN0bM6TECTeweq6AI0M1GHEARWzmut4cgfwul8rrToE59WWGNGu9jF lAK6esJtF9KJZZsVNMiZp5BPOCwbU0d6it1PwMUrtNNkUou+PIKH/EFfU6EIzkLQ V+WVckznMoAII2tfcJKFnjbF0d5qDwx4lBNVRrantq49TizaN9sIkVlrbeHsFqGN nRaBWbcJxShpXyufUZa9/h9IpY66q8vYk+1SFxOXMIKBcy6SJRkOt8s7jL4+0X0e Q2zPFPIo82IDIscSSk5seo3VCVyJe0du2wW+KYxFbWMOcfPoxW+tOLaiG/OFMGWf Qf3+W+2nEZx6/YIS/OmYA2/7mdovrkeizcORNYd3DmgnqNrIDLnLU82hynRmA2IM xBsTcufk3ynyEnc7HlhlrJRvh15ExZxL6rKlR0DkbxoHXh5cPvyXjQd2DIZiLsbt bmEWNWr5+8HacJpg64uUUrahKO2dPg44sn+ZP/7Nd2VJCIgOqi89JJcykHAeduR3 k1SjVXiNdvDKSsZTsPgPL5a7kzJ/GHN80fE/30Y9gZmGlmT8OMRsNETImv7R0t4B BOxA6YYIhHEFqDy/ZMlC4PXdJKp5RtSWyVgeikRBMFaiGppuzF4h6bU1Ur1hQ2UT uejAHyzWNDA= =M2o8 -----END PGP SIGNATURE-----