Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2016.0015 Multiple vulnerabilities have been identified in Palo Alto Netowrks PAN-OS. 26 February 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Palo Alto Networks devices Operating System: PAN-OS Network Appliance Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade Member content until: Sunday, March 27 2016 OVERVIEW Multiple vulnerabilities have been identified in Palo Alto Networks PAN-OS. [1] IMPACT The vendor has provided the following details regarding the issue: "Palo Alto Networks PAN-OS implements an API to enable programmatic device configuration and administration of the device. An issue was identified where the management API incorrectly parses input to a specific API call, leading to execution of arbitrary OS commands without authentication via the management interface. (Ref. #89717)" [1] "When a PAN-OS device is configured as a GlobalProtect web portal, a specially crafted request to the portal could result in a crash of the service. (Ref. #89750)" [2] "When a PAN-OS device is configured as a GlobalProtect portal, a vulnerability exists where an improper handling of a buffer involved in the processing of SSL VPN requests can result in device crash and possible remote code execution. (Ref. #89752)" [3] MITIGATION The vendor recommends updating to version PAN-OS releases 5.0.18 and newer, 6.0.13 and newer, 6.1.10 and newer, 7.0.5H2 and newer correct the issue. [1 - 3] REFERENCES [1] Unauthenticated Command Injection in Management Web Interface (PAN-SA-2016-0003) https://securityadvisories.paloaltonetworks.com/Home/Detail/36 [2] Unauthenticated Stack Exhaustion in GlobalProtect/SSL VPN Web Interface (PAN-SA-2016-0004) https://securityadvisories.paloaltonetworks.com/Home/Detail/37 [3] Unauthenticated Buffer Overflow in GlobalProtect/SSL VPN Web Interface (PAN-SA-2016-0005) https://securityadvisories.paloaltonetworks.com/Home/Detail/38 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVs+e2n6ZAP0PgtI9AQJSOhAAo/uVBuGFWfXRaIF+R5LISB3KaBVy4CXY 6d0MgP9dj6leOjZPtacaJCb4a+bjJLp3ndZXApHucoH8AjwvmVtq/F5Dg62ghu8M rKZb3gdYmM6uEQE+I+BIU8g7PHlo2rQwib8EHDDsOjKGNGdcC1L/xyzDdAnUcybl Er/6jVwy5zYDdYQ6ao0h81D8zbGITv8Jq0BbyHGTq6Yev/5pAxrWL9h7ScPxTD9m SXxInIOC8NvNBlXLI8IS9uyC6tzIQ8JBtBjjCM94JJEYFPyp1EzPrm+6TtlDAtyo yF6N0vmoElYFU5qYxT98FxqEUWC+MUf8MbEhB1fgbA4k3DsVByPeCOspNhI+pePL ESb0JbvMky6PK2WFTcyleOu2+2g1ndLxIBqeaXhYLsx7V9+l5+XtAEGjZxc92eti BULHf6oQh+JED92xtfk2TENj2PNE3QEOq0phPgBAEROm9It5dLwC273rK9AgMkc2 wwKY8LIuRWNNLFgGrc0sImRjjV611cNIN8tbsWlaoW7UMJFoUnYEQBcsYFO02/7A 52VUmMu5BNGxkL72o9b/+7xy/2qwJZZ7gzDq/Fxq/WFi0eqKwfpxB/0x5hQwoGgi rdAsPNXkuLcbJhfMG2yT1grGDDeaGge0Hcs1fdVXSacXEoS6JkI+cEhkM59Pz/tj QrYfYPTgfy8= =WTF/ -----END PGP SIGNATURE-----