-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2016.0048
        A vulnerability in OpenSSH has been identified in multiple
                            Blue Coat products.
                               29 April 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Blue Coat products
Operating System:     Network Appliance
Impact/Access:        Execute Arbitrary Code/Commands -- Existing Account
Resolution:           Patch/Upgrade
CVE Names:            CVE-2016-3115  
Member content until: Sunday, May 29 2016
Reference:            ESB-2016.0670.2

OVERVIEW

        Multiple Blue Coat products are affected by a vulnerability in OpenSSH:
        
        "Norman Shark Industrial Control System Protection
        ICSP 5.3 is vulnerable.
        
        Norman Shark Network Protection
        NNP 5.3 is vulnerable.
        
        Norman Shark SCADA Protection
        NSP 5.3 is vulnerable.
        
        The following products contain a vulnerable version of OpenSSH, but are
        not vulnerable to known vectors of attack:
        
        Advanced Secure Gateway
        ASG 6.6 has a vulnerable version of OpenSSH.
        
        Content Analysis System
        CAS 1.2 and 1.3 have a vulnerable version of OpenSSH.
        
        Director
        Director 6.1 has a vulnerable version of OpenSSH.
        
        Mail Threat Defense
        MTD 1.1 prior to 1.1.2.1 has a vulnerable version of OpenSSH.
        
        Malware Analysis Appliance
        MAA 4.2 has a vulnerable version of OpenSSH.
        
        Management Center
        MC 1.5 has a vulnerable version of OpenSSH.
        
        PacketShaper
        PS 9.2 has a vulnerable version of OpenSSH.
        
        Reporter
        Reporter 10.1 has a vulnerable version of OpenSSH.  Reporter 9.4 and 
        9.5 are not vulnerable.
        
        Security Analytics
        Security Analytics 6.6, 7.0, and 7.1 have a vulnerable version of 
        OpenSSH.
        
        SSL Visibility
        SSLV 3.8, 3.8.4FC, and 3.9 have a vulnerable version of OpenSSH.
        
        X-Series XOS
        XOS 9.7, 10.0 and 11.0 have a vulnerable version of OpenSSH." [1]


IMPACT

        The vendor has provided the following information about the 
        vulnerability:
        
        CVE-2016-3115: "Blue Coat products that include vulnerable versions
        of OpenSSH and enable X11 forwarding are susceptible to a command 
        injection vulnerability due to insufficient input data sanitization.
        An authenticated remote attacker can exploit this vulnerability to 
        bypass intended command restrictions enforced by a restricted shell
        or the target's SSH configuration. The attacker can also execute 
        arbitrary commands." [1]


MITIGATION

        The vendor recommends upgrading to versions unaffected by the 
        vulnerability. [1]


REFERENCES

        [1] SA121: OpenSSH Shell Command Restriction Bypass
            https://bto.bluecoat.com/security-advisory/sa121

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVyLDon6ZAP0PgtI9AQLuRhAAxDS1UUyn9up7uNxUVPaAAw93dXLmrT3b
O/sLJfT9ItoyGEDzQcG0gvY6hEPxzKNO+gbdccs5V2ZsdaB2Hw4YBN9rC9Nht54D
FuNYesbNHHsh11bZq36zS8yUGJs+IWSi/V5OmeWhx4WMgnZhdxYxo81HOTF3NKaj
akh7K2jmdO3Blv9VE4VFjVbv2zaeGydB9kPGu6f66wzHqZv7vZGiGL6DztOG+YDL
3HUpEDserSC5pr/56m9irkrhWhiXzIYsPFuF2bL2eSbMuC8pzfk33AwKJ3OZXZpt
dkUO0nJ5TUOAxDUZJxfRQ0e2rVCRIbWyTUQaL0ZG+XOR6Huw/qSVQw1ENAVCGOg7
vwWWroWooTPeHTANm4mxh/a2U1Ess0j/zUogohm2SCAvxGfq/5ZmDsbmIlo3+/F8
hbMfrQGJYGgxEGl0VuUm/o/ScZGVpW+o3vDdNuYnWZD45XRYNd2zD0COiDIJlc5B
vPnfVK2JyG8Kx7x3EERgUhPAISdwxzcahOXD5E8OmSCRaqiXRCxIZ75E1Tn08Nr1
aZZMdO0dpazgRPr6+vi8pVzX6wYj5wN66ns/0KYQVnrUb18ce3UUYBaf8fzKXmzg
dOWRWt22TVZt+dxrNmUef8yoCiDLa0RrIjkP0j4xTy784QaSi/YrJy+6Zl7l8RuL
unCRI1QgJGs=
=XNSP
-----END PGP SIGNATURE-----