-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0218
               McAfee Security Bulletin - OpenSSL update for
              vulnerabilities CVE-2017-3735 and CVE-2017-3736
                             22 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              McAfee Products
Operating System:     Virtualisation
                      Network Appliance
                      Windows
                      UNIX variants (UNIX, Linux, OSX)
Resolution:           Patch/Upgrade
CVE Names:            CVE-2017-3736 CVE-2017-3735 
Member content until: Sunday, January 21 2018
Reference:            ASB-2017.0202
                      ESB-2017.3218
                      ESB-2017.3217
                      ESB-2017.3215.3
                      ESB-2017.3120
                      ESB-2017.3100

OVERVIEW

        It has been discovered that several well known OpenSSL 
        vulnerabilities affect numerous McAfee products. [1]
        
        The vendor advises the following product's status with respect to the 
        vulnerabilities:
        
        "Vulnerable and Updated
        
            DXL Broker 4.0.0
            NSP Sensor 8.x, 9.x
            SIEM 9.6.x, 10.x
            TIE Server 1.x, 2.x
        
        Vulnerable and Not Yet Updated
        
            Advanced Threat Defense (ATD) 3.6, 3.8, 3.10, 4.0
            McAfee Active Response (MAR) 2.x
            McAfee Email Gateway (MEG) 7.x
            McAfee Web Gateway (MWG) 7.7.2.x, 7.8.0.x
            Network Data Loss Prevention (NDLP) 9.3.x
            SaaS Email Protection and Continuity (SaaS Email)
            VirusScan Enterprise for Linux (VSEL) 1.x, 2.x
        
        Not Vulnerable
        
            ePolicy Orchestrator (ePO) 5.x
            VirusScan Enterprise (VSE) for Windows 8.8"[1]


IMPACT

        The vendor has provided the following details regarding the 
        vulnerabilities:
        
        "CVE-2017-3735 While parsing an IPAddressFamily extension in an 
        X.509 certificate, it is possible to do a one-byte overread. This 
        would result in an incorrect text display of the certificate. This 
        bug has been present since 2006 and is present in all versions of 
        OpenSSL before 1.0.2m and 1.1.0g. 
        https://nvd.nist.gov/vuln/detail/CVE-2017-3735
        
        CVE-2017-3736 There is a carry propagating bug in the x86_64 
        Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 
        before 1.1.0g. No EC algorithms are affected. Analysis suggests that
        attacks against RSA and DSA as a result of this defect would be very
        difficult to perform and are not believed likely. Attacks against DH
        are considered just feasible (although very difficult) because most
        of the work necessary to deduce information about a private key may
        be performed offline. The amount of resources required for such an 
        attack would be very significant and likely only accessible to a 
        limited number of attackers. An attacker would additionally need 
        online access to an unpatched system using the target private key in
        a scenario with persistent DH parameters and a private key that is 
        shared between multiple clients. This only affects processors that 
        support the BMI1, BMI2, and ADX extensions like Intel Broadwell (5th
        generation) and later or AMD Ryzen. 
        https://nvd.nist.gov/vuln/detail/CVE-2017-3736
        
        Workaround TIE Server:
        
        CVE-2017-3736: You can restrict the allowed cipher suites by 
        customizing the ssl_ciphers property in 
        /data/tieserver_pg/postgresql.conf. Then, run these commands to 
        apply the changes: # service tieserver stop # service tieserver 
        start
        
        Follow the steps in KB90067 to upgrade to the OpenSSL 1.0.2m library
        in TIE Server.
        
        Mitigations None. "[1]


MITIGATION

        The vendor recommends users of known vulnerable McAfee products to 
        review their product and apply any patches as appropriate:
        
        "Go to the McAfee Downloads site and download the applicable product
        patch/hotfix file". [1]


REFERENCES

        [1] McAfee Security Bulletin - OpenSSL update for vulnerabilities
            CVE-2017-3735 and CVE-2017-3736
            https://kc.mcafee.com/corporate/index?page=content&id=SB10220

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=cwVQ
-----END PGP SIGNATURE-----