-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2696
           Multiple vulnerabilities have been discovered in IBM
               Security Proventia Network Enterprise Scanner
                              27 October 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Proventia Network Enterprise Scanner
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-5621 CVE-2015-1792 CVE-2015-1791
                   CVE-2015-1790 CVE-2015-1789 CVE-2015-1788
                   CVE-2014-8176  

Reference:         ASB-2015.0103
                   ASB-2015.0081
                   ASB-2015.0065
                   ESB-2015.1561
                   ESB-2015.1557
                   ESB-2015.1544.2
                   ESB-2015.1540

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21968871
   http://www-01.ibm.com/support/docview.wss?uid=swg21968870

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Vulnerability in OpenSSL affects IBM Security Proventia
Network Enterprise Scanner (CVE-2015-1788, CVE-2015-1789, CVE-2015-1790,
CVE-2015-1791, CVE-2015-1792, CVE-2014-8176)

Document information

More support for:
Proventia Network Enterprise Scanner

Software version:
2.3

Operating system(s):
Firmware

Reference #:
1968871

Modified date:
2015-10-23

Security Bulletin

Summary

Vulnerablilities in the OpenSSL package affect IBM Security Proventia
Network Enterprise Scanner.

Vulnerability Details

CVEID: CVE-2015-1790
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by the
improper handling of missing inner EncryptedContent by the PKCS#7 parsing
code. An attacker could exploit this vulnerability using specially crafted
ASN.1-encoded PKCS#7 blobs with missing content to trigger a NULL pointer
dereference.
CVSS Base Score: 5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/103780 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-1791
DESCRIPTION: A double-free memory error in OpenSSL in the
ssl3_get_new_session_ticket() function has an unknown impact. By returning
a specially crafted NewSessionTicket message, an attacker could cause the
client to reuse a previous ticket resulting in a race condition.
CVSS Base Score: 5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/103609 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID: CVE-2015-1792
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an
error when verifying a signedData message. An attacker could exploit this
vulnerability using an unknown hash function OID to cause the application
to enter into an infinite loop.
CVSS Base Score: 5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/103781 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2014-8176
DESCRIPTION: OpenSSL could allow a remote authenticated attacker to
execute arbitrary code on the system, caused by an invalid free error when
application data between the ChangeCipherSpec and Finished messages is
received by the DTLS peer. An attacker could exploit this vulnerability
to trigger a segmentation fault or possibly corrupt memory and execute
arbitrary code on the system.
CVSS Base Score: 6.5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/103782 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVEID: CVE-2015-1788
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an
error when processing an ECParameters structure over a specially crafted
binary polynomial field. A remote attacker could exploit this vulnerability
to cause the application to enter into an infinite loop.
CVSS Base Score: 5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/103778 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-1789
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by
an out-of-bounds read in X509_cmp_time. An attacker could exploit this
vulnerability using a specially crafted certificate or CRL to trigger a
segmentation fault.
CVSS Base Score: 5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/103779 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Affected Products and Versions

IBM Security Proventia Network Enterprise Scanner 2.3

Remediation/Fixes

Product							VRMF	Remediation/First Fix

IBM Security Proventia Network Enterprise Scanner	2.3	2.3.0.2-ISS-ES-IF010

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v2 Guide
On-line Calculator v2

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 October 2015: Original version published.

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- -------------------------------------------------------------------------------

Security Bulletin: Vulnerability in Net-SNMP affects IBM Security Proventia
Network Enterprise Scanner (CVE-2015-5621)

Document information

More support for:
Proventia Network Enterprise Scanner

Software version:
2.3

Operating system(s):
Firmware

Reference #:
1968870

Modified date:
2015-10-23

Security Bulletin

Summary

Net-SNMP vulnerability affects IBM Security Proventia Network Enterprise
Scanner. IBM Security Proventia Network Enterprise Scanner has addressed
this CVE.

Vulnerability Details

CVEID: CVE-2015-5621
DESCRIPTION: Net-SNMP is vulnerable to a denial of service, caused by
incompletely parsed varBind variables being left in the list of variables
by the snmp_pdu_parse() function. A remote attacker could exploit this
vulnerability to cause the application to crash or possibly execute
arbitrary code on the system.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/105232 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

IBM Security Proventia Network Enterprise Scanner 2.3

Remediation/Fixes

Product							VRMF	Remediation/First Fix

IBM Security Proventia Network Enterprise Scanner	2.3	2.3.0.2-ISS-ES-IF010

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 October 2015: Original version published.

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=EVHT
-----END PGP SIGNATURE-----