OpenSSL – Vulnerabilities Patched in McAfee Products
Number: AV14-036
Date: 11 June 2014
Purpose
The purpose of this Advisory is to bring attention to recently released security updates for multiple vulnerabilities in McAfee products related to OpenSSL.
Assessment
McAfee has released security updates to address multiple vulnerabilities in OpenSSL. Exploitation of these vulnerabilities could lead to; Man-in-the-Middle Attack, Malicious File Execution, Injection Flaws, Denial of Service.
Affected Software:
ePO 4.6.0-4.6.8 & 5.0.0-5.1.0
CVE Reference: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470, CVE-2014-0076.
Suggested Action
CCIRC recommends that owner/operators test and deploy the vendor released updates or workarounds to affected platforms accordingly.
References:
- McAfee Security Bulletin – Seven OpenSSL vulnerabilities patched in McAfee products
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 - CCIRC Advisory AV14-031 OpenSSL - Multiple Vulnerabilities
http://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/2014/av14-031-eng.aspx - OpenSSL
https://www.openssl.org/news/secadv_20140605.txt - US CERT - Vendor Information for VU#978508
http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=978508&SearchOrder=4 - SANS ISC - Critical OpenSSL Patch Available. Patch Now!
https://isc.sans.edu/diary/Critical+OpenSSL+Patch+Available.+Patch+Now%21/18211
Purpose
The purpose of this Advisory is to bring attention to recently released security updates for multiple vulnerabilities in McAfee products related to OpenSSL.
Assessment
McAfee has released security updates to address multiple vulnerabilities in OpenSSL. Exploitation of these vulnerabilities could lead to; Man-in-the-Middle Attack, Malicious File Execution, Injection Flaws, Denial of Service.
Affected Software:
MWG – McAfee Web Gateway – Several Versions
SIEM – McAfee Security Information and Event Management (Nitro) - Several versions
CVE Reference: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470, CVE-2014-0076.
Suggested Action
CCIRC recommends that owner/operators test and deploy the vendor released updates or workarounds to affected platforms accordingly.
References:
- McAfee Security Bulletin – Seven OpenSSL vulnerabilities patched in McAfee products
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 - CCIRC Advisory AV14-031 OpenSSL - Multiple Vulnerabilities
http://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/2014/av14-031-eng.aspx - OpenSSL
https://www.openssl.org/news/secadv_20140605.txt - US CERT - Vendor Information for VU#978508
http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=978508&SearchOrder=4 - SANS ISC - Critical OpenSSL Patch Available. Patch Now!
https://isc.sans.edu/diary/Critical+OpenSSL+Patch+Available.+Patch+Now%21/18211
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/_fl/CCIRCPublicPGPKey.txt
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589
E-mail: ps.communications-communications.sp@canada.ca
- Date modified: