lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 17 Jan 2018 22:29:39 +0000
From: security-alert@....com
Cc: recipient list not shown: ;
Subject: [security bulletin] HPSBGN02925 rev.3 - HP IceWall SSO, IceWall
 File Manager and IceWall Federation Agent, Multiple Remote Unauthorized
 Access Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c03918632

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03918632
Version: 3

HPSBGN02925 rev.3 - HP IceWall SSO, IceWall File Manager and IceWall
Federation Agent, Multiple Remote Unauthorized Access Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-12
Last Updated: 2018-01-12

Potential Security Impact: Remote: Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP IceWall SSO,
IceWall File Manager and IceWall Federation Agent. The vulnerabilities could
be exploited remotely resulting in unauthorized access.

References:

  - CVE-2013-4817
  - CVE-2013-4818
  - CVE-2013-4819
  - CVE-2013-4820

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - IceWall Federation Agent 3.0
  - IceWall File Manager 3.0
  - IceWall SSO Agent Option 8.0, 8.0(2007), and 10.0  - Included JAVA Agent
Library and SAML2 Agent Option
  - IceWall SSO certd 8.0, 8.0.1 (8.0 R1), 8.0 R2, 8.0 R3 and 10.0
  - IceWall SSO Dfw 8.0, 8.0.1 (8.0 R1), 8.0 R2, 8.0 R3 and 10.0
  - IceWall SSO Smart Device Option 10.0

BACKGROUND

  CVSS Base Metrics
  =================
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

    CVE-2013-4817
      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
      5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

    CVE-2013-4818
      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
      4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

    CVE-2013-4819
      4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
      3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)

    CVE-2013-4820
      3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
      2.1 (AV:N/AC:H/Au:S/C:P/I:N/A:N)

    Information on CVSS is documented in
    HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has made the following software updates available to resolve the
vulnerabilities:

- -   IceWall SSO 10.0 DFW for Windows Patch Release 1

- -   IceWall SSO 8.0 R2 CERTD Patch Release 7

- -   IceWall SSO 8.0 R3 CERTD Patch Release 4

- -   IceWall SSO 10.0 CERTD Patch Release 5

- -   IceWall SSO 10.0 CERTD for Windows Patch Release 1

- -   IceWall SSO 10.0 Agent Option Patch Release 2 Servlet edition

- -   IceWall SSO 8.0 Agent Option 2007 Update Release 2 Patch Release 5 IIS
edition

- -   IceWall SSO 10.0 Agent Option Patch Release 1 IIS edition

- -   IceWall SSO 10.0 Smart Device Option Patch Release 1

- -   IceWall SSO 10.0 DFW Patch Release 7

- -   IceWall SSO 10.0 Agent Option Patch Release 3 Apache edition

- -   IceWall Federation Agent 3.0 Patch Release 2

- -   IceWall SSO 8.0 R1 CERTD Patch Release 2

- -   IceWall SSO 8.0 CERTD Patch Release 1

- -   IceWall SSO 10.0 JAVA Agent Library Patch Release 1

- -   IceWall SSO 8.0 JAVA Agent Library 2007 Update Release 2 Patch Release 1

HPE has provided a mitigation workaround for the vulnerabilities for the
following products:

- -   HP IceWall SSO Version 8.0

- -   HP IceWall SSO Version 8.0 Enterprise Edition R1

- -   HP IceWall SSO Version 8.0.1 Standard Edition

- -   HP IceWall SSO Version 8.0 R2 Enterprise Edition

- -   HP IceWall SSO Version 8.0 R2 Standard Edition

- -   HP IceWall SSO Version 8.0 R3 Enterprise Edition

- -   HP IceWall SSO Version 8.0 R3 Standard Edition

- -   HP IceWall SSO Version 10.0 Enterprise Edition

- -   HP IceWall SSO Version 10.0 Standard Edition

- -   HP IceWall SSO Version 8.0 Agent Option

- -   HP IceWall SSO Version 8.0 Agent Option 2007

- -   HP IceWall SSO Version 10.0 Agent Option

- -   HP IceWall SSO Version 10.0 Agent Option Update Release 1

- -   HP IceWall File Manager Version 3.0

- -   HP IceWall File Manager Version 3.0 SP1

- -   HP IceWall File Manager Version 3.0 SP2

- -   HP IceWall File Manager Version 3.0 SP3

- -   HP IceWall File Manager Version 3.0 SP4

- -   HP IceWall SSO 8.0 SAML2 Agent Option

- -   HP IceWall Federation Agent 3.0

- -   HP IceWall SSO 8.0 JAVA Agent Library

- -   HP IceWall SSO 8.0 JAVA Agent Library 2007

- -   HP IceWall SSO 10.0 JAVA Agent Library

- -   HP IceWall SSO 10.0 Smart Device Option

HPE IceWall customers can download the software updates and mitigation
workaround information by following the instructions at the following
location:

[http://www.hpe.com/jp/icewall_patchaccess](http://www.hpe.com/jp/icewall_pat
haccess)

Please note that the HPE IceWall product is only available in Japan.

HISTORY

Version:1 (rev.1) - 19 September 2013 Initial release

Version:2 (rev.2) - 27 November 2015 Updates available for IceWall SSO 10.0
Smart Device, IceWall SSO 10.0 DFW, IceWall SSO 10.0 Agent Option, IceWall
Federation Agent, IceWall SSO 8.0 R1 CERTD, and IceWall SSO 10.0 JAVA Agent
Library. Corrected update product name for IceWall SSO 8.0 Agent Option 2007
Update Release 2 Patch Release 5 IIS edition.

Version:3 (rev.3) - 12 January 2018 Updated URL for download in Resolution
Section


Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@....com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-alert@....com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaWOOdAAoJELXhAxt7SZaigH4H/1coqDqCEwghbUaKwc834aJx
o4Ou0Ktip3MYUdYMysaTqtBaCWwzlGk/I02uFba7MdkBm/otPuWzBaW0Jd16+ZA7
0X1C1x4R3HXYpm2ZCqzrypkXXILCGHJMaQ8jRTIGqMLiOQuASMC4hxi3gyy1gRZc
UIFavvw5oI89pa0k+IimCS0Mbfb5zM7MZR7iksAIKRo8tLhOXwY06DcrbCtWYT0u
4/s59dGp4Hm3Lt37iIopOfUFD6j69AoH+zRryHRKHxQNB0aA3WflLbzVhZT2W3bg
Nk6i6nKFFwn1PC3AUzA55baYcoDnwPthQ8mgRHAAoRmaoicdYXVzy8VWO/554U8=
=+e7E
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ