VARIoT IoT vulnerabilities database
| VAR-201411-0262 | CVE-2014-0995 |
SAP NetWeaver Service disruption in a standalone enqueue server (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-201410-0101 |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Standalone Enqueue Server in SAP Netweaver 7.20, 7.01, and earlier allows remote attackers to cause a denial of service (uncontrolled recursion and crash) via a trace level with a wildcard in the Trace Pattern. SAP NetWeaver are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to crash the affected application, denying service to legitimate users.
SAP NetWeaver 7.01 and 7.20 are vulnerable; other versions may also be affected
| VAR-201411-0218 | CVE-2014-8587 | SAP NetWeaver AS ABAP and SAP HANA Used in SAPCRYPTOLIB In products such as DSA Vulnerability that is forged as a signature |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
SAPCRYPTOLIB before 5.555.38, SAPSECULIB, and CommonCryptoLib before 8.4.30, as used in SAP NetWeaver AS for ABAP and SAP HANA, allows remote attackers to spoof Digital Signature Algorithm (DSA) signatures via unspecified vectors. Multiple SAP products are prone to to a security vulnerability that may allow attackers to conduct spoofing attacks.
An attacker can exploit this issue to conduct spoofing attacks, disclose sensitive information and perform unauthorized actions. This may aid in further attacks.
The following products are vulnerable:
Versions prior to SAP SAPCRYPTOLIB 5.555.38
Versions prior to SAP SAPSECULIB 8.4.30
Versions prior to SAP CommonCryptoLib 8.4.30
| VAR-201410-1359 | CVE-2014-7281 | Tenda A32 Router Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot. The Tenda A32 Router is a wireless router product from Tenda. A remote attacker could use the vulnerability to restart the device by sending a request to the goform/SysToolReboot URL.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks.
Tenda A32 running firmware 5.07.53_CN is vulnerable; other versions may also be affected
| VAR-201410-0993 | CVE-2014-3368 | Cisco TelePresence Video Communication Server and Expressway Denial of service in software (DoS) Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco TelePresence Video Communication Server (VCS) and Expressway Software before X8.2 allow remote attackers to cause a denial of service (device reload) via a high rate of crafted packets, aka Bug ID CSCui06507. Vendors report this vulnerability Bug ID CSCui06507 Published as.Denial of service via third-party, heavily crafted packets ( Device reload ) May be in a state.
An attacker can exploit this issue to cause the kernel to crash and reload the affected system, denying service to legitimate users.
The issue is documented by Cisco Bug ID CSCui06507
| VAR-201410-0994 | CVE-2014-3369 | Cisco TelePresence Video Communication Server and Expressway Software SIP IX Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The SIP IX implementation in Cisco TelePresence Video Communication Server (VCS) and Expressway Software before X8.1.1 allows remote attackers to cause a denial of service (device reload) via crafted SDP packets, aka Bug ID CSCuo42252. Cisco TelePresence VCS and Expressway are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause the affected device to crash, denying service to legitimate users.
This issue is tracked by Cisco Bug ID CSCuo42252. The vulnerability is caused by the incorrect processing of SDP packets when the program configures the IX filter
| VAR-201410-0995 | CVE-2014-3370 | Cisco TelePresence Video Communication Server and Expressway Service disruption in software (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco TelePresence Video Communication Server (VCS) and Expressway Software before X8.1.1 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug IDs CSCum60442 and CSCum60447. Vendors have confirmed this vulnerability Bug ID CSCum60442 and CSCum60447 It is released as.By a third party SDP Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco TelePresence VCS and Expressway are prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause the affected device to crash, denying service to legitimate users.
This issue is being tracked by Cisco Bug IDs CSCum60447 and CSCum60442. The vulnerability is caused by the program not handling SIP packets correctly
| VAR-201410-0058 | CVE-2014-3397 | Cisco TelePresence MCU Software network stack Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The network stack in Cisco TelePresence MCU Software before 4.3(2.30) allows remote attackers to cause a denial of service (memory consumption) via crafted TCP packets, aka Bug ID CSCtz35468.
Successful exploits may allow an attacker to cause the device to reload, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCtz35468.
The following products running a vulnerable version of software are affected:
Cisco TelePresence MCU 4200 Series
Cisco TelePresence MCU 4500 Series
Cisco TelePresence MCU MSE 8420. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco). The vulnerability is caused by the program not filtering TCP packets adequately
| VAR-201410-0067 | CVE-2014-3408 | Cisco Prime Optical of Web Cross-site scripting vulnerability in the framework |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the web framework in Cisco Prime Optical 10 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCuq80763.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCuq80763. The solution helps operators efficiently implement end-to-end circuit creation and manage each node in the converged network through automated configuration and troubleshooting. The vulnerability is caused by the program not validating parameters correctly
| VAR-201410-1300 | CVE-2014-2647 | HP Operations Manager of HP Operations Agent Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: Medium |
Cross-site scripting (XSS) vulnerability in HP Operations Agent in HP Operations Manager (formerly OpenView Communications Broker) before 11.14 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04472444
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04472444
Version: 2
HPSBMU03126 rev.2 - HP Operations Manager/Operations Agent, Remote Cross-site
Scripting (XSS)
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible. The vulnerabilities could be exploited
resulting in remote cross-site scripting (XSS).
References:
CVE-2014-2647 (SSRT101643, SSRT101670) Cross-site Scripting (XSS)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The
Communications Broker facilitates communications between the two.
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-2647 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Jake Bernier and Matt Schmidt for
reporting CVE-2014-2647 to security-alert@hp.com.
Product
Download Location
HP Operations OS Instance v11.13
Download from SSO or
https://softwaresupport.hp.com/group/softwaresupport/home
HP Operations OS Instance v11.14
Download from SSO or
https://softwaresupport.hp.com/group/softwaresupport/home
Workaround and Hotfixes
Please contact HP Software Support for hotfixes on any other supported
versions of HP Operations Agent.
NOTE: If a higher version** of fixes is already installed (mentioned below),
no action required for this problem.
Product
Component Version
HP Operations OS Instance v11.05
HPOvBbc 11.05.024
HP Operations OS Instance v11.11
HPOvBbc 11.11.103
HP Operations OS Instance v11.12
HPOvBbc 11.12.022
** For verifying the version of the HP Operations Agent software components
on the system, you can use the following HP Operations Agent command:
ovdeploy -inv
Without the above hotfix, the following configuration variable can be set on
HP Operations Agent, to avoid this vulnerability being exploited over the
network. Restart of the Agent processes is not required after the
configuration change.
[bbc.cb]
LOCAL_INFO_ONLY=TRUE
Note: For unsupported versions, including versions of HP Operations Agent
v8.60.501 and below, setting the above configuration variable is the only
workaround available.
HISTORY
Version:1 (rev.1) - 15 October 2014 Initial release
Version:2 (rev.2) - 17 October 2014 Revised download location, resolution,
product description, and title
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlRFLwoACgkQ4B86/C0qfVkBwQCgoXQqgmB5VC576OGziGSFiYjf
HdkAni6yGYHWsqMTU1lvDqjPq7kx6s2d
=Fy5y
-----END PGP SIGNATURE-----
| VAR-201410-1144 | CVE-2014-3567 | OpenSSL of t1_lib.c of tls_decrypt_ticket Service disruption in functions (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. OpenSSL is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to crash the affected application, denying service to legitimate users.
OpenSSL prior to 0.9.8zc, 1.0.0o, and 1.0.1j are vulnerable. These vulnerabilities could be exploited remotely to create a Denial
of Service (DoS), allow unauthorized access, or a man-in-the-middle (MitM)
attack.
References:
CVE-2014-3566 Man-in-the-Middle (MitM) attack
CVE-2014-3567 Remote Unauthorized Access
CVE-2014-3568 Remote Denial of Service (DoS)
SSRT101767
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The
updates are available from the following site.
https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber
=OPENSSL11I
HP-UX Release
HP-UX OpenSSL version
B.11.11 (11i v1)
A.00.09.08zc.001_HP-UX_B.11.11_32+64.depot
B.11.23 (11i v2)
A.00.09.08zc.002a_HP-UX_B.11.23_IA-PA.depot
B.11.31 (11i v3)
A.00.09.08zc.003_HP-UX_B.11.31_IA-PA.depot
MANUAL ACTIONS: Yes - Update
Install OpenSSL A.00.09.08zc or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HP and lists recommended actions that may apply to a specific HP-UX
system. It can also download patches and create a depot automatically. For
more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
Release Date: 2015-04-01
Last Updated: 2015-04-01
Potential Security Impact: Remote disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP System
Management Homepage (SMH), HP Smart Update Manager (SUM), and HP Version
Control Agent (VCA) which are components of HP Insight Control server
deployment. These vulnerabilities are related to the SSLv3 vulnerability
known as "Padding Oracle on Downgraded Legacy Encryption" or "POODLE". The
components of HP Insight Control server deployment could be exploited
remotely to allow disclosure of information.
HP Insight Control server deployment includes HP System Management Homepage
(SMH), HP Version Control Agent (VCA), and HP Smart Update Manager (SUM) and
deploys them through the following jobs. This bulletin provides the
information needed to update the vulnerable components in HP Insight Control
server deployment.
Install HP Management Agents for Windows x86/x64
Install HP Management Agents for RHEL 5 x64
Install HP Management Agents for RHEL 6 x64
Install HP Management Agents for SLES 10 x64
Install HP Management Agents for SLES 11 x64
Upgrade Proliant Firmware
References:
CVE-2014-3508
CVE-2014-3509
CVE-2014-3511
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
CVE-2014-5139
SSRT102004
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2, v7.3.1
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-3508 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3
CVE-2014-3509 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8
CVE-2014-3511 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
CVE-2014-3513 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1
CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3
CVE-2014-3567 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1
CVE-2014-3568 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
CVE-2014-5139 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following instructions to resolve this vulnerability.
Note: For HP Insight deployment Control server v7.1.2, v7.2.0, v7.2.1 and
v7.2.2, you must upgrade to v7.3.1 and follow the steps from 1 to 11
mentioned below to resolve the vulnerability.
Delete the files smh*.exe from Component Copy Location listed in the
following table, rows 1 and 2.
Delete the files vca*.exe/vcaamd64-*.exe from Component Copy Location listed
in the following table, rows 3 and 4.
Delete the files hpsmh-7.*.rpm" from Component Copy Location listed in row 5.
In sequence, perform the steps from left to right in the following table.
First, download components from Download Link; Second, rename the component
as suggested in Rename to. Third, copy the component to the location
specified in Component Copy Location.
Table Row Number
Download Link
Rename to
Component Copy Location
1
http://www.hp.com/swpublishing/MTX-bd2042a1c7574aad90c4839efe
smhamd64-cp023964.exe
\\express\hpfeatures\hpagents-ws\components\Win2008
2
http://www.hp.com/swpublishing/MTX-062078f1ae354b7e99c86c151c
smhx86-cp023963.exe
\\express\hpfeatures\hpagents-ws\components\Win2008
3
http://www.hp.com/swpublishing/MTX-7b23e47d5d9b420b94bd1323eb
vcax86 cp025295.exe
\\express\hpfeatures\hpagents-ws\components\Win2008
4
http://www.hp.com/swpublishing/MTX-2557aa7dc1654cf6b547c1a9e4
vcaamd64-cp025296.exe
\\express\hpfeatures\hpagents-ws\components\Win2008
5
http://www.hp.com/swpublishing/MTX-5827037475e44abab586463723
Do not rename the downloaded component for this step.
\\express\hpfeatures\hpagents-sles11-x64\components
\\express\hpfeatures\hpagents-sles10-x64\components
\\express\hpfeatures\hpagents-rhel5-x64\components
\\express\hpfeatures\hpagents-rhel6-x64\components
6
http://www.hp.com/swpublishing/MTX-57ab6bb78b6e47a18718f44133
Do not rename the downloaded component for this step.
\\express\hpfeatures\hpagents-sles11-x64\components
\\express\hpfeatures\hpagents-sles10-x64\components
\\express\hpfeatures\hpagents-rhel5-x64\components
\\express\hpfeatures\hpagents-rhel6-x64\components
7
http://www.hp.com/swpublishing/MTX-34bcab41ac7e4db299e3f5f2f1
smhx86-cp025274.exe
\\express\hpfeatures\hpagents-ws\components\Win2003
8
http://www.hp.com/swpublishing/MTX-00eb9ac82e86449e8c3ba101bd
smhamd64-cp025275.exe
\\express\hpfeatures\hpagents-ws\components\Win2003
Download and extract the HP SUM component from
ftp://ftp.hp.com/pub/softlib2/software1/pubsw-windows/p991570621/v99346
Copy all content from extracted folder and paste at
\\eXpress\hpfeatures\fw-proLiant\components
Initiate Install HP Management Agents for SLES 11 x64 on the target running
SLES11 x64.
Initiate Install HP Management Agents for SLES 10 x64 on the target running
SLES10 x64.
Initiate Install HP Management Agents for RHEL 6 x64 on the target running
RHEL 6 x64.
Initiate Install HP Management Agents for RHEL 5 x64 on the target running
RHEL 5 x64.
Initiate Install HP Management Agents for Windows x86/x64 job on the target
running Windows.
HISTORY
Version:1 (rev.1) - 1 April 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: openssl security update
Advisory ID: RHSA-2014:1652-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1652.html
Issue date: 2014-10-16
CVE Names: CVE-2014-3513 CVE-2014-3567
=====================================================================
1. Summary:
Updated openssl packages that contain a backported patch to mitigate the
CVE-2014-3566 issue and fix two security issues are now available for Red
Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),
Transport Layer Security (TLS), and Datagram Transport Layer Security
(DTLS) protocols, as well as a full-strength, general purpose cryptography
library.
This update adds support for the TLS Fallback Signaling Cipher Suite Value
(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade
attacks against applications which re-connect using a lower SSL/TLS
protocol version when the initial connection indicating the highest
supported protocol version fails.
This can prevent a forceful downgrade of the communication to SSL 3.0.
The SSL 3.0 protocol was found to be vulnerable to the padding oracle
attack when using block cipher suites in cipher block chaining (CBC) mode.
This issue is identified as CVE-2014-3566, and also known under the alias
POODLE. This SSL 3.0 protocol flaw will not be addressed in a future
update; it is recommended that users configure their applications to
require at least TLS protocol version 1.0 for secure communication.
For additional information about this flaw, see the Knowledgebase article
at https://access.redhat.com/articles/1232123
A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure
Real-time Transport Protocol (SRTP) extension data. A remote attacker could
send multiple specially crafted handshake messages to exhaust all available
memory of an SSL/TLS or DTLS server. A remote attacker could exhaust all available
memory of an SSL/TLS or DTLS server by sending a large number of invalid
session tickets to that server. (CVE-2014-3567)
All OpenSSL users are advised to upgrade to these updated packages, which
contain backported patches to mitigate the CVE-2014-3566 issue and correct
the CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect,
all services linked to the OpenSSL library (such as httpd and other
SSL-enabled services) must be restarted or the system rebooted.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
openssl-1.0.1e-30.el6_6.2.src.rpm
i386:
openssl-1.0.1e-30.el6_6.2.i686.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
x86_64:
openssl-1.0.1e-30.el6_6.2.i686.rpm
openssl-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386:
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
openssl-perl-1.0.1e-30.el6_6.2.i686.rpm
openssl-static-1.0.1e-30.el6_6.2.i686.rpm
x86_64:
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
openssl-1.0.1e-30.el6_6.2.src.rpm
x86_64:
openssl-1.0.1e-30.el6_6.2.i686.rpm
openssl-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64:
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
openssl-1.0.1e-30.el6_6.2.src.rpm
i386:
openssl-1.0.1e-30.el6_6.2.i686.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
ppc64:
openssl-1.0.1e-30.el6_6.2.ppc.rpm
openssl-1.0.1e-30.el6_6.2.ppc64.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.ppc.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm
openssl-devel-1.0.1e-30.el6_6.2.ppc.rpm
openssl-devel-1.0.1e-30.el6_6.2.ppc64.rpm
s390x:
openssl-1.0.1e-30.el6_6.2.s390.rpm
openssl-1.0.1e-30.el6_6.2.s390x.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.s390.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm
openssl-devel-1.0.1e-30.el6_6.2.s390.rpm
openssl-devel-1.0.1e-30.el6_6.2.s390x.rpm
x86_64:
openssl-1.0.1e-30.el6_6.2.i686.rpm
openssl-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386:
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-perl-1.0.1e-30.el6_6.2.i686.rpm
openssl-static-1.0.1e-30.el6_6.2.i686.rpm
ppc64:
openssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm
openssl-perl-1.0.1e-30.el6_6.2.ppc64.rpm
openssl-static-1.0.1e-30.el6_6.2.ppc64.rpm
s390x:
openssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm
openssl-perl-1.0.1e-30.el6_6.2.s390x.rpm
openssl-static-1.0.1e-30.el6_6.2.s390x.rpm
x86_64:
openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
openssl-1.0.1e-30.el6_6.2.src.rpm
i386:
openssl-1.0.1e-30.el6_6.2.i686.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
x86_64:
openssl-1.0.1e-30.el6_6.2.i686.rpm
openssl-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386:
openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
openssl-perl-1.0.1e-30.el6_6.2.i686.rpm
openssl-static-1.0.1e-30.el6_6.2.i686.rpm
x86_64:
openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source:
openssl-1.0.1e-34.el7_0.6.src.rpm
x86_64:
openssl-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-libs-1.0.1e-34.el7_0.6.i686.rpm
openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-devel-1.0.1e-34.el7_0.6.i686.rpm
openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-static-1.0.1e-34.el7_0.6.i686.rpm
openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
openssl-1.0.1e-34.el7_0.6.src.rpm
x86_64:
openssl-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-libs-1.0.1e-34.el7_0.6.i686.rpm
openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-devel-1.0.1e-34.el7_0.6.i686.rpm
openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-static-1.0.1e-34.el7_0.6.i686.rpm
openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
openssl-1.0.1e-34.el7_0.6.src.rpm
ppc64:
openssl-1.0.1e-34.el7_0.6.ppc64.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm
openssl-devel-1.0.1e-34.el7_0.6.ppc.rpm
openssl-devel-1.0.1e-34.el7_0.6.ppc64.rpm
openssl-libs-1.0.1e-34.el7_0.6.ppc.rpm
openssl-libs-1.0.1e-34.el7_0.6.ppc64.rpm
s390x:
openssl-1.0.1e-34.el7_0.6.s390x.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm
openssl-devel-1.0.1e-34.el7_0.6.s390.rpm
openssl-devel-1.0.1e-34.el7_0.6.s390x.rpm
openssl-libs-1.0.1e-34.el7_0.6.s390.rpm
openssl-libs-1.0.1e-34.el7_0.6.s390x.rpm
x86_64:
openssl-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-devel-1.0.1e-34.el7_0.6.i686.rpm
openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-libs-1.0.1e-34.el7_0.6.i686.rpm
openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
openssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm
openssl-perl-1.0.1e-34.el7_0.6.ppc64.rpm
openssl-static-1.0.1e-34.el7_0.6.ppc.rpm
openssl-static-1.0.1e-34.el7_0.6.ppc64.rpm
s390x:
openssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm
openssl-perl-1.0.1e-34.el7_0.6.s390x.rpm
openssl-static-1.0.1e-34.el7_0.6.s390.rpm
openssl-static-1.0.1e-34.el7_0.6.s390x.rpm
x86_64:
openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-static-1.0.1e-34.el7_0.6.i686.rpm
openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
openssl-1.0.1e-34.el7_0.6.src.rpm
x86_64:
openssl-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-devel-1.0.1e-34.el7_0.6.i686.rpm
openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-libs-1.0.1e-34.el7_0.6.i686.rpm
openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm
openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm
openssl-static-1.0.1e-34.el7_0.6.i686.rpm
openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2014-3513.html
https://www.redhat.com/security/data/cve/CVE-2014-3567.html
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/articles/1232123
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUP940XlSAg2UNWIIRAhUYAJ4or1rZ25E0BXjTPyeDsN+keTz3twCdHDEz
qY686VXQQ02SLq5vTvKfuHk=
=McEc
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. ============================================================================
Ubuntu Security Notice USN-2385-1
October 16, 2014
openssl vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in OpenSSL.
This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libssl1.0.0 1.0.1f-1ubuntu2.7
Ubuntu 12.04 LTS:
libssl1.0.0 1.0.1-4ubuntu5.20
Ubuntu 10.04 LTS:
libssl0.9.8 0.9.8k-7ubuntu8.22
After a standard system update you need to reboot your computer to make all
the necessary changes. Summary
VMware vCenter Server, ESXi, Workstation, Player and Fusion address
several security issues. Relevant Releases
VMware Workstation 10.x prior to version 10.0.5
VMware Player 6.x prior to version 6.0.5
VMware Fusion 7.x prior to version 7.0.1
VMware Fusion 6.x prior to version 6.0.5
vCenter Server 5.5 prior to Update 2d
ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG
ESXi 5.1 without patch ESXi510-201404101-SG
ESXi 5.0 without patch ESXi500-201405101-SG
3. Problem Description
a. VMware ESXi, Workstation, Player, and Fusion host privilege
escalation vulnerability
VMware ESXi, Workstation, Player and Fusion contain an arbitrary
file write issue. Exploitation this issue may allow for privilege
escalation on the host.
The vulnerability does not allow for privilege escalation from
the guest Operating System to the host or vice-versa. This means
that host memory can not be manipulated from the Guest Operating
System.
Mitigation
For ESXi to be affected, permissions must have been added to ESXi
(or a vCenter Server managing it) for a virtual machine
administrator role or greater.
VMware would like to thank Shanon Olsson for reporting this issue to
us through JPCERT.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2014-8370 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any 6.0.5
ESXi 5.5 ESXi ESXi550-201403102-SG
ESXi 5.1 ESXi ESXi510-201404101-SG
ESXi 5.0 ESXi ESXi500-201405101-SG
b. VMware Workstation, Player, and Fusion Denial of Service
vulnerability
VMware Workstation, Player, and Fusion contain an input validation
issue in the Host Guest File System (HGFS). This issue may allow
for a Denial of Service of the Guest Operating system.
VMware would like to thank Peter Kamensky from Digital Security for
reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1043 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any 7.0.1
Fusion 6.x any 6.0.5
c. VMware ESXi, Workstation, and Player Denial of Service
vulnerability
VMware ESXi, Workstation, and Player contain an input
validation issue in VMware Authorization process (vmware-authd).
This issue may allow for a Denial of Service of the host. On
VMware ESXi and on Workstation running on Linux the Denial of
Service would be partial.
VMware would like to thank Dmitry Yudin @ret5et for reporting
this issue to us through HP's Zero Day Initiative.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1044 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any not affected
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi ESXi510-201410101-SG
ESXi 5.0 ESXi not affected
d.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2014-3513, CVE-2014-3567,
CVE-2014-3566 ("POODLE") and CVE-2014-3568 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCenter Server 5.5 any Update 2d*
vCenter Server 5.1 any patch pending
vCenter Server 5.0 any patch pending
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
* The VMware vCenter 5.5 SSO component will be
updated in a later release
e. Update to ESXi libxml2 package
The libxml2 library is updated to version libxml2-2.7.6-17
to resolve a security issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2014-3660 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
4. Solution
Please review the patch/release notes for your product and
version and verify the checksum of your downloaded file.
VMware Workstation 10.x
--------------------------------
https://www.vmware.com/go/downloadworkstation
VMware Player 6.x
--------------------------------
https://www.vmware.com/go/downloadplayer
VMware Fusion 7.x and 6.x
--------------------------------
https://www.vmware.com/go/downloadplayer
vCenter Server
----------------------------
Downloads and Documentation:
https://www.vmware.com/go/download-vsphere
ESXi 5.5 Update 2d
----------------------------
File: update-from-esxi5.5-5.5_update01.zip
md5sum: 5773844efc7d8e43135de46801d6ea25
sha1sum: 6518355d260e81b562c66c5016781db9f077161f
http://kb.vmware.com/kb/2065832
update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG
ESXi 5.5
----------------------------
File: ESXi550-201501001.zip
md5sum: b0f2edd9ad17d0bae5a11782aaef9304
sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1
http://kb.vmware.com/kb/2099265
ESXi550-201501001.zip contains ESXi550-201501101-SG
ESXi 5.1
----------------------------
File: ESXi510-201404001.zip
md5sum: 9dc3c9538de4451244a2b62d247e52c4
sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66
http://kb.vmware.com/kb/2070666
ESXi510-201404001 contains ESXi510-201404101-SG
ESXi 5.0
----------------------------
File: ESXi500-201405001.zip
md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d
sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5
http://kb.vmware.com/kb/2075521
ESXi500-201405001 contains ESXi500-201405101-SG
5. Change log
2015-01-27 VMSA-2015-0001
Initial security advisory in conjunction with the release of VMware
Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d
and, ESXi 5.5 Patches released on 2015-01-27. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories
http://kb.vmware.com/kb/2078735
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
Twitter
https://twitter.com/VMwareSRC
Copyright 2015 VMware Inc. All rights reserved.
The Montgomery ladder implementation in OpenSSL through 1.0.0l does
not ensure that certain swap operations have a constant-time behavior,
which makes it easier for local users to obtain ECDSA nonces via a
FLUSH+RELOAD cache side-channel attack (CVE-2014-0076).
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before
1.0.1g do not properly handle Heartbeat Extension packets, which allows
remote attackers to obtain sensitive information from process memory
via crafted packets that trigger a buffer over-read, as demonstrated
by reading private keys, related to d1_both.c and t1_lib.c, aka the
Heartbleed bug (CVE-2014-0160).
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before
1.0.1h does not properly restrict processing of ChangeCipherSpec
messages, which allows man-in-the-middle attackers to trigger use of a
zero-length master key in certain OpenSSL-to-OpenSSL communications,
and consequently hijack sessions or obtain sensitive information,
via a crafted TLS handshake, aka the CCS Injection vulnerability
(CVE-2014-0224).
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
products, uses nondeterministic CBC padding, which makes it easier
for man-in-the-middle attackers to obtain cleartext data via a
padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue
became relevant after the CVE-2014-3568 fix (CVE-2014-3569).
The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before
1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square
of a BIGNUM value, which might make it easier for remote attackers to
defeat cryptographic protection mechanisms via unspecified vectors,
related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and
crypto/bn/bn_asm.c (CVE-2014-3570).
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before
0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote
SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger
a loss of forward secrecy by omitting the ServerKeyExchange message
(CVE-2014-3572).
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k
does not enforce certain constraints on certificate data, which allows
remote attackers to defeat a fingerprint-based certificate-blacklist
protection mechanism by including crafted data within a
certificate's unsigned portion, related to crypto/asn1/a_verify.c,
crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c
(CVE-2014-8275).
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before
0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL
servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate
brute-force decryption by offering a weak ephemeral RSA key in a
noncompliant role, related to the FREAK issue. NOTE: the scope of
this CVE is only client code based on OpenSSL, not EXPORT_RSA issues
associated with servers or other TLS implementations (CVE-2015-0204).
The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before
1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a
Diffie-Hellman (DH) certificate without requiring a CertificateVerify
message, which allows remote attackers to obtain access without
knowledge of a private key via crafted TLS Handshake Protocol traffic
to a server that recognizes a Certification Authority with DH support
(CVE-2015-0205).
The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before
1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not
properly handle a lack of outer ContentInfo, which allows attackers to
cause a denial of service (NULL pointer dereference and application
crash) by leveraging an application that processes arbitrary PKCS#7
data and providing malformed data with ASN.1 encoding, related to
crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c (CVE-2015-0289).
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293
http://openssl.org/news/secadv_20150108.txt
http://openssl.org/news/secadv_20150319.txt
_______________________________________________________________________
Updated Packages:
Mandriva Business Server 2/X86_64:
324a85f7e1165ab02881e44dbddaf599 mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm
9c0bfb6ebd43cb6d81872abf71b4f85f mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm
58df54e72ca7270210c7d8dd23df402b mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm
b5313ffb5baaa65aea05eb05486d309a mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm
a9890ce4c33630cb9e00f3b2910dd784 mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm
521297a5fe26e2de0c1222d8d03382d1 mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFVFTm1mqjQ0CJFipgRAoYFAKCaubn00colzVNnUBFjSElyDptGMQCfaGoS
kz0ex6eI6hA6qSwklA2NoXY=
=GYjX
-----END PGP SIGNATURE-----
.
Please refer to the RESOLUTION
section below for a list of impacted products.
Note: mitigation instructions are included below if the following software
updates cannot be applied.
Family
Fixed Version
HP Branded Products Impacted
H3C Branded Products Impacted
3Com Branded Products Impacted
CVE
12900 Switch Series
R1005P15
JG619A HP FF 12910 Switch AC Chassis
JG621A HP FF 12910 Main Processing Unit
JG632A HP FF 12916 Switch AC Chassis
JG634A HP FF 12916 Main Processing Unit
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
12500
R1828P06
JC085A HP A12518 Switch Chassis
JC086A HP A12508 Switch Chassis
JC652A HP 12508 DC Switch Chassis
JC653A HP 12518 DC Switch Chassis
JC654A HP 12504 AC Switch Chassis
JC655A HP 12504 DC Switch Chassis
JF430A HP A12518 Switch Chassis
JF430B HP 12518 Switch Chassis
JF430C HP 12518 AC Switch Chassis
JF431A HP A12508 Switch Chassis
JF431B HP 12508 Switch Chassis
JF431C HP 12508 AC Switch Chassis
JC072B HP 12500 Main Processing Unit
JC808A HP 12500 TAA Main Processing Unit
H3C S12508 Routing Switch(AC-1) (0235A0GE)
H3C S12518 Routing Switch(AC-1) (0235A0GF)
H3C S12508 Chassis (0235A0E6)
H3C S12508 Chassis (0235A38N)
H3C S12518 Chassis (0235A0E7)
H3C S12518 Chassis (0235A38M)
H3C 12508 DC Switch Chassis (0235A38L)
H3C 12518 DC Switch Chassis (0235A38K)
CVE-2014-3566
CVE-2014-3568
12500 (Comware v7)
R7328P04
JC085A HP A12518 Switch Chassis
JC086A HP A12508 Switch Chassis
JC652A HP 12508 DC Switch Chassis
JC653A HP 12518 DC Switch Chassis
JC654A HP 12504 AC Switch Chassis
JC655A HP 12504 DC Switch Chassis
JF430A HP A12518 Switch Chassis
JF430B HP 12518 Switch Chassis
JF430C HP 12518 AC Switch Chassis
JF431A HP A12508 Switch Chassis
JF431B HP 12508 Switch Chassis
JF431C HP 12508 AC Switch Chassis
JC072B HP 12500 Main Processing Unit
JG497A HP 12500 MPU w/Comware V7 OS
JG782A HP FF 12508E AC Switch Chassis
JG783A HP FF 12508E DC Switch Chassis
JG784A HP FF 12518E AC Switch Chassis
JG785A HP FF 12518E DC Switch Chassis
JG802A HP FF 12500E MPU
H3C S12508 Routing Switch(AC-1) (0235A0GE)
H3C S12518 Routing Switch(AC-1) (0235A0GF)
H3C S12508 Chassis (0235A0E6)
H3C S12508 Chassis (0235A38N)
H3C S12518 Chassis (0235A0E7)
H3C S12518 Chassis (0235A38M)
H3C 12508 DC Switch Chassis (0235A38L)
H3C 12518 DC Switch Chassis (0235A38K)
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
11900 Switch Series
R2111P06
JG608A HP FF 11908-V Switch Chassis
JG609A HP FF 11900 Main Processing Unit
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
10500 Switch Series (Comware v5)
R1208P10
JC611A HP 10508-V Switch Chassis
JC612A HP 10508 Switch Chassis
JC613A HP 10504 Switch Chassis
JC614A HP 10500 Main Processing Unit
JC748A HP 10512 Switch Chassis
JG375A HP 10500 TAA Main Processing Unit
JG820A HP 10504 TAA Switch Chassis
JG821A HP 10508 TAA Switch Chassis
JG822A HP 10508-V TAA Switch Chassis
JG823A HP 10512 TAA Switch Chassis
CVE-2014-3566
CVE-2014-3568
10500 Switch Series (Comware v7)
R2111P06
JC611A HP 10508-V Switch Chassis
JC612A HP 10508 Switch Chassis
JC613A HP 10504 Switch Chassis
JC748A HP 10512 Switch Chassis
JG820A HP 10504 TAA Switch Chassis
JG821A HP 10508 TAA Switch Chassis
JG822A HP 10508-V TAA Switch Chassis
JG823A HP 10512 TAA Switch Chassis
JG496A HP 10500 Type A MPU w/Comware v7 OS
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
9500E
R1828P06
JC124A HP A9508 Switch Chassis
JC124B HP 9505 Switch Chassis
JC125A HP A9512 Switch Chassis
JC125B HP 9512 Switch Chassis
JC474A HP A9508-V Switch Chassis
JC474B HP 9508-V Switch Chassis
H3C S9505E Routing-Switch Chassis (0235A0G6)
H3C S9512E Routing-Switch Chassis (0235A0G7)
H3C S9508E-V Routing-Switch Chassis (0235A38Q)
H3C S9505E Chassis w/ Fans (0235A38P)
H3C S9512E Chassis w/ Fans (0235A38R)
CVE-2014-3566
CVE-2014-3568
7900
R2122
JG682A HP FlexFabric 7904 Switch Chassis
JH001A HP FF 7910 2.4Tbps Fabric / MPU
JG842A HP FF 7910 7.2Tbps Fabric / MPU
JG841A HP FF 7910 Switch Chassis
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
7500 Switch Series
R6708P10
JC666A HP A7503-S 144 Gbps Fab/MPU w 24p Gig-T
JC697A HP A7502 TAA Main Processing Unit
JC698A HP A7503S 144 Gbps TAA Fab/MPU w 24p GbE
JC699A HP A7500 384Gbps TAA Fab/MPU w 2p 10-GbE
JC700A HP A7500 384 Gbps TAA Fabric / MPU
JC701A HP A7510 768 Gbps TAA Fabric / MPU
JD193A HP 384 Gbps A7500 Fab Mod w/2 XFP Ports
JD193B HP 7500 384Gbps Fab Mod w/2 XFP Ports
JD194A HP 384 Gbps Fabric A7500 Module
JD194B HP 7500 384Gbps Fabric Module
JD195A HP 7500 384Gbps Advanced Fabric Module
JD196A HP 7502 Fabric Module
JD220A HP 7500 768Gbps Fabric Module
JD238A HP A7510 Switch Chassis
JD238B HP 7510 Switch Chassis
JD239A HP A7506 Switch Chassis
JD239B HP 7506 Switch Chassis
JD240A HP A7503 Switch Chassis
JD240B HP 7503 Switch Chassis
JD241A HP A7506 Vertical Switch Chassis
JD241B HP 7506-V Switch Chassis
JD242A HP A7502 Switch Chassis
JD242B HP 7502 Switch Chassis
JD243A HP A7503 Switch Chassis w/1 Fabric Slot
JD243B HP 7503-S Switch Chassis w/1 Fabric Slot
H3C S7502E Ethernet Switch Chassis with Fan (0235A0G4)
H3C S7503E Ethernet Switch Chassis with Fan (0235A0G2)
H3C S7503E-S Ethernet Switch Chassis with Fan (0235A0G5)
H3C S7506E Ethernet Switch Chassis with Fan (0235A0G1)
H3C S7506E-V Ethernet Switch Chassis with Fan (0235A0G3)
H3C S7510E Ethernet Switch Chassis with Fan (0235A0G0)
H3C S7502E Chassis w/ fans (0235A29A)
H3C S7503E Chassis w/ fans (0235A27R)
H3C S7503E-S Chassis w/ fans (0235A33R)
H3C S7506E Chassis w/ fans (0235A27Q)
H3C S7506E-V Chassis w/ fans (0235A27S)
CVE-2014-3566
CVE-2014-3568
HSR6800
R3303P18
JG361A HP HSR6802 Router Chassis
JG362A HP HSR6804 Router Chassis
JG363A HP HSR6808 Router Chassis
JG364A HP HSR6800 RSE-X2 Router MPU
JG779A HP HSR6800 RSE-X2 Router TAA MPU
CVE-2014-3566
CVE-2014-3568
HSR6800 Russian Version
R3303P18
JG361A HP HSR6802 Router Chassis
JG362A HP HSR6804 Router Chassis
JG363A HP HSR6808 Router Chassis
JG364A HP HSR6800 RSE-X2 Router MPU
JG779A HP HSR6800 RSE-X2 Router TAA MPU
CVE-2014-3566
CVE-2014-3568
HSR6602
R3303P18
JG353A HP HSR6602-G Router
JG354A HP HSR6602-XG Router
JG776A HP HSR6602-G TAA Router
JG777A HP HSR6602-XG TAA Router
JG777A HP HSR6602-XG TAA Router
CVE-2014-3566
CVE-2014-3568
HSR6602 Russian Version
R3303P18
JG353A HP HSR6602-G Router
JG354A HP HSR6602-XG Router
JG776A HP HSR6602-G TAA Router
JG777A HP HSR6602-XG TAA Router
CVE-2014-3566
CVE-2014-3568
6602
R3303P18
JC176A HP 6602 Router Chassis
H3C SR6602 1U Router Host (0235A27D)
CVE-2014-3566
CVE-2014-3568
6602 Russian Version
R3303P18
JC176A HP 6602 Router Chassis
H3C SR6602 1U Router Host (0235A27D)
CVE-2014-3566
CVE-2014-3568
A6600
R3303P18
JC165A HP 6600 RPE-X1 Router Module
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JC566A HP A6600 RSE-X1 Main Processing Unit
JG780A HP 6600 RSE-X1 Router TAA MPU
H3C RT-SR66-RPE-X1-H3 (0231A761)
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
A6600 Russian Version
R3303P18
JC165A HP 6600 RPE-X1 Router Module
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JC566A HP A6600 RSE-X1 Main Processing Unit
JG780A HP 6600 RSE-X1 Router TAA MPU
H3C RT-SR66-RPE-X1-H3 (0231A761)
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
6600 MCP
R3303P18
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JG778A HP 6600 MCP-X2 Router TAA MPU. JG355A HP 6600 MCP-X1 Router MPU
JG356A HP 6600 MCP-X2 Router MPU
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
6600 MCP Russian Version
R3303P18
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JG355A HP 6600 MCP-X1 Router MPU
JG356A HP 6600 MCP-X2 Router MPU
JG776A HP HSR6602-G TAA Router
JG777A HP HSR6602-XG TAA Router
JG778A HP 6600 MCP-X2 Router TAA MPU
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
5920 Switch Series
R2311P05
JG296A HP 5920AF-24XG Switch
JG555A HP 5920AF-24XG TAA Switch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5900 Switch Series
R2311P05
JC772A HP 5900AF-48XG-4QSFP+ Switch
JG336A HP 5900AF-48XGT-4QSFP+ Switch
JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
JG838A HP FF 5900CP-48XG-4QSFP+ Switch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5830 Switch Series
R1118P11
JC691A HP A5830AF-48G Switch w/1 Interface Slot
JC694A HP A5830AF-96G Switch
JG316A HP 5830AF-48G TAA Switch w/1 Intf Slot
JG374A HP 5830AF-96G TAA Switch
CVE-2014-3566
CVE-2014-3568
5820 Switch Series
R1809P03
JC102A HP 5820-24XG-SFP+ Switch
JC106A HP 5820-14XG-SFP+ Switch with 2 Slots
JG219A HP 5820AF-24XG Switch
JG243A HP 5820-24XG-SFP+ TAA-compliant Switch
JG259A HP 5820X-14XG-SFP+ TAA Switch w 2 Slots
H3C S5820X-28C 14 port (SFP Plus ) Plus 4-port BT (RJ45) Plus 2 media
modules Plus OSM (0235A37L)
H3C S5820X-28S 24-port 10GBASE-X (SFP Plus ) Plus 4-port 10/100/1000BASE-T
(RJ45) (0235A370)
CVE-2014-3566
CVE-2014-3568
5800 Switch Series
R1809P03
JC099A HP 5800-24G-PoE Switch
JC100A HP 5800-24G Switch
JC101A HP 5800-48G Switch with 2 Slots
JC103A HP 5800-24G-SFP Switch
JC104A HP 5800-48G-PoE Switch
JC105A HP 5800-48G Switch
JG225A HP 5800AF-48G Switch
JG242A HP 5800-48G-PoE+ TAA Switch w 2 Slots
JG254A HP 5800-24G-PoE+ TAA-compliant Switch
JG255A HP 5800-24G TAA-compliant Switch
JG256A HP 5800-24G-SFP TAA Switch w 1 Intf Slt
JG257A HP 5800-48G-PoE+ TAA Switch with 1 Slot
JG258A HP 5800-48G TAA Switch w 1 Intf Slot
H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot
(0235A36U)
H3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X
(SFP Plus ) Plus 1 media module PoE (0235A36S)
H3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus
media module (no power) (0235A374)
H3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus
) Plus media module (0235A379)
H3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module
(0235A378)
H3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM
(0235A36W)
CVE-2014-3566
CVE-2014-3568
5700
R2311P05
JG894A HP FF 5700-48G-4XG-2QSFP+ Switch
JG895A HP FF 5700-48G-4XG-2QSFP+ TAA Switch
JG896A HP FF 5700-40XG-2QSFP+ Switch
JG897A HP FF 5700-40XG-2QSFP+ TAA Switch
JG898A HP FF 5700-32XGT-8XG-2QSFP+ Switch
JG899A HP FF 5700-32XGT-8XG-2QSFP+ TAA Switch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5500 HI Switch Series
R5501P06
JG311A HP HI 5500-24G-4SFP w/2 Intf Slts Switch
JG312A HP HI 5500-48G-4SFP w/2 Intf Slts Switch
JG541A HP 5500-24G-PoE+-4SFP HI Switch w/2 Slt
JG542A HP 5500-48G-PoE+-4SFP HI Switch w/2 Slt
JG543A HP 5500-24G-SFP HI Switch w/2 Intf Slt
JG679A HP 5500-24G-PoE+-4SFP HI TAA Swch w/2Slt
JG680A HP 5500-48G-PoE+-4SFP HI TAA Swch w/2Slt
JG681A HP 5500-24G-SFP HI TAA Swch w/2Slt
CVE-2014-3566
CVE-2014-3568
5500 EI Switch Series
R2221P08
JD373A HP 5500-24G DC EI Switch
JD374A HP 5500-24G-SFP EI Switch
JD375A HP 5500-48G EI Switch
JD376A HP 5500-48G-PoE EI Switch
JD377A HP 5500-24G EI Switch
JD378A HP 5500-24G-PoE EI Switch
JD379A HP 5500-24G-SFP DC EI Switch
JG240A HP 5500-48G-PoE+ EI Switch w/2 Intf Slts
JG241A HP 5500-24G-PoE+ EI Switch w/2 Intf Slts
JG249A HP 5500-24G-SFP EI TAA Switch w 2 Slts
JG250A HP 5500-24G EI TAA Switch w 2 Intf Slts
JG251A HP 5500-48G EI TAA Switch w 2 Intf Slts
JG252A HP 5500-24G-PoE+ EI TAA Switch w/2 Slts
JG253A HP 5500-48G-PoE+ EI TAA Switch w/2 Slts
H3C S5500-28C-EI Ethernet Switch (0235A253)
H3C S5500-28F-EI Eth Switch AC Single (0235A24U)
H3C S5500-52C-EI Ethernet Switch (0235A24X)
H3C S5500-28C-EI-DC Ethernet Switch (0235A24S)
H3C S5500-28C-PWR-EI Ethernet Switch (0235A255)
H3C S5500-28F-EI Eth Swtch DC Single Pwr (0235A259)
H3C S5500-52C-PWR-EI Ethernet Switch (0235A251)
CVE-2014-3566
CVE-2014-3568
5500 SI Switch Series
R2221P08
JD369A HP 5500-24G SI Switch
JD370A HP 5500-48G SI Switch
JD371A HP 5500-24G-PoE SI Switch
JD372A HP 5500-48G-PoE SI Switch
JG238A HP 5500-24G-PoE+ SI Switch w/2 Intf Slts
JG239A HP 5500-48G-PoE+ SI Switch w/2 Intf Slts
H3C S5500-28C-SI Ethernet Switch (0235A04U)
H3C S5500-52C-SI Ethernet Switch (0235A04V)
H3C S5500-28C-PWR-SI Ethernet Switch (0235A05H)
H3C S5500-52C-PWR-SI Ethernet Switch (0235A05J)
CVE-2014-3566
CVE-2014-3568
5130 EI switch Series
R3108P03
JG932A HP 5130-24G-4SFP+ EI Switch
JG933A HP 5130-24G-SFP-4SFP+ EI Switch
JG934A HP 5130-48G-4SFP+ EI Switch
JG936A HP 5130-24G-PoE+-4SFP+ EI Swch
JG937A HP 5130-48G-PoE+-4SFP+ EI Swch
JG975A HP 5130-24G-4SFP+ EI BR Switch
JG976A HP 5130-48G-4SFP+ EI BR Switch
JG977A HP 5130-24G-PoE+-4SFP+ EI BR Swch
JG978A HP 5130-48G-PoE+-4SFP+ EI BR Swch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5120 EI Switch Series
R2221P08
JE066A HP 5120-24G EI Switch
JE067A HP 5120-48G EI Switch
JE068A HP 5120-24G EI Switch with 2 Slots
JE069A HP 5120-48G EI Switch with 2 Slots
JE070A HP 5120-24G-PoE EI Switch with 2 Slots
JE071A HP 5120-48G-PoE EI Switch with 2 Slots
JG236A HP 5120-24G-PoE+ EI Switch w/2 Intf Slts
JG237A HP 5120-48G-PoE+ EI Switch w/2 Intf Slts
JG245A HP 5120-24G EI TAA Switch w 2 Intf Slts
JG246A HP 5120-48G EI TAA Switch w 2 Intf Slts
JG247A HP 5120-24G-PoE+ EI TAA Switch w 2 Slts
JG248A HP 5120-48G-PoE+ EI TAA Switch w 2 Slts
H3C S5120-24P-EI 24GE Plus 4ComboSFP (0235A0BQ)
H3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt (0235A0BS)
H3C S5120-48P-EI 48GE Plus 4ComboSFP (0235A0BR)
H3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt (0235A0BT)
H3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE (0235A0BU)
H3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE (0235A0BV)
CVE-2014-3566
CVE-2014-3568
5120 SI switch Series
R1513P95
JE072A HP 5120-48G SI Switch
JE073A HP 5120-16G SI Switch
JE074A HP 5120-24G SI Switch
JG091A HP 5120-24G-PoE+ (370W) SI Switch
JG092A HP 5120-24G-PoE+ (170W) SI Switch
H3C S5120-52P-SI 48GE Plus 4 SFP (0235A41W)
H3C S5120-20P-SI L2
16GE Plus 4SFP (0235A42B)
H3C S5120-28P-SI 24GE Plus 4 SFP (0235A42D)
H3C S5120-28P-HPWR-SI (0235A0E5)
H3C S5120-28P-PWR-SI (0235A0E3)
CVE-2014-3566
CVE-2014-3568
4800 G Switch Series
R2221P08
JD007A HP 4800-24G Switch
JD008A HP 4800-24G-PoE Switch
JD009A HP 4800-24G-SFP Switch
JD010A HP 4800-48G Switch
JD011A HP 4800-48G-PoE Switch
3Com Switch 4800G 24-Port (3CRS48G-24-91)
3Com Switch 4800G 24-Port SFP (3CRS48G-24S-91)
3Com Switch 4800G 48-Port (3CRS48G-48-91)
3Com Switch 4800G PWR 24-Port (3CRS48G-24P-91)
3Com Switch 4800G PWR 48-Port (3CRS48G-48P-91)
CVE-2014-3566
CVE-2014-3568
4510G Switch Series
R2221P08
JF428A HP 4510-48G Switch
JF847A HP 4510-24G Switch
3Com Switch 4510G 48 Port (3CRS45G-48-91)
3Com Switch 4510G PWR 24-Port (3CRS45G-24P-91)
3Com Switch E4510-24G (3CRS45G-24-91)
CVE-2014-3566
CVE-2014-3568
4210G Switch Series
R2221P08
JF844A HP 4210-24G Switch
JF845A HP 4210-48G Switch
JF846A HP 4210-24G-PoE Switch
3Com Switch 4210-24G (3CRS42G-24-91)
3Com Switch 4210-48G (3CRS42G-48-91)
3Com Switch E4210-24G-PoE (3CRS42G-24P-91)
CVE-2014-3566
CVE-2014-3568
3610 Switch Series
R5319P10
JD335A HP 3610-48 Switch
JD336A HP 3610-24-4G-SFP Switch
JD337A HP 3610-24-2G-2G-SFP Switch
JD338A HP 3610-24-SFP Switch
H3C S3610-52P - model LS-3610-52P-OVS (0235A22C)
H3C S3610-28P - model LS-3610-28P-OVS (0235A22D)
H3C S3610-28TP - model LS-3610-28TP-OVS (0235A22E)
H3C S3610-28F - model LS-3610-28F-OVS (0235A22F)
CVE-2014-3566
CVE-2014-3568
3600 V2 Switch Series
R2110P03
JG299A HP 3600-24 v2 EI Switch
JG300A HP 3600-48 v2 EI Switch
JG301A HP 3600-24-PoE+ v2 EI Switch
JG301B HP 3600-24-PoE+ v2 EI Switch
JG302A HP 3600-48-PoE+ v2 EI Switch
JG302B HP 3600-48-PoE+ v2 EI Switch
JG303A HP 3600-24-SFP v2 EI Switch
JG304A HP 3600-24 v2 SI Switch
JG305A HP 3600-48 v2 SI Switch
JG306A HP 3600-24-PoE+ v2 SI Switch
JG306B HP 3600-24-PoE+ v2 SI Switch
JG307A HP 3600-48-PoE+ v2 SI Switch
JG307B HP 3600-48-PoE+ v2 SI Switch
CVE-2014-3566
CVE-2014-3568
3100V2
R5203P11
JD313B HP 3100-24-PoE v2 EI Switch
JD318B HP 3100-8 v2 EI Switch
JD319B HP 3100-16 v2 EI Switch
JD320B HP 3100-24 v2 EI Switch
JG221A HP 3100-8 v2 SI Switch
JG222A HP 3100-16 v2 SI Switch
JG223A HP 3100-24 v2 SI Switch
CVE-2014-3566
CVE-2014-3568
3100V2-48
R2110P03
JG315A HP 3100-48 v2 Switch
CVE-2014-3566
CVE-2014-3568
1920
R1105
JG920A HP 1920-8G Switch
JG921A HP 1920-8G-PoE+ (65W) Switch
JG922A HP 1920-8G-PoE+ (180W) Switch
JG923A HP 1920-16G Switch
JG924A HP 1920-24G Switch
JG925A HP 1920-24G-PoE+ (180W) Switch
JG926A HP 1920-24G-PoE+ (370W) Switch
JG927A HP 1920-48G Switch
CVE-2014-3566
CVE-2014-3568
1910 R11XX
R1107
JG536A HP 1910-8 Switch
JG537A HP 1910-8 -PoE+ Switch
JG538A HP 1910-24 Switch
JG539A HP 1910-24-PoE+ Switch
JG540A HP 1910-48 Switch
CVE-2014-3566
CVE-2014-3568
1910 R15XX
R1513P95
JE005A HP 1910-16G Switch
JE006A HP 1910-24G Switch
JE007A HP 1910-24G-PoE (365W) Switch
JE008A HP 1910-24G-PoE(170W) Switch
JE009A HP 1910-48G Switch
JG348A HP 1910-8G Switch
JG349A HP 1910-8G-PoE+ (65W) Switch
JG350A HP 1910-8G-PoE+ (180W) Switch
CVE-2014-3566
CVE-2014-3568
1620
R1104
JG912A HP 1620-8G Switch
JG913A HP 1620-24G Switch
JG914A HP 1620-48G Switch
CVE-2014-3566
CVE-2014-3568
MSR20-1X
R2513P33
JD431A HP MSR20-10 Router
JD667A HP MSR20-15 IW Multi-Service Router
JD668A HP MSR20-13 Multi-Service Router
JD669A HP MSR20-13 W Multi-Service Router
JD670A HP MSR20-15 A Multi-Service Router
JD671A HP MSR20-15 AW Multi-Service Router
JD672A HP MSR20-15 I Multi-Service Router
JD673A HP MSR20-11 Multi-Service Router
JD674A HP MSR20-12 Multi-Service Router
JD675A HP MSR20-12 W Multi-Service Router
JD676A HP MSR20-12 T1 Multi-Service Router
JF236A HP MSR20-15-I Router
JF237A HP MSR20-15-A Router
JF238A HP MSR20-15-I-W Router
JF239A HP MSR20-11 Router
JF240A HP MSR20-13 Router
JF241A HP MSR20-12 Router
JF806A HP MSR20-12-T Router
JF807A HP MSR20-12-W Router
JF808A HP MSR20-13-W Router
JF809A HP MSR20-15-A-W Router
JF817A HP MSR20-15 Router
JG209A HP MSR20-12-T-W Router (NA)
JG210A HP MSR20-13-W Router (NA)
H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)
H3C MSR 20-10 (0235A0A7)
H3C RT-MSR2011-AC-OVS-H3 (0235A395)
H3C RT-MSR2012-AC-OVS-H3 (0235A396)
H3C RT-MSR2012-AC-OVS-W-H3 (0235A397)
H3C RT-MSR2012-T-AC-OVS-H3 (0235A398)
H3C RT-MSR2013-AC-OVS-H3 (0235A390)
H3C RT-MSR2013-AC-OVS-W-H3 (0235A391)
H3C RT-MSR2015-AC-OVS-A-H3 (0235A392)
H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)
H3C RT-MSR2015-AC-OVS-I-H3 (0235A394)
H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)
H3C MSR 20-11 (0235A31V)
H3C MSR 20-12 (0235A32E)
H3C MSR 20-12 T1 (0235A32B)
H3C MSR 20-13 (0235A31W)
H3C MSR 20-13 W (0235A31X)
H3C MSR 20-15 A (0235A31Q)
H3C MSR 20-15 A W (0235A31R)
H3C MSR 20-15 I (0235A31N)
H3C MSR 20-15 IW (0235A31P)
H3C MSR20-12 W (0235A32G)
CVE-2014-3566
CVE-2014-3568
MSR30
R2513P33
JD654A HP MSR30-60 POE Multi-Service Router
JD657A HP MSR30-40 Multi-Service Router
JD658A HP MSR30-60 Multi-Service Router
JD660A HP MSR30-20 POE Multi-Service Router
JD661A HP MSR30-40 POE Multi-Service Router
JD666A HP MSR30-20 Multi-Service Router
JF229A HP MSR30-40 Router
JF230A HP MSR30-60 Router
JF232A HP RT-MSR3040-AC-OVS-AS-H3
JF235A HP MSR30-20 DC Router
JF284A HP MSR30-20 Router
JF287A HP MSR30-40 DC Router
JF801A HP MSR30-60 DC Router
JF802A HP MSR30-20 PoE Router
JF803A HP MSR30-40 PoE Router
JF804A HP MSR30-60 PoE Router
H3C MSR 30-20 Router (0235A328)
H3C MSR 30-40 Router Host(DC) (0235A268)
H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)
H3C RT-MSR3020-DC-OVS-H3 (0235A267)
H3C RT-MSR3040-AC-OVS-H (0235A299)
H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)
H3C RT-MSR3060-AC-OVS-H3 (0235A320)
H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)
H3C RT-MSR3060-DC-OVS-H3 (0235A269)
H3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S)
H3C MSR 30-20 (0235A19L)
H3C MSR 30-20 POE (0235A239)
H3C MSR 30-40 (0235A20J)
H3C MSR 30-40 POE (0235A25R)
H3C MSR 30-60 (0235A20K)
H3C MSR 30-60 POE (0235A25S)
H3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V)
CVE-2014-3566
CVE-2014-3568
MSR30-16
R2513P33
JD659A HP MSR30-16 POE Multi-Service Router
JD665A HP MSR30-16 Multi-Service Router
JF233A HP MSR30-16 Router
JF234A HP MSR30-16 PoE Router
H3C RT-MSR3016-AC-OVS-H3 (0235A327)
H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)
H3C MSR 30-16 (0235A237)
H3C MSR 30-16 POE (0235A238)
CVE-2014-3566
CVE-2014-3568
MSR30-1X
R2513P33
JF800A HP MSR30-11 Router
JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
JG182A HP MSR30-11E Router
JG183A HP MSR30-11F Router
JG184A HP MSR30-10 DC Router
H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)
H3C RT-MSR3011-AC-OVS-H3 (0235A29L)
CVE-2014-3566
CVE-2014-3568
MSR50
R2513P33
JD433A HP MSR50-40 Router
JD653A HP MSR50 Processor Module
JD655A HP MSR50-40 Multi-Service Router
JD656A HP MSR50-60 Multi-Service Router
JF231A HP MSR50-60 Router
JF285A HP MSR50-40 DC Router
JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
H3C MSR 50-40 Router (0235A297)
H3C MSR5040-DC-OVS-H3C (0235A20P)
H3C RT-MSR5060-AC-OVS-H3 (0235A298)
H3C MSR 50-40 Chassis (0235A20N)
H3C MSR 50-60 Chassis (0235A20L)
CVE-2014-3566
CVE-2014-3568
MSR50-G2
R2513P33
JD429A HP MSR50 G2 Processor Module
JD429B HP MSR50 G2 Processor Module
H3C H3C MSR 50 Processor Module-G2 (0231A84Q)
H3C MSR 50 High Performance Main Processing Unit 3GE (Combo)
256F/1GD(0231A0KL)
CVE-2014-3566
CVE-2014-3568
MSR20 Russian version
MSR201X_5.20.R2513L40.RU
JD663B HP MSR20-21 Router
JF228A HP MSR20-40 Router
JF283A HP MSR20-20 Router
H3C RT-MSR2020-AC-OVS-H3C (0235A324)
H3C RT-MSR2040-AC-OVS-H3 (0235A326)
CVE-2014-3566
CVE-2014-3568
MSR20-1X Russian version
MSR201X_5.20.R2513L40.RU
JD431A HP MSR20-10 Router
JF236A HP MSR20-15-I Router
JF237A HP MSR20-15-A Router
JF238A HP MSR20-15-I-W Router
JF239A HP MSR20-11 Router
JF240A HP MSR20-13 Router
JF241A HP MSR20-12 Router
JF806A HP MSR20-12-T Router
JF807A HP MSR20-12-W Router
JF808A HP MSR20-13-W Router
JF809A HP MSR20-15-A-W Router
JF817A HP MSR20-15 Router
H3C MSR 20-10 (0235A0A7)
H3C RT-MSR2015-AC-OVS-I-H3 (0235A394)
H3C RT-MSR2015-AC-OVS-A-H3 (0235A392)
H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)
H3C RT-MSR2011-AC-OVS-H3 (0235A395)
H3C RT-MSR2013-AC-OVS-H3 (0235A390)
H3C RT-MSR2012-AC-OVS-H3 (0235A396)
H3C RT-MSR2012-T-AC-OVS-H3 (0235A398)
H3C RT-MSR2012-AC-OVS-W-H3 (0235A397)
H3C RT-MSR2013-AC-OVS-W-H3 (0235A391)
H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)
H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)
CVE-2014-3566
CVE-2014-3568
MSR30 Russian version
MSR201X_5.20.R2513L40.RU
JF229A HP MSR30-40 Router
JF230A HP MSR30-60 Router
JF235A HP MSR30-20 DC Router
JF284A HP MSR30-20 Router
JF287A HP MSR30-40 DC Router
JF801A HP MSR30-60 DC Router
JF802A HP MSR30-20 PoE Router
JF803A HP MSR30-40 PoE Router
JF804A HP MSR30-60 PoE Router
H3C RT-MSR3040-AC-OVS-H (0235A299)
H3C RT-MSR3060-AC-OVS-H3 (0235A320)
H3C RT-MSR3020-DC-OVS-H3 (0235A267)
H3C MSR 30-20 Router (0235A328)
H3C MSR 30-40 Router Host(DC) (0235A268)
H3C RT-MSR3060-DC-OVS-H3 (0235A269)
H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)
H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)
H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)
CVE-2014-3566
CVE-2014-3568
MSR30-16 Russian version
MSR201X_5.20.R2513L40.RU
JF233A HP MSR30-16 Router
JF234A HP MSR30-16 PoE Router
H3C RT-MSR3016-AC-OVS-H3 (0235A327)
H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)
CVE-2014-3566
CVE-2014-3568
MSR30-1X Russian version
MSR201X_5.20.R2513L40.RU
JF800A HP MSR30-11 Router
JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
JG182A HP MSR30-11E Router
JG183A HP MSR30-11F Router
JG184A HP MSR30-10 DC Router
H3C RT-MSR3011-AC-OVS-H3 (0235A29L)
H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)
CVE-2014-3566
CVE-2014-3568
MSR50 Russian version
MSR201X_5.20.R2513L40.RU
JD433A HP MSR50-40 Router
JD653A HP MSR50 Processor Module
JD655A HP MSR50-40 Multi-Service Router
JD656A HP MSR50-60 Multi-Service Router
JF231A HP MSR50-60 Router
JF285A HP MSR50-40 DC Router
JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
H3C MSR 50-40 Router (0235A297)
H3C MSR 50 Processor Module (0231A791)
H3C MSR 50-40 Chassis (0235A20N)
H3C MSR 50-60 Chassis (0235A20L)
H3C RT-MSR5060-AC-OVS-H3 (0235A298)
H3C MSR5040-DC-OVS-H3C (0235A20P)
CVE-2014-3566
CVE-2014-3568
MSR50 G2 Russian version
MSR201X_5.20.R2513L40.RU
JD429B HP MSR50 G2 Processor Module
H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD
(0231A0KL)
CVE-2014-3566
CVE-2014-3568
MSR9XX
R2513P33
JF812A HP MSR900 Router
JF813A HP MSR920 Router
JF814A HP MSR900-W Router
JF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr
JG207A HP MSR900-W Router (NA)
JG208A HP MSR920-W Router (NA)
H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b
(0235A0C2)
H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX)
H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)
H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)
CVE-2014-3566
CVE-2014-3568
MSR93X
R2513P33
JG512A HP MSR930 Wireless Router
JG513A HP MSR930 3G Router
JG514A HP MSR931 Router
JG515A HP MSR931 3G Router
JG516A HP MSR933 Router
JG517A HP MSR933 3G Router
JG518A HP MSR935 Router
JG519A HP MSR935 Wireless Router
JG520A HP MSR935 3G Router
JG531A HP MSR931 Dual 3G Router
JG596A HP MSR930 4G LTE/3G CDMA Router
JG597A HP MSR936 Wireless Router
JG665A HP MSR930 4G LTE/3G WCDMA Global Router
JG704A HP MSR930 4G LTE/3G WCDMA ATT Router
CVE-2014-3566
CVE-2014-3568
MSR1000
R2513P33
JG732A HP MSR1003-8 AC Router
CVE-2014-3566
CVE-2014-3568
MSR1000 Russian version
R2513L40.RU
JG732A HP MSR1003-8 AC Router
CVE-2014-3566
CVE-2014-3568
MSR2000
R0106P18
JG411A HP MSR2003 AC Router
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
MSR3000
R0106P18
JG404A HP MSR3064 Router
JG405A HP MSR3044 Router
JG406A HP MSR3024 AC Router
JG409A HP MSR3012 AC Router
JG861A HP MSR3024 TAA-compliant AC Router
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
MSR4000
R0106P18
JG402A HP MSR4080 Router Chassis
JG403A HP MSR4060 Router Chassis
JG412A HP MSR4000 MPU-100 Main Processing Unit
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
F5000
F3210P22
JG216A HP F5000 Firewall Standalone Chassis
JD259A HP A5000-A5 VPN Firewall Chassis
H3C SecPath F5000-A5 Host System (0150A0AG)
CVE-2014-3566
CVE-2014-3568
F5000-C
R3811P03
JG650A HP F5000-C VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
F5000-S
R3811P03
JG370A HP F5000-S VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
U200S and CS
F5123P30
JD268A HP 200-CS UTM Appliance
JD273A HP U200-S UTM Appliance
H3C SecPath U200-S (0235A36N)
CVE-2014-3566
CVE-2014-3568
U200A and M
F5123P30
JD274A HP 200-M UTM Appliance
JD275A HP U200-A UTM Appliance
H3C SecPath U200-A (0235A36Q)
CVE-2014-3566
CVE-2014-3568
SecBlade III
R3820P03
JG371A HP 12500 20Gbps VPN Firewall Module
JG372A HP 10500/11900/7500 20Gbps VPN FW Mod
CVE-2014-3566
CVE-2014-3568
SecBlade FW
R3181P05
JC635A HP 12500 VPN Firewall Module
JD245A HP 9500 VPN Firewall Module
JD249A HP 10500/7500 Advanced VPN Firewall Mod
JD250A HP 6600 Firewall Processing Rtr Module
JD251A HP 8800 Firewall Processing Module
JD255A HP 5820 VPN Firewall Module
H3C S9500E SecBlade VPN Firewall Module (0231A0AV)
H3C S7500E SecBlade VPN Firewall Module (0231A832)
H3C SR66 Gigabit Firewall Module (0231A88A)
H3C SR88 Firewall Processing Module (0231A88L)
H3C S5820 SecBlade VPN Firewall Module (0231A94J)
CVE-2014-3566
CVE-2014-3568
F1000-E
R3181P05
JD272A HP F1000-E VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
F1000-A
R3734P06
JG214A HP F1000-A-EI VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
F1000-S
R3734P06
JG213A HP F1000-S-EI VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
SecBlade SSL VPN
Fix in Progress
Use Mitigation
JD253A HP 10500/7500 SSL VPN Mod w 500-user Lic
CVE-2014-3566
CVE-2014-3568
VSR1000
R0204P01
JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
JG811AAE HP VSR1001 Comware 7 Virtual Services Router
JG812AAE HP VSR1004 Comware 7 Virtual Services Router
JG813AAE HP VSR1008 Comware 7 Virtual Services Router
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
WX5002/5004
R2507P34
JD441A HP 5800 ACM for 64-256 APs
JD447B HP WX5002 Access Controller
JD448A HP A-WX5004 Access Controller
JD448B HP WX5004 Access Controller
JD469A HP A-WX5004 (3Com) Access Controller
JG261A HP 5800 Access Controller OAA TAA Mod
CVE-2014-3566
CVE-2014-3568
HP 850/870
R2607P34
JG723A HP 870 Unified Wired-WLAN Appliance
JG725A HP 870 Unifd Wrd-WLAN TAA Applnc
JG722A HP 850 Unified Wired-WLAN Appliance
JG724A HP 850 Unifd Wrd-WLAN TAA Applnc
CVE-2014-3566
CVE-2014-3568
HP 830
R3507P34
JG640A HP 830 24P PoE+ Unifd Wired-WLAN Swch
JG641A HP 830 8P PoE+ Unifd Wired-WLAN Swch
JG646A HP 830 24-Port PoE+ Wrd-WLAN TAA Switch
JG647A HP 830 8-Port PoE+ Wrd-WLAN TAA Switch
CVE-2014-3566
CVE-2014-3568
HP 6000
R2507P34
JG639A HP 10500/7500 20G Unified Wired-WLAN Mod
JG645A HP 10500/7500 20G Unifd Wrd-WLAN TAA Mod
CVE-2014-3566
CVE-2014-3568
VCX
Fix in Progress
Use Mitigation
J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr
J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr
JC517A HP VCX V7205 Platform w/DL 360 G6 Server
JE355A HP VCX V6000 Branch Platform 9.0
JC516A HP VCX V7005 Platform w/DL 120 G6 Server
JC518A HP VCX Connect 200 Primry 120 G6 Server
J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr
JE341A HP VCX Connect 100 Secondary
JE252A HP VCX Connect Primary MIM Module
JE253A HP VCX Connect Secondary MIM Module
JE254A HP VCX Branch MIM Module
JE355A HP VCX V6000 Branch Platform 9.0
JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod
JD023A HP MSR30-40 Router with VCX MIM Module
JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM
JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod
JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod
JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod
JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS
JE340A HP VCX Connect 100 Pri Server 9.0
JE342A HP VCX Connect 100 Sec Server 9.0
CVE-2014-3566
CVE-2014-3568
iMC PLAT
iMC PLAT v7.1 E0303P06
JD125A HP IMC Std S/W Platform w/100-node
JD126A HP IMC Ent S/W Platform w/100-node
JD808A HP IMC Ent Platform w/100-node License
JD815A HP IMC Std Platform w/100-node License
JF377A HP IMC Std S/W Platform w/100-node Lic
JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU
JF378A HP IMC Ent S/W Platform w/200-node Lic
JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU
JG546AAE HP IMC Basic SW Platform w/50-node E-LTU
JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU
JG550AAE HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU
JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU
JG659AAE HP IMC Smart Connect VAE E-LTU
JG660AAE HP IMC Smart Connect w/WLM VAE E-LTU
JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU
JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU
JG766AAE HP IMC SmCnct Vrtl Applnc SW E-LTU
JG767AAE HP IMC SmCnct WSM Vrtl Applnc SW E-LTU
JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU
CVE-2014-3566
iMC UAM
iMC UAM v7.1 E0302P07
JD144A HP IMC UAM S/W Module w/200-User License
JF388A HP IMC UAM S/W Module w/200-user License
JF388AAE HP IMC UAM S/W Module w/200-user E-LTU
JG752AAE HP IMC UAM SW Mod w/ 50-user E-LTU
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
iMC WSM
Fix in Progress
Use Mitigation
JD456A HP WSM Plug-in for IMC
Includes 50 Aps
JF414A HP IMC WSM S/W Module with 50-AP License
JF414AAE HP IMC WSM S/W Module with 50-AP E-LTU
JG551AAE HP PMM to IMC WSM Upgr w/250 AP E-LTU
JG769AAE HP PMM to IMC WSM Upg w/ 250-node E-LTU
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
A
Fixes in progress
use mitigations
J9565A HP 2615-8-PoE Switch
J9562A HP 2915-8G-PoE Switch
E
Fixes in progress
use mitigations
J4850A HP ProCurve Switch 5304xl
J8166A HP ProCurve Switch 5304xl-32G
J4819A HP ProCurve Switch 5308xl
J8167A HP ProCurve Switch 5308xl-48G
J4849A HP ProCurve Switch 5348xl
J4849B HP ProCurve Switch 5348xl
J4848A HP ProCurve Switch 5372xl
J4848B HP ProCurve Switch 5372xl
F
Fixes in progress
use mitigations
J4812A HP ProCurve 2512 Switch
J4813A HP ProCurve 2524 Switch
J4817A HP ProCurve 2312 Switch
J4818A HP ProCurve 2324 Switch
H.07
Fixes in progress
use mitigations
J4902A HP ProCurve 6108 Switch
H.10
Fixes in progress
use mitigations
J8762A HP E2600-8-PoE Switch
J4900A HP PROCURVE SWITCH 2626
J4900B HP ProCurve Switch 2626
J4900C ProCurve Switch 2626
J4899A HP ProCurve Switch 2650
J4899B HP ProCurve Switch 2650
J4899C ProCurve Switch 2650
J8164A ProCurve Switch 2626-PWR
J8165A HP ProCurve Switch 2650-PWR
i.10
Fixes in progress
use mitigations
J4903A ProCurve Switch 2824
J4904A HP ProCurve Switch 2848
J
Fixes in progress
use mitigations
J9299A HP 2520-24G-PoE Switch
J9298A HP 2520-8G-PoE Switch
K
Fixes in progress
use mitigations
J8692A HP 3500-24G-PoE yl Switch
J8693A HP 3500-48G-PoE yl Switch
J9310A HP 3500-24G-PoE+ yl Switch
J9311A HP 3500-48G-PoE+ yl Switch
J9470A HP 3500-24 Switch
J9471A HP 3500-24-PoE Switch
J9472A HP 3500-48 Switch
J9473A HP 3500-48-PoE Switch
J8697A HP E5406 zl Switch Chassis
J8699A HP 5406-48G zl Switch
J9447A HP 5406-44G-PoE+-4SFP zl Switch
J9533A HP 5406-44G-PoE+-2XG v2 zl Swch w Pm SW
J9539A HP 5406-44G-PoE+-4G v2 zl Swch w Prm SW
J9642A HP 5406 zl Switch with Premium Software
J9866A HP 5406 8p10GT 8p10GE Swch and Psw
J8698A HP E5412 zl Switch Chassis
J8700A HP 5412-96G zl Switch
J9448A HP 5412-92G-PoE+-4SFP zl Switch
J9532A HP 5412-92G-PoE+-2XG v2 zl Swch w Pm SW
J9540A HP 5412-92G-PoE+-4G v2 zl Swch w Prm SW
J9643A HP 5412 zl Switch with Premium Software
J8992A HP 6200-24G-mGBIC yl Switch
J9263A HP E6600-24G Switch
J9264A HP 6600-24G-4XG Switch
J9265A HP 6600-24XG Switch
J9451A HP E6600-48G Switch
J9452A HP 6600-48G-4XG Switch
J9475A HP E8206 zl Switch Base System
J9638A HP 8206-44G-PoE+-2XG v2 zl Swch w Pm SW
J9640A HP 8206 zl Switch w/Premium Software
J8715A ProCurve Switch 8212zl Base System
J8715B HP E8212 zl Switch Base System
J9091A ProCurve Switch 8212zl Chassis&Fan Tray
J9639A HP 8212-92G-PoE+-2XG v2 zl Swch w Pm SW
J9641A HP 8212 zl Switch with Premium SW
KA
Fixes in progress
use mitigations
J9573A HP 3800-24G-PoE+-2SFP+ Switch
J9574A HP 3800-48G-PoE+-4SFP+ Switch
J9575A HP 3800-24G-2SFP+ Switch
J9576A HP 3800-48G-4SFP+ Switch
J9584A HP 3800-24SFP-2SFP+ Switch
J9585A HP 3800-24G-2XG Switch
J9586A HP 3800-48G-4XG Switch
J9587A HP 3800-24G-PoE+-2XG Switch
J9588A HP 3800-48G-PoE+-4XG Switch
KB
Fixes in progress
use mitigations
J9821A HP 5406R zl2 Switch
J9822A HP 5412R zl2 Switch
J9823A HP 5406R-Gig-T-PoE+/SFP+ v2 zl2 Swch
J9824A HP 5406R-Gig-T-PoE+/SFP v2 zl2 Swch
J9825A HP 5412R-Gig-T-PoE+/SFP+ v2 zl2 Swch
J9826A HP 5412R-Gig-T-PoE+/SFP v2 zl2 Swch
J9850A HP 5406R zl2 Switch
J9851A HP 5412R zl2 Switch
J9868A HP 5406R-8XGT/8SFP+ v2 zl2 Swch
L
Fixes in progress
use mitigations
J8772B HP 4202-72 Vl Switch
J8770A HP 4204 Vl Switch Chassis
J9064A HP 4204-44G-4SFP Vl Switch
J8773A HP 4208 Vl Switch Chassis
J9030A HP 4208-68G-4SFP Vl Switch
J8775B HP 4208-96 Vl Switch
J8771A ProCurve Switch 4202VL-48G
J8772A ProCurve Switch 4202VL-72
J8774A ProCurve Switch 4208VL-64G
J8775A ProCurve Switch 4208VL-96
M.08
Fixes in progress
use mitigations
J8433A HP 6400-6XG cl Switch
J8474A HP 6410-6XG cl Switch
M.10
Fixes in progress
use mitigations
J4906A HP E3400-48G cl Switch
J4905A HP ProCurve Switch 3400cl-24G
N
Fixes in progress
use mitigations
J9021A HP 2810-24G Switch
J9022A HP 2810-48G Switch
PA
Fixes in progress
use mitigations
J9029A ProCurve Switch 1800-8G
PB
Fixes in progress
use mitigations
J9028A ProCurve Switch 1800-24G
J9028B ProCurve Switch 1800-24G
Q
Fixes in progress
use mitigations
J9019B HP 2510-24 Switch
J9019A ProCurve Switch 2510-24
R
Fixes in progress
use mitigations
J9085A HP 2610-24 Switch
J9087A HP 2610-24-PoE Switch
J9086A HP 2610-24-PPoE Switch
J9088A HP 2610-48 Switch
J9089A HP 2610-48-PoE Switch
RA
Fixes in progress
use mitigations
J9623A HP 2620-24 Switch
J9624A HP 2620-24-PPoE+ Switch
J9625A HP 2620-24-PoE+ Switch
J9626A HP 2620-48 Switch
J9627A HP 2620-48-PoE+ Switch
S
Fixes in progress
use mitigations
J9138A HP 2520-24-PoE Switch
J9137A HP 2520-8-PoE Switch
T
Fixes in progress
use mitigations
J9049A ProCurve Switch 2900- 24G
J9050A ProCurve Switch 2900 48G
U
Fixes in progress
use mitigations
J9020A HP 2510-48 Switch
VA
Fixes in progress
use mitigations
J9079A HP 1700-8 Switch
VB
Fixes in progress
use mitigations
J9080A HP 1700-24 Switch
W
Fixes in progress
use mitigations
J9145A HP 2910-24G al Switch
J9146A HP 2910-24G-PoE+ al Switch
J9147A HP 2910-48G al Switch
J9148A HP 2910-48G-PoE+ al Switch
WB
Fixes in progress
use mitigations
J9726A HP 2920-24G Switch
J9727A HP 2920-24G-POE+ Switch
J9728A HP 2920-48G Switch
J9729A HP 2920-48G-POE+ Switch
J9836A HP 2920-48G-POE+ 740W Switch
Y
Fixes in progress
use mitigations
J9279A HP 2510-24G Switch
J9280A HP 2510-48G Switch
YA
Fixes in progress
use mitigations
J9772A HP 2530-48G-PoE+ Switch
J9773A HP 2530-24G-PoE+ Switch
J9774A HP 2530-8G-PoE+ Switch
J9775A HP 2530-48G Switch
J9776A HP 2530-24G Switch
J9777A HP 2530-8G Switch
J9778A HP 2530-48-PoE+ Switch
J9781A HP 2530-48 Switch
J9853A HP 2530-48G-PoE+-2SFP+ Switch
J9854A HP 2530-24G-PoE+-2SFP+ Switch
J9855A HP 2530-48G-2SFP+ Switch
J9856A HP 2530-24G-2SFP+ Switch
YB
Fixes in progress
use mitigations
J9779A HP 2530-24-PoE+ Switch
J9780A HP 2530-8-PoE+ Switch
J9782A HP 2530-24 Switch
J9783A HP 2530-8 Switch
MSM 6.5
6.5.1.0
J9420A HP MSM760 Premium Mobility Controller
J9421A HP MSM760 Access Controller
J9370A HP MSM765 Zl Premium Mobility Controller
J9693A HP MSM720 Access Controller (WW)
J9694A HP MSM720 Premium Mobility Cntlr (WW)
J9695A HP MSM720 TAA Access Controller
J9696A HP MSM720 TAA Premium Mobility Cntlr
J9840A HP MSM775 zl Premium Controller Module
J9845A HP 560 Wireless 802.11ac (AM) AP
J9846A HP 560 Wireless 802.11ac (WW) AP
J9847A HP 560 Wireless 802.11ac (JP) AP
J9848A HP 560 Wireless 802.11ac (IL) AP
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
J9426A HP E-MSM410 Access Point (US)
J9426B HP MSM410 Access Point (US)
J9427A HP E-MSM410 Access Point (WW)
J9427B HP MSM410 Access Point (WW)
J9427C HP MSM410 Access Point (WW)
J9529A HP E-MSM410 Access Point (JP)
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
MSM 6.4
6.4.2.1
J9840A HP MSM775 zl Premium Controller Module
J9370A HP MSM765 Zl Premium Mobility Controller
J9420A HP MSM760 Premium Mobility Controller
J9421A HP MSM760 Access Controller
J9693A HP MSM720 Access Controller (WW)
J9694A HP MSM720 Premium Mobility Cntlr (WW)
J9695A HP MSM720 TAA Access Controller
J9696A HP MSM720 TAA Premium Mobility Cntlr
J9426A HP E-MSM410 Access Point (US)
J9426B HP MSM410 Access Point (US)
J9427A HP E-MSM410 Access Point (WW)
J9427B HP MSM410 Access Point (WW)
J9427C HP MSM410 Access Point (WW)
J9529A HP E-MSM410 Access Point (JP)
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
MSM 6.3
6.3.1.0
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
J9356A HP E-MSM335 Access Point (US)
J9356B HP MSM335 Access Point (US)
J9357A HP E-MSM335 Access Point (WW)
J9357B HP MSM335 Access Point (WW)
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
J9360A HP E-MSM320 Access Point (US)
J9360B HP MSM320 Access Point (US)
J9364A HP E-MSM320 Access Point (WW)
J9364B HP MSM320 Access Point (WW)
J9365A HP MSM320-R Access Point (US)
J9365B HP MSM320-R Access Point (US)
J9368A HP E-MSM320-R Access Point (WW)
J9368B HP MSM320-R Access Point (WW)
J9373A HP E-MSM325 Access Point (WW)
J9373B HP MSM325 Access Point (WW)
J9374A HP E-MSM310 Access Point (US)
J9374B HP MSM310 Access Point (US)
J9379A HP MSM310 Access Point (WW)
J9379B HP MSM310 Access Point (WW)
J9380A HP E-MSM310-R Access Point (US)
J9380B HP MSM310-R Access Point (US)
J9383A HP E-MSM310-R Access Point (WW)
J9383B HP MSM310-R Access Point (WW)
J9524A HP E-MSM310 Access Point (JP)
J9524B HP MSM310 Access Point (JP)
J9527A HP E-MSM320 Access Point (JP)
J9527B HP MSM320 Access Point (JP)
J9528A HP E-MSM320-R Access Point (JP)
J9528B HP MSM320-R Access Point (JP)
MSM 6.2
6.2.1.2
J9370A HP MSM765 Zl Premium Mobility Controller
J9356A HP E-MSM335 Access Point (US)
J9356B HP MSM335 Access Point (US)
J9357A HP E-MSM335 Access Point (WW)
J9357B HP MSM335 Access Point (WW)
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
J9420A HP MSM760 Premium Mobility Controller
J9421A HP MSM760 Access Controller
J9840A HP MSM775 zl Premium Controller Module
J9360A HP E-MSM320 Access Point (US)
J9360B HP MSM320 Access Point (US)
J9364A HP E-MSM320 Access Point (WW)
J9364B HP MSM320 Access Point (WW)
J9365A HP MSM320-R Access Point (US)
J9365B HP MSM320-R Access Point (US)
J9368A HP E-MSM320-R Access Point (WW)
J9368B HP MSM320-R Access Point (WW)
J9373A HP E-MSM325 Access Point (WW)
J9373B HP MSM325 Access Point (WW)
J9374A HP E-MSM310 Access Point (US)
J9374B HP MSM310 Access Point (US)
J9379A HP MSM310 Access Point (WW)
J9379B HP MSM310 Access Point (WW)
J9380A HP E-MSM310-R Access Point (US)
J9380B HP MSM310-R Access Point (US)
J9383A HP E-MSM310-R Access Point (WW)
J9383B HP MSM310-R Access Point (WW)
J9524A HP E-MSM310 Access Point (JP)
J9524B HP MSM310 Access Point (JP)
J9527A HP E-MSM320 Access Point (JP)
J9527B HP MSM320 Access Point (JP)
J9528A HP E-MSM320-R Access Point (JP)
J9528B HP MSM320-R Access Point (JP)
J9426A HP E-MSM410 Access Point (US)
J9426B HP MSM410 Access Point (US)
J9427A HP E-MSM410 Access Point (WW)
J9427B HP MSM410 Access Point (WW)
J9427C HP MSM410 Access Point (WW)
J9529A HP E-MSM410 Access Point (JP)
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
J9693A HP MSM720 Access Controller (WW)
J9694A HP MSM720 Premium Mobility Cntlr (WW)
J9695A HP MSM720 TAA Access Controller
J9696A HP MSM720 TAA Premium Mobility Cntlr
M220
Fixes in progress
use mitigations
J9798A HP M220 802.11n (AM) Access Point
J9799A HP M220 802.11n (WW) Access Point
M210
Fixes in progress
use mitigations
JL023A HP M210 802.11n (AM) Access Point
JL024A HP M210 802.11n (WW) Access Point
PS110
Fixes in progress
use mitigations
JL065A HP PS110 Wireless 802.11n VPN AM Router
JL066A HP PS110 Wireless 802.11n VPN WW Router
HP Office Connect 1810 PK
Fixes in progress
use mitigations
J9660A HP 1810-48G Switch
HP Office Connect 1810 P
Fixes in progress
use mitigations
J9450A HP 1810-24G Switch
J9449A HP 1810-8G Switch
HP Office Connect 1810 PL
Fixes in progress
use mitigations
J9802A HP 1810-8G v2 Switch
J9803A HP 1810-24G v2 Switch
RF Manager
Fixes in progress
use mitigations
J9522A HP E-MSM415 RF Security Sensor J9521A HP RF Manager Controller with
50 Sensor License J9838AAE HP RF Manager for VMware 50 Sensor E-LTU
HP Office Connect 1810 PM
Fixes in progress
use mitigations
J9800A HP 1810-8 v2 Switch
J9801A HP 1810-24 v2 Switch
HP Office Connect PS1810
Fixes in progress
use mitigations
J9833A HP PS1810-8G Switch
J9834A HP PS1810-24G Switch
Mitigation Instructions
For SSLv3 Server Functionality on Impacted Products:
Disable SSLv3 on clients
and/or disable CBC ciphers on clients
Use Access Control functionality to control client access
For SSLv3 Client Functionality on Impacted Products:
Go to SSL server and disable SSLv3
and/or disable CBC ciphers
Use Access Control functionality to control access to servers
HISTORY
Version:1 (rev.1) - 2 April 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Existing users may upgrade to HP OneView version 1.20 using the Update
Appliance feature in HP OneView.
HP OneView version 1.20 is available from the following location:
https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber
=Z7550-63180
Note: The upgrade (.bin) or a new install (.ova) is also available:
An HP Passport login is required.
Go to the HP Software Depot site at http://www.software.hp.com and search for
HP OneView.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz: Upgraded.
SSL 3.0 Fallback protection:
OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol
downgrade.
Some client applications (such as browsers) will reconnect using a
downgraded protocol to work around interoperability bugs in older
servers. This could be exploited by an active man-in-the-middle to
downgrade connections to SSL 3.0 even if both sides of the connection
support higher protocols. SSL 3.0 contains a number of weaknesses
including POODLE (CVE-2014-3566).
Build option no-ssl3 is incomplete (CVE-2014-3568):
When OpenSSL is configured with "no-ssl3" as a build option, servers
could accept and complete a SSL 3.0 handshake, and clients could be
configured to send them.
For more information, see:
https://www.openssl.org/news/secadv_20141015.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zc-i486-1_slack13.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.0.txz
Updated packages for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz
Updated packages for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zc-i486-1_slack13.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.1.txz
Updated packages for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz
Updated packages for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zc-i486-1_slack13.37.txz
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.37.txz
Updated packages for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.37.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz
Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1j-i486-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.0.txz
Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1j-x86_64-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz
Updated packages for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1j-i486-1_slack14.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz
Updated packages for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1j-x86_64-1_slack14.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1j-i486-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1j-i486-1.txz
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1j-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1j-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 13.0 packages:
44d336a121b39296f0e6bbeeb283dd2b openssl-0.9.8zc-i486-1_slack13.0.txz
8342cfb351e59ecf5ea6d8cba66f0040 openssl-solibs-0.9.8zc-i486-1_slack13.0.txz
Slackware x86_64 13.0 packages:
671f12535bdc10ab24388b713351aca2 openssl-0.9.8zc-x86_64-1_slack13.0.txz
21e380284cdfab2fd15fffe2e0aed526 openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz
Slackware 13.1 packages:
64cb819f1e07522bd5d7ceedd0a9ab50 openssl-0.9.8zc-i486-1_slack13.1.txz
5fe4e385b2251cfd7e8ae5963ec6cef1 openssl-solibs-0.9.8zc-i486-1_slack13.1.txz
Slackware x86_64 13.1 packages:
94feb6699d6f2cc7750a6b2e17ccaaa2 openssl-0.9.8zc-x86_64-1_slack13.1.txz
2c17e4286509c29074ab0168367b851e openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz
Slackware 13.37 packages:
4483d91c776c7e23c59246c4e0aa24aa openssl-0.9.8zc-i486-1_slack13.37.txz
fedd58eb19bc13c9dd88d947827a7370 openssl-solibs-0.9.8zc-i486-1_slack13.37.txz
Slackware x86_64 13.37 packages:
5d48ac1e9339efc35e304c7d48b2e762 openssl-0.9.8zc-x86_64-1_slack13.37.txz
6f5e2b576259477c13f12cbed9be8804 openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz
Slackware 14.0 packages:
2b678160283bc696565dc8bd8b28c0eb openssl-1.0.1j-i486-1_slack14.0.txz
f7762615c990713e9e86d4da962f1022 openssl-solibs-1.0.1j-i486-1_slack14.0.txz
Slackware x86_64 14.0 packages:
41010ca37d49b74e7d7dc3f1c6ddc57e openssl-1.0.1j-x86_64-1_slack14.0.txz
40dc6f3de217279d6140c1efcc0d45c8 openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz
Slackware 14.1 packages:
024ecea55e22e47f9fbb4b81a7b72a51 openssl-1.0.1j-i486-1_slack14.1.txz
0a575668bb41ec4c2160800611f7f627 openssl-solibs-1.0.1j-i486-1_slack14.1.txz
Slackware x86_64 14.1 packages:
d07fe289f7998a584c2b0d9810a8b9aa openssl-1.0.1j-x86_64-1_slack14.1.txz
1ffc5d0c02b0c60cefa5cf9189bfc71d openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz
Slackware -current packages:
53c9f51a79460bbfc5dec5720317cd53 a/openssl-solibs-1.0.1j-i486-1.txz
cc059aa63494f3b005a886c70bc3f5d6 n/openssl-1.0.1j-i486-1.txz
Slackware x86_64 -current packages:
500709555e652adcd84b4e02dfab4eeb a/openssl-solibs-1.0.1j-x86_64-1.txz
c483ca9c450fa90a901ac013276ccc53 n/openssl-1.0.1j-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg openssl-1.0.1j-i486-1_slack14.1.txz openssl-solibs-1.0.1j-i486-1_slack14.1.txz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address.
HP BladeSystem c-Class Onboard Administrator (OA) 4.30 and earlier.
Go to
http://www.hp.com/go/oa
Select "Onboard Administrator Firmware"
Select product name as ""HP BLc3000 Onboard Administrator Option" or "HP
BLc7000 Onboard Administrator Option"
Select the operating system from the list of choices
Select Firmware version 4.40 for download
Refer to the HP BladeSystem Onboard Administrator User Guide for steps to
update the Onboard Administrator firmware. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201412-39
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenSSL: Multiple vulnerabilities
Date: December 26, 2014
Bugs: #494816, #519264, #525468
ID: 201412-39
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenSSL, the worst of which
could result in Denial of Service or Man-in-the-Middle attacks.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/openssl < 1.0.1j *>= 0.9.8z_p2
>= 1.0.1j
Description
===========
Multiple vulnerabilities have been discovered in OpenSSL. Please review
the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenSSL 1.0.1 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1j"
All OpenSSL 0.9.8 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8z_p2"
Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying these packages.
References
==========
[ 1 ] CVE-2013-6449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6449
[ 2 ] CVE-2013-6450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6450
[ 3 ] CVE-2014-3505
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3505
[ 4 ] CVE-2014-3506
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3506
[ 5 ] CVE-2014-3507
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3507
[ 6 ] CVE-2014-3509
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3509
[ 7 ] CVE-2014-3510
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3510
[ 8 ] CVE-2014-3511
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3511
[ 9 ] CVE-2014-3512
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3512
[ 10 ] CVE-2014-3513
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3513
[ 11 ] CVE-2014-3567
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3567
[ 12 ] CVE-2014-3568
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3568
[ 13 ] CVE-2014-5139
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5139
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201412-39.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201410-1151 | CVE-2014-3568 | OpenSSL Vulnerable to access restrictions |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c. OpenSSL is prone to a security-bypass vulnerability.
Successfully exploiting this issue will allow attackers to bypass security restrictions and perform unauthorized actions. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2015-09-16-2 Xcode 7.0
Xcode 7.0 is now available and addresses the following:
DevTools
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker may be able to bypass access restrictions
Description: An API issue existed in the apache configuration. This
issue was addressed by updating header files to use the latest
version.
CVE-ID
CVE-2015-3185 : Branko Aibej of the Apache Software Foundation
IDE Xcode Server
Available for: OS X Yosemite 10.10 or later
Impact: An attacker may be able to access restricted parts of the
filesystem
Description: A comparison issue existed in the node.js send module
prior to version 0.8.4. This issue was addressed by upgrading to
version 0.12.3.
CVE-ID
CVE-2014-6394 : Ilya Kantor
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilties in OpenSSL
Description: Multiple vulnerabilties existed in the node.js OpenSSL
module prior to version 1.0.1j.
CVE-ID
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker with a privileged network position may be able
to inspect traffic to Xcode Server
Description: Connections to Xcode Server may have been made without
encryption. This issue was addressed through improved network
connection logic.
CVE-ID
CVE-2015-5910 : an anonymous researcher
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Build notifications may be sent to unintended recipients
Description: An access issue existed in the handling of repository
email lists. This issue was addressed through improved validation.
CVE-ID
CVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of
Anchorfree
subversion
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities existed in svn versions prior to
1.7.19
Description: Multiple vulnerabilities existed in svn versions prior
to 1.7.19. These issues were addressed by updating svn to version
1.7.20.
CVE-ID
CVE-2015-0248
CVE-2015-0251
Xcode 7.0 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "7.0".
Release Date: 2015-04-01
Last Updated: 2015-04-01
Potential Security Impact: Remote disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP System
Management Homepage (SMH), HP Smart Update Manager (SUM), and HP Version
Control Agent (VCA) which are components of HP Insight Control server
deployment. These vulnerabilities are related to the SSLv3 vulnerability
known as "Padding Oracle on Downgraded Legacy Encryption" or "POODLE". The
components of HP Insight Control server deployment could be exploited
remotely to allow disclosure of information.
HP Insight Control server deployment includes HP System Management Homepage
(SMH), HP Version Control Agent (VCA), and HP Smart Update Manager (SUM) and
deploys them through the following jobs. This bulletin provides the
information needed to update the vulnerable components in HP Insight Control
server deployment.
Install HP Management Agents for Windows x86/x64
Install HP Management Agents for RHEL 5 x64
Install HP Management Agents for RHEL 6 x64
Install HP Management Agents for SLES 10 x64
Install HP Management Agents for SLES 11 x64
Upgrade Proliant Firmware
References:
CVE-2014-3508
CVE-2014-3509
CVE-2014-3511
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
CVE-2014-5139
SSRT102004
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2, v7.3.1
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-3508 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3
CVE-2014-3509 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8
CVE-2014-3511 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
CVE-2014-3513 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1
CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3
CVE-2014-3567 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1
CVE-2014-3568 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
CVE-2014-5139 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following instructions to resolve this vulnerability.
Note: For HP Insight deployment Control server v7.1.2, v7.2.0, v7.2.1 and
v7.2.2, you must upgrade to v7.3.1 and follow the steps from 1 to 11
mentioned below to resolve the vulnerability.
Delete the files smh*.exe from Component Copy Location listed in the
following table, rows 1 and 2.
Delete the files vca*.exe/vcaamd64-*.exe from Component Copy Location listed
in the following table, rows 3 and 4.
Delete the files hpsmh-7.*.rpm" from Component Copy Location listed in row 5.
In sequence, perform the steps from left to right in the following table.
First, download components from Download Link; Second, rename the component
as suggested in Rename to. Third, copy the component to the location
specified in Component Copy Location.
Table Row Number
Download Link
Rename to
Component Copy Location
1
http://www.hp.com/swpublishing/MTX-bd2042a1c7574aad90c4839efe
smhamd64-cp023964.exe
\\express\hpfeatures\hpagents-ws\components\Win2008
2
http://www.hp.com/swpublishing/MTX-062078f1ae354b7e99c86c151c
smhx86-cp023963.exe
\\express\hpfeatures\hpagents-ws\components\Win2008
3
http://www.hp.com/swpublishing/MTX-7b23e47d5d9b420b94bd1323eb
vcax86 cp025295.exe
\\express\hpfeatures\hpagents-ws\components\Win2008
4
http://www.hp.com/swpublishing/MTX-2557aa7dc1654cf6b547c1a9e4
vcaamd64-cp025296.exe
\\express\hpfeatures\hpagents-ws\components\Win2008
5
http://www.hp.com/swpublishing/MTX-5827037475e44abab586463723
Do not rename the downloaded component for this step.
\\express\hpfeatures\hpagents-sles11-x64\components
\\express\hpfeatures\hpagents-sles10-x64\components
\\express\hpfeatures\hpagents-rhel5-x64\components
\\express\hpfeatures\hpagents-rhel6-x64\components
6
http://www.hp.com/swpublishing/MTX-57ab6bb78b6e47a18718f44133
Do not rename the downloaded component for this step.
\\express\hpfeatures\hpagents-sles11-x64\components
\\express\hpfeatures\hpagents-sles10-x64\components
\\express\hpfeatures\hpagents-rhel5-x64\components
\\express\hpfeatures\hpagents-rhel6-x64\components
7
http://www.hp.com/swpublishing/MTX-34bcab41ac7e4db299e3f5f2f1
smhx86-cp025274.exe
\\express\hpfeatures\hpagents-ws\components\Win2003
8
http://www.hp.com/swpublishing/MTX-00eb9ac82e86449e8c3ba101bd
smhamd64-cp025275.exe
\\express\hpfeatures\hpagents-ws\components\Win2003
Download and extract the HP SUM component from
ftp://ftp.hp.com/pub/softlib2/software1/pubsw-windows/p991570621/v99346
Copy all content from extracted folder and paste at
\\eXpress\hpfeatures\fw-proLiant\components
Initiate Install HP Management Agents for SLES 11 x64 on the target running
SLES11 x64.
Initiate Install HP Management Agents for SLES 10 x64 on the target running
SLES10 x64.
Initiate Install HP Management Agents for RHEL 6 x64 on the target running
RHEL 6 x64.
Initiate Install HP Management Agents for RHEL 5 x64 on the target running
RHEL 5 x64.
Initiate Install HP Management Agents for Windows x86/x64 job on the target
running Windows.
HISTORY
Version:1 (rev.1) - 1 April 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
CVE-2014-3513
A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure
Real-time Transport Protocol (SRTP) extension data. A remote attacker
could send multiple specially crafted handshake messages to exhaust
all available memory of an SSL/TLS or DTLS server.
CVE-2014-3566 ("POODLE")
A flaw was found in the way SSL 3.0 handled padding bytes when
decrypting messages encrypted using block ciphers in cipher block
chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM)
attacker to decrypt a selected byte of a cipher text in as few as 256
tries if they are able to force a victim application to repeatedly send
the same data over newly created SSL 3.0 connections.
This update adds support for Fallback SCSV to mitigate this issue.
For the stable distribution (wheezy), these problems have been fixed in
version 1.0.1e-2+deb7u13.
For the unstable distribution (sid), these problems have been fixed in
version 1.0.1j-1.
We recommend that you upgrade your openssl packages.
Corrected: 2014-10-15 19:59:43 UTC (stable/10, 10.1-PRERELEASE)
2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC3)
2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC2-p1)
2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC1-p1)
2014-10-21 19:00:32 UTC (releng/10.1, 10.1-BETA3-p1)
2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10)
2014-10-15 20:28:31 UTC (stable/9, 9.3-STABLE)
2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3)
2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13)
2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20)
2014-10-15 20:28:31 UTC (stable/8, 8.4-STABLE)
2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17)
CVE Name: CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:http://security.FreeBSD.org/>. Background
FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is
a collaborative effort to develop a robust, commercial-grade, full-featured
Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols as well as a full-strength
general purpose cryptography library.
II. Problem Description
A flaw in the DTLS SRTP extension parsing code allows an attacker, who
sends a carefully crafted handshake message, to cause OpenSSL to fail
to free up to 64k of memory causing a memory leak. [CVE-2014-3513].
When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
integrity of that ticket is first verified. In the event of a session
ticket integrity check failing, OpenSSL will fail to free memory
causing a memory leak. [CVE-2014-3567].
The SSL protocol 3.0, as supported in OpenSSL and other products, supports
CBC mode encryption where it could not adequately check the integrity of
padding, because of the use of non-deterministic CBC padding. This
protocol weakness makes it possible for an attacker to obtain clear text
data through a padding-oracle attack.
Some client applications (such as browsers) will reconnect using a
downgraded protocol to work around interoperability bugs in older
servers. This could be exploited by an active man-in-the-middle to
downgrade connections to SSL 3.0 even if both sides of the connection
support higher protocols. SSL 3.0 contains a number of weaknesses
including POODLE [CVE-2014-3566].
OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol downgrade. [CVE-2014-3568].
III. Impact
A remote attacker can cause Denial of Service with OpenSSL 1.0.1
server implementations for both SSL/TLS and DTLS regardless of
whether SRTP is used or configured. [CVE-2014-3513]
By sending a large number of invalid session tickets an attacker
could exploit this issue in a Denial Of Service attack.
[CVE-2014-3567].
An active man-in-the-middle attacker can force a protocol downgrade
to SSLv3 and exploit the weakness of SSLv3 to obtain clear text data
from the connection. [CVE-2014-3566] [CVE-2014-3568]
IV. Workaround
No workaround is available.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
[FreeBSD 10.0]
# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch
# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch.asc
# gpg --verify openssl-10.0.patch.asc
[FreeBSD 9.3]
# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch
# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch.asc
# gpg --verify openssl-9.3.patch.asc
[FreeBSD 8.4, 9.1 and 9.2]
# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch
# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch.asc
# gpg --verify openssl-8.4.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile the operating system using buildworld and installworld as
described in <URL:http://www.FreeBSD.org/handbook/makeworld.html>.
Restart all deamons using the library, or reboot the system.
VI. Correction details
The following list contains the correction revision numbers for each
affected branch.
Branch/path Revision
- -------------------------------------------------------------------------
stable/8/ r273151
releng/8.4/ r273416
stable/9/ r273151
releng/9.1/ r273415
releng/9.2/ r273415
releng/9.3/ r273415
stable/10/ r273149
releng/10.0/ r273415
releng/10.1/ r273399
- -------------------------------------------------------------------------
To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:
# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
VII. These vulnerabilities could be exploited remotely to create a Denial
of Service (DoS), allow unauthorized access, or a man-in-the-middle (MitM)
attack.
References:
CVE-2014-3566 Man-in-th-Middle (MitM) attack
CVE-2014-3567 Remote Unauthorized Access
CVE-2014-3568 Remote Denial of Service (DoS)
SSRT101767
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The
updates are available from the following ftp site.
ftp://ssl098zc:Secure12@ftp.usa.hp.com
User name: ssl098zc Password: (NOTE: Case sensitive) Secure12
HP-UX Release
HP-UX OpenSSL version
B.11.11 (11i v1)
A.00.09.08zc.001_HP-UX_B.11.11_32+64.depot
B.11.23 (11i v2)
A.00.09.08zc.002_HP-UX_B.11.23_IA-PA.depot
B.11.31 (11i v3)
A.00.09.08zc.003_HP-UX_B.11.31_IA-PA.depot
MANUAL ACTIONS: Yes - Update
Install OpenSSL A.00.09.08zc or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HP and lists recommended actions that may apply to a specific HP-UX
system. It can also download patches and create a depot automatically. For
more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
VMware Security Advisory
Advisory ID: VMSA-2015-0001
Synopsis: VMware vCenter Server, ESXi, Workstation, Player, and Fusion
updates address security issues
Issue date: 2015-01-27
Updated on: 2015-01-27 (Initial Advisory)
CVE number: CVE-2014-8370, CVE-2015-1043, CVE-2015-1044
--- OPENSSL---
CVE-2014-3513, CVE-2014-3567,CVE-2014-3566, CVE-2014-3568
--- libxml2 ---
CVE-2014-3660
- ------------------------------------------------------------------------
1. Summary
VMware vCenter Server, ESXi, Workstation, Player and Fusion address
several security issues.
2. Relevant Releases
VMware Workstation 10.x prior to version 10.0.5
VMware Player 6.x prior to version 6.0.5
VMware Fusion 7.x prior to version 7.0.1
VMware Fusion 6.x prior to version 6.0.5
vCenter Server 5.5 prior to Update 2d
ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG
ESXi 5.1 without patch ESXi510-201404101-SG
ESXi 5.0 without patch ESXi500-201405101-SG
3. Problem Description
a. VMware ESXi, Workstation, Player, and Fusion host privilege
escalation vulnerability
VMware ESXi, Workstation, Player and Fusion contain an arbitrary
file write issue. Exploitation this issue may allow for privilege
escalation on the host.
The vulnerability does not allow for privilege escalation from
the guest Operating System to the host or vice-versa. This means
that host memory can not be manipulated from the Guest Operating
System.
Mitigation
For ESXi to be affected, permissions must have been added to ESXi
(or a vCenter Server managing it) for a virtual machine
administrator role or greater.
VMware would like to thank Shanon Olsson for reporting this issue to
us through JPCERT.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2014-8370 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any 6.0.5
ESXi 5.5 ESXi ESXi550-201403102-SG
ESXi 5.1 ESXi ESXi510-201404101-SG
ESXi 5.0 ESXi ESXi500-201405101-SG
b. VMware Workstation, Player, and Fusion Denial of Service
vulnerability
VMware Workstation, Player, and Fusion contain an input validation
issue in the Host Guest File System (HGFS). This issue may allow
for a Denial of Service of the Guest Operating system.
VMware would like to thank Peter Kamensky from Digital Security for
reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1043 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any 7.0.1
Fusion 6.x any 6.0.5
c. VMware ESXi, Workstation, and Player Denial of Service
vulnerability
VMware ESXi, Workstation, and Player contain an input
validation issue in VMware Authorization process (vmware-authd).
This issue may allow for a Denial of Service of the host. On
VMware ESXi and on Workstation running on Linux the Denial of
Service would be partial.
VMware would like to thank Dmitry Yudin @ret5et for reporting
this issue to us through HP's Zero Day Initiative.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1044 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any not affected
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi ESXi510-201410101-SG
ESXi 5.0 ESXi not affected
d. Update to VMware vCenter Server and ESXi for OpenSSL 1.0.1
and 0.9.8 package
The OpenSSL library is updated to version 1.0.1j or 0.9.8zc
to resolve multiple security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2014-3513, CVE-2014-3567,
CVE-2014-3566 ("POODLE") and CVE-2014-3568 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCenter Server 5.5 any Update 2d*
vCenter Server 5.1 any patch pending
vCenter Server 5.0 any patch pending
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
* The VMware vCenter 5.5 SSO component will be
updated in a later release
e. Update to ESXi libxml2 package
The libxml2 library is updated to version libxml2-2.7.6-17
to resolve a security issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2014-3660 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
4. Solution
Please review the patch/release notes for your product and
version and verify the checksum of your downloaded file.
VMware Workstation 10.x
--------------------------------
https://www.vmware.com/go/downloadworkstation
VMware Player 6.x
--------------------------------
https://www.vmware.com/go/downloadplayer
VMware Fusion 7.x and 6.x
--------------------------------
https://www.vmware.com/go/downloadplayer
vCenter Server
----------------------------
Downloads and Documentation:
https://www.vmware.com/go/download-vsphere
ESXi 5.5 Update 2d
----------------------------
File: update-from-esxi5.5-5.5_update01.zip
md5sum: 5773844efc7d8e43135de46801d6ea25
sha1sum: 6518355d260e81b562c66c5016781db9f077161f
http://kb.vmware.com/kb/2065832
update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG
ESXi 5.5
----------------------------
File: ESXi550-201501001.zip
md5sum: b0f2edd9ad17d0bae5a11782aaef9304
sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1
http://kb.vmware.com/kb/2099265
ESXi550-201501001.zip contains ESXi550-201501101-SG
ESXi 5.1
----------------------------
File: ESXi510-201404001.zip
md5sum: 9dc3c9538de4451244a2b62d247e52c4
sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66
http://kb.vmware.com/kb/2070666
ESXi510-201404001 contains ESXi510-201404101-SG
ESXi 5.0
----------------------------
File: ESXi500-201405001.zip
md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d
sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5
http://kb.vmware.com/kb/2075521
ESXi500-201405001 contains ESXi500-201405101-SG
5. References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8370
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660
- ------------------------------------------------------------------------
6. Change log
2015-01-27 VMSA-2015-0001
Initial security advisory in conjunction with the release of VMware
Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d
and, ESXi 5.5 Patches released on 2015-01-27.
- ------------------------------------------------------------------------
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories
http://kb.vmware.com/kb/2078735
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
Twitter
https://twitter.com/VMwareSRC
Copyright 2015 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8
wj8DBQFUx/+UDEcm8Vbi9kMRAmzrAKDG7u8ZTSlfQzU3eFphjebNgDkW2ACfZ9JE
c75UD0ctlJx5607JuLfnb6Y=
=IxpT
-----END PGP SIGNATURE-----
.
Please refer to the RESOLUTION
section below for a list of impacted products.
Note: mitigation instructions are included below if the following software
updates cannot be applied.
Family
Fixed Version
HP Branded Products Impacted
H3C Branded Products Impacted
3Com Branded Products Impacted
CVE
12900 Switch Series
R1005P15
JG619A HP FF 12910 Switch AC Chassis
JG621A HP FF 12910 Main Processing Unit
JG632A HP FF 12916 Switch AC Chassis
JG634A HP FF 12916 Main Processing Unit
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
12500
R1828P06
JC085A HP A12518 Switch Chassis
JC086A HP A12508 Switch Chassis
JC652A HP 12508 DC Switch Chassis
JC653A HP 12518 DC Switch Chassis
JC654A HP 12504 AC Switch Chassis
JC655A HP 12504 DC Switch Chassis
JF430A HP A12518 Switch Chassis
JF430B HP 12518 Switch Chassis
JF430C HP 12518 AC Switch Chassis
JF431A HP A12508 Switch Chassis
JF431B HP 12508 Switch Chassis
JF431C HP 12508 AC Switch Chassis
JC072B HP 12500 Main Processing Unit
JC808A HP 12500 TAA Main Processing Unit
H3C S12508 Routing Switch(AC-1) (0235A0GE)
H3C S12518 Routing Switch(AC-1) (0235A0GF)
H3C S12508 Chassis (0235A0E6)
H3C S12508 Chassis (0235A38N)
H3C S12518 Chassis (0235A0E7)
H3C S12518 Chassis (0235A38M)
H3C 12508 DC Switch Chassis (0235A38L)
H3C 12518 DC Switch Chassis (0235A38K)
CVE-2014-3566
CVE-2014-3568
12500 (Comware v7)
R7328P04
JC085A HP A12518 Switch Chassis
JC086A HP A12508 Switch Chassis
JC652A HP 12508 DC Switch Chassis
JC653A HP 12518 DC Switch Chassis
JC654A HP 12504 AC Switch Chassis
JC655A HP 12504 DC Switch Chassis
JF430A HP A12518 Switch Chassis
JF430B HP 12518 Switch Chassis
JF430C HP 12518 AC Switch Chassis
JF431A HP A12508 Switch Chassis
JF431B HP 12508 Switch Chassis
JF431C HP 12508 AC Switch Chassis
JC072B HP 12500 Main Processing Unit
JG497A HP 12500 MPU w/Comware V7 OS
JG782A HP FF 12508E AC Switch Chassis
JG783A HP FF 12508E DC Switch Chassis
JG784A HP FF 12518E AC Switch Chassis
JG785A HP FF 12518E DC Switch Chassis
JG802A HP FF 12500E MPU
H3C S12508 Routing Switch(AC-1) (0235A0GE)
H3C S12518 Routing Switch(AC-1) (0235A0GF)
H3C S12508 Chassis (0235A0E6)
H3C S12508 Chassis (0235A38N)
H3C S12518 Chassis (0235A0E7)
H3C S12518 Chassis (0235A38M)
H3C 12508 DC Switch Chassis (0235A38L)
H3C 12518 DC Switch Chassis (0235A38K)
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
11900 Switch Series
R2111P06
JG608A HP FF 11908-V Switch Chassis
JG609A HP FF 11900 Main Processing Unit
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
10500 Switch Series (Comware v5)
R1208P10
JC611A HP 10508-V Switch Chassis
JC612A HP 10508 Switch Chassis
JC613A HP 10504 Switch Chassis
JC614A HP 10500 Main Processing Unit
JC748A HP 10512 Switch Chassis
JG375A HP 10500 TAA Main Processing Unit
JG820A HP 10504 TAA Switch Chassis
JG821A HP 10508 TAA Switch Chassis
JG822A HP 10508-V TAA Switch Chassis
JG823A HP 10512 TAA Switch Chassis
CVE-2014-3566
CVE-2014-3568
10500 Switch Series (Comware v7)
R2111P06
JC611A HP 10508-V Switch Chassis
JC612A HP 10508 Switch Chassis
JC613A HP 10504 Switch Chassis
JC748A HP 10512 Switch Chassis
JG820A HP 10504 TAA Switch Chassis
JG821A HP 10508 TAA Switch Chassis
JG822A HP 10508-V TAA Switch Chassis
JG823A HP 10512 TAA Switch Chassis
JG496A HP 10500 Type A MPU w/Comware v7 OS
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
9500E
R1828P06
JC124A HP A9508 Switch Chassis
JC124B HP 9505 Switch Chassis
JC125A HP A9512 Switch Chassis
JC125B HP 9512 Switch Chassis
JC474A HP A9508-V Switch Chassis
JC474B HP 9508-V Switch Chassis
H3C S9505E Routing-Switch Chassis (0235A0G6)
H3C S9512E Routing-Switch Chassis (0235A0G7)
H3C S9508E-V Routing-Switch Chassis (0235A38Q)
H3C S9505E Chassis w/ Fans (0235A38P)
H3C S9512E Chassis w/ Fans (0235A38R)
CVE-2014-3566
CVE-2014-3568
7900
R2122
JG682A HP FlexFabric 7904 Switch Chassis
JH001A HP FF 7910 2.4Tbps Fabric / MPU
JG842A HP FF 7910 7.2Tbps Fabric / MPU
JG841A HP FF 7910 Switch Chassis
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
7500 Switch Series
R6708P10
JC666A HP A7503-S 144 Gbps Fab/MPU w 24p Gig-T
JC697A HP A7502 TAA Main Processing Unit
JC698A HP A7503S 144 Gbps TAA Fab/MPU w 24p GbE
JC699A HP A7500 384Gbps TAA Fab/MPU w 2p 10-GbE
JC700A HP A7500 384 Gbps TAA Fabric / MPU
JC701A HP A7510 768 Gbps TAA Fabric / MPU
JD193A HP 384 Gbps A7500 Fab Mod w/2 XFP Ports
JD193B HP 7500 384Gbps Fab Mod w/2 XFP Ports
JD194A HP 384 Gbps Fabric A7500 Module
JD194B HP 7500 384Gbps Fabric Module
JD195A HP 7500 384Gbps Advanced Fabric Module
JD196A HP 7502 Fabric Module
JD220A HP 7500 768Gbps Fabric Module
JD238A HP A7510 Switch Chassis
JD238B HP 7510 Switch Chassis
JD239A HP A7506 Switch Chassis
JD239B HP 7506 Switch Chassis
JD240A HP A7503 Switch Chassis
JD240B HP 7503 Switch Chassis
JD241A HP A7506 Vertical Switch Chassis
JD241B HP 7506-V Switch Chassis
JD242A HP A7502 Switch Chassis
JD242B HP 7502 Switch Chassis
JD243A HP A7503 Switch Chassis w/1 Fabric Slot
JD243B HP 7503-S Switch Chassis w/1 Fabric Slot
H3C S7502E Ethernet Switch Chassis with Fan (0235A0G4)
H3C S7503E Ethernet Switch Chassis with Fan (0235A0G2)
H3C S7503E-S Ethernet Switch Chassis with Fan (0235A0G5)
H3C S7506E Ethernet Switch Chassis with Fan (0235A0G1)
H3C S7506E-V Ethernet Switch Chassis with Fan (0235A0G3)
H3C S7510E Ethernet Switch Chassis with Fan (0235A0G0)
H3C S7502E Chassis w/ fans (0235A29A)
H3C S7503E Chassis w/ fans (0235A27R)
H3C S7503E-S Chassis w/ fans (0235A33R)
H3C S7506E Chassis w/ fans (0235A27Q)
H3C S7506E-V Chassis w/ fans (0235A27S)
CVE-2014-3566
CVE-2014-3568
HSR6800
R3303P18
JG361A HP HSR6802 Router Chassis
JG362A HP HSR6804 Router Chassis
JG363A HP HSR6808 Router Chassis
JG364A HP HSR6800 RSE-X2 Router MPU
JG779A HP HSR6800 RSE-X2 Router TAA MPU
CVE-2014-3566
CVE-2014-3568
HSR6800 Russian Version
R3303P18
JG361A HP HSR6802 Router Chassis
JG362A HP HSR6804 Router Chassis
JG363A HP HSR6808 Router Chassis
JG364A HP HSR6800 RSE-X2 Router MPU
JG779A HP HSR6800 RSE-X2 Router TAA MPU
CVE-2014-3566
CVE-2014-3568
HSR6602
R3303P18
JG353A HP HSR6602-G Router
JG354A HP HSR6602-XG Router
JG776A HP HSR6602-G TAA Router
JG777A HP HSR6602-XG TAA Router
JG777A HP HSR6602-XG TAA Router
CVE-2014-3566
CVE-2014-3568
HSR6602 Russian Version
R3303P18
JG353A HP HSR6602-G Router
JG354A HP HSR6602-XG Router
JG776A HP HSR6602-G TAA Router
JG777A HP HSR6602-XG TAA Router
CVE-2014-3566
CVE-2014-3568
6602
R3303P18
JC176A HP 6602 Router Chassis
H3C SR6602 1U Router Host (0235A27D)
CVE-2014-3566
CVE-2014-3568
6602 Russian Version
R3303P18
JC176A HP 6602 Router Chassis
H3C SR6602 1U Router Host (0235A27D)
CVE-2014-3566
CVE-2014-3568
A6600
R3303P18
JC165A HP 6600 RPE-X1 Router Module
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JC566A HP A6600 RSE-X1 Main Processing Unit
JG780A HP 6600 RSE-X1 Router TAA MPU
H3C RT-SR66-RPE-X1-H3 (0231A761)
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
A6600 Russian Version
R3303P18
JC165A HP 6600 RPE-X1 Router Module
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JC566A HP A6600 RSE-X1 Main Processing Unit
JG780A HP 6600 RSE-X1 Router TAA MPU
H3C RT-SR66-RPE-X1-H3 (0231A761)
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
6600 MCP
R3303P18
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JG778A HP 6600 MCP-X2 Router TAA MPU. JG355A HP 6600 MCP-X1 Router MPU
JG356A HP 6600 MCP-X2 Router MPU
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
6600 MCP Russian Version
R3303P18
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JG355A HP 6600 MCP-X1 Router MPU
JG356A HP 6600 MCP-X2 Router MPU
JG776A HP HSR6602-G TAA Router
JG777A HP HSR6602-XG TAA Router
JG778A HP 6600 MCP-X2 Router TAA MPU
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
5920 Switch Series
R2311P05
JG296A HP 5920AF-24XG Switch
JG555A HP 5920AF-24XG TAA Switch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5900 Switch Series
R2311P05
JC772A HP 5900AF-48XG-4QSFP+ Switch
JG336A HP 5900AF-48XGT-4QSFP+ Switch
JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
JG838A HP FF 5900CP-48XG-4QSFP+ Switch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5830 Switch Series
R1118P11
JC691A HP A5830AF-48G Switch w/1 Interface Slot
JC694A HP A5830AF-96G Switch
JG316A HP 5830AF-48G TAA Switch w/1 Intf Slot
JG374A HP 5830AF-96G TAA Switch
CVE-2014-3566
CVE-2014-3568
5820 Switch Series
R1809P03
JC102A HP 5820-24XG-SFP+ Switch
JC106A HP 5820-14XG-SFP+ Switch with 2 Slots
JG219A HP 5820AF-24XG Switch
JG243A HP 5820-24XG-SFP+ TAA-compliant Switch
JG259A HP 5820X-14XG-SFP+ TAA Switch w 2 Slots
H3C S5820X-28C 14 port (SFP Plus ) Plus 4-port BT (RJ45) Plus 2 media
modules Plus OSM (0235A37L)
H3C S5820X-28S 24-port 10GBASE-X (SFP Plus ) Plus 4-port 10/100/1000BASE-T
(RJ45) (0235A370)
CVE-2014-3566
CVE-2014-3568
5800 Switch Series
R1809P03
JC099A HP 5800-24G-PoE Switch
JC100A HP 5800-24G Switch
JC101A HP 5800-48G Switch with 2 Slots
JC103A HP 5800-24G-SFP Switch
JC104A HP 5800-48G-PoE Switch
JC105A HP 5800-48G Switch
JG225A HP 5800AF-48G Switch
JG242A HP 5800-48G-PoE+ TAA Switch w 2 Slots
JG254A HP 5800-24G-PoE+ TAA-compliant Switch
JG255A HP 5800-24G TAA-compliant Switch
JG256A HP 5800-24G-SFP TAA Switch w 1 Intf Slt
JG257A HP 5800-48G-PoE+ TAA Switch with 1 Slot
JG258A HP 5800-48G TAA Switch w 1 Intf Slot
H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot
(0235A36U)
H3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X
(SFP Plus ) Plus 1 media module PoE (0235A36S)
H3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus
media module (no power) (0235A374)
H3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus
) Plus media module (0235A379)
H3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module
(0235A378)
H3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM
(0235A36W)
CVE-2014-3566
CVE-2014-3568
5700
R2311P05
JG894A HP FF 5700-48G-4XG-2QSFP+ Switch
JG895A HP FF 5700-48G-4XG-2QSFP+ TAA Switch
JG896A HP FF 5700-40XG-2QSFP+ Switch
JG897A HP FF 5700-40XG-2QSFP+ TAA Switch
JG898A HP FF 5700-32XGT-8XG-2QSFP+ Switch
JG899A HP FF 5700-32XGT-8XG-2QSFP+ TAA Switch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5500 HI Switch Series
R5501P06
JG311A HP HI 5500-24G-4SFP w/2 Intf Slts Switch
JG312A HP HI 5500-48G-4SFP w/2 Intf Slts Switch
JG541A HP 5500-24G-PoE+-4SFP HI Switch w/2 Slt
JG542A HP 5500-48G-PoE+-4SFP HI Switch w/2 Slt
JG543A HP 5500-24G-SFP HI Switch w/2 Intf Slt
JG679A HP 5500-24G-PoE+-4SFP HI TAA Swch w/2Slt
JG680A HP 5500-48G-PoE+-4SFP HI TAA Swch w/2Slt
JG681A HP 5500-24G-SFP HI TAA Swch w/2Slt
CVE-2014-3566
CVE-2014-3568
5500 EI Switch Series
R2221P08
JD373A HP 5500-24G DC EI Switch
JD374A HP 5500-24G-SFP EI Switch
JD375A HP 5500-48G EI Switch
JD376A HP 5500-48G-PoE EI Switch
JD377A HP 5500-24G EI Switch
JD378A HP 5500-24G-PoE EI Switch
JD379A HP 5500-24G-SFP DC EI Switch
JG240A HP 5500-48G-PoE+ EI Switch w/2 Intf Slts
JG241A HP 5500-24G-PoE+ EI Switch w/2 Intf Slts
JG249A HP 5500-24G-SFP EI TAA Switch w 2 Slts
JG250A HP 5500-24G EI TAA Switch w 2 Intf Slts
JG251A HP 5500-48G EI TAA Switch w 2 Intf Slts
JG252A HP 5500-24G-PoE+ EI TAA Switch w/2 Slts
JG253A HP 5500-48G-PoE+ EI TAA Switch w/2 Slts
H3C S5500-28C-EI Ethernet Switch (0235A253)
H3C S5500-28F-EI Eth Switch AC Single (0235A24U)
H3C S5500-52C-EI Ethernet Switch (0235A24X)
H3C S5500-28C-EI-DC Ethernet Switch (0235A24S)
H3C S5500-28C-PWR-EI Ethernet Switch (0235A255)
H3C S5500-28F-EI Eth Swtch DC Single Pwr (0235A259)
H3C S5500-52C-PWR-EI Ethernet Switch (0235A251)
CVE-2014-3566
CVE-2014-3568
5500 SI Switch Series
R2221P08
JD369A HP 5500-24G SI Switch
JD370A HP 5500-48G SI Switch
JD371A HP 5500-24G-PoE SI Switch
JD372A HP 5500-48G-PoE SI Switch
JG238A HP 5500-24G-PoE+ SI Switch w/2 Intf Slts
JG239A HP 5500-48G-PoE+ SI Switch w/2 Intf Slts
H3C S5500-28C-SI Ethernet Switch (0235A04U)
H3C S5500-52C-SI Ethernet Switch (0235A04V)
H3C S5500-28C-PWR-SI Ethernet Switch (0235A05H)
H3C S5500-52C-PWR-SI Ethernet Switch (0235A05J)
CVE-2014-3566
CVE-2014-3568
5130 EI switch Series
R3108P03
JG932A HP 5130-24G-4SFP+ EI Switch
JG933A HP 5130-24G-SFP-4SFP+ EI Switch
JG934A HP 5130-48G-4SFP+ EI Switch
JG936A HP 5130-24G-PoE+-4SFP+ EI Swch
JG937A HP 5130-48G-PoE+-4SFP+ EI Swch
JG975A HP 5130-24G-4SFP+ EI BR Switch
JG976A HP 5130-48G-4SFP+ EI BR Switch
JG977A HP 5130-24G-PoE+-4SFP+ EI BR Swch
JG978A HP 5130-48G-PoE+-4SFP+ EI BR Swch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5120 EI Switch Series
R2221P08
JE066A HP 5120-24G EI Switch
JE067A HP 5120-48G EI Switch
JE068A HP 5120-24G EI Switch with 2 Slots
JE069A HP 5120-48G EI Switch with 2 Slots
JE070A HP 5120-24G-PoE EI Switch with 2 Slots
JE071A HP 5120-48G-PoE EI Switch with 2 Slots
JG236A HP 5120-24G-PoE+ EI Switch w/2 Intf Slts
JG237A HP 5120-48G-PoE+ EI Switch w/2 Intf Slts
JG245A HP 5120-24G EI TAA Switch w 2 Intf Slts
JG246A HP 5120-48G EI TAA Switch w 2 Intf Slts
JG247A HP 5120-24G-PoE+ EI TAA Switch w 2 Slts
JG248A HP 5120-48G-PoE+ EI TAA Switch w 2 Slts
H3C S5120-24P-EI 24GE Plus 4ComboSFP (0235A0BQ)
H3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt (0235A0BS)
H3C S5120-48P-EI 48GE Plus 4ComboSFP (0235A0BR)
H3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt (0235A0BT)
H3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE (0235A0BU)
H3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE (0235A0BV)
CVE-2014-3566
CVE-2014-3568
5120 SI switch Series
R1513P95
JE072A HP 5120-48G SI Switch
JE073A HP 5120-16G SI Switch
JE074A HP 5120-24G SI Switch
JG091A HP 5120-24G-PoE+ (370W) SI Switch
JG092A HP 5120-24G-PoE+ (170W) SI Switch
H3C S5120-52P-SI 48GE Plus 4 SFP (0235A41W)
H3C S5120-20P-SI L2
16GE Plus 4SFP (0235A42B)
H3C S5120-28P-SI 24GE Plus 4 SFP (0235A42D)
H3C S5120-28P-HPWR-SI (0235A0E5)
H3C S5120-28P-PWR-SI (0235A0E3)
CVE-2014-3566
CVE-2014-3568
4800 G Switch Series
R2221P08
JD007A HP 4800-24G Switch
JD008A HP 4800-24G-PoE Switch
JD009A HP 4800-24G-SFP Switch
JD010A HP 4800-48G Switch
JD011A HP 4800-48G-PoE Switch
3Com Switch 4800G 24-Port (3CRS48G-24-91)
3Com Switch 4800G 24-Port SFP (3CRS48G-24S-91)
3Com Switch 4800G 48-Port (3CRS48G-48-91)
3Com Switch 4800G PWR 24-Port (3CRS48G-24P-91)
3Com Switch 4800G PWR 48-Port (3CRS48G-48P-91)
CVE-2014-3566
CVE-2014-3568
4510G Switch Series
R2221P08
JF428A HP 4510-48G Switch
JF847A HP 4510-24G Switch
3Com Switch 4510G 48 Port (3CRS45G-48-91)
3Com Switch 4510G PWR 24-Port (3CRS45G-24P-91)
3Com Switch E4510-24G (3CRS45G-24-91)
CVE-2014-3566
CVE-2014-3568
4210G Switch Series
R2221P08
JF844A HP 4210-24G Switch
JF845A HP 4210-48G Switch
JF846A HP 4210-24G-PoE Switch
3Com Switch 4210-24G (3CRS42G-24-91)
3Com Switch 4210-48G (3CRS42G-48-91)
3Com Switch E4210-24G-PoE (3CRS42G-24P-91)
CVE-2014-3566
CVE-2014-3568
3610 Switch Series
R5319P10
JD335A HP 3610-48 Switch
JD336A HP 3610-24-4G-SFP Switch
JD337A HP 3610-24-2G-2G-SFP Switch
JD338A HP 3610-24-SFP Switch
H3C S3610-52P - model LS-3610-52P-OVS (0235A22C)
H3C S3610-28P - model LS-3610-28P-OVS (0235A22D)
H3C S3610-28TP - model LS-3610-28TP-OVS (0235A22E)
H3C S3610-28F - model LS-3610-28F-OVS (0235A22F)
CVE-2014-3566
CVE-2014-3568
3600 V2 Switch Series
R2110P03
JG299A HP 3600-24 v2 EI Switch
JG300A HP 3600-48 v2 EI Switch
JG301A HP 3600-24-PoE+ v2 EI Switch
JG301B HP 3600-24-PoE+ v2 EI Switch
JG302A HP 3600-48-PoE+ v2 EI Switch
JG302B HP 3600-48-PoE+ v2 EI Switch
JG303A HP 3600-24-SFP v2 EI Switch
JG304A HP 3600-24 v2 SI Switch
JG305A HP 3600-48 v2 SI Switch
JG306A HP 3600-24-PoE+ v2 SI Switch
JG306B HP 3600-24-PoE+ v2 SI Switch
JG307A HP 3600-48-PoE+ v2 SI Switch
JG307B HP 3600-48-PoE+ v2 SI Switch
CVE-2014-3566
CVE-2014-3568
3100V2
R5203P11
JD313B HP 3100-24-PoE v2 EI Switch
JD318B HP 3100-8 v2 EI Switch
JD319B HP 3100-16 v2 EI Switch
JD320B HP 3100-24 v2 EI Switch
JG221A HP 3100-8 v2 SI Switch
JG222A HP 3100-16 v2 SI Switch
JG223A HP 3100-24 v2 SI Switch
CVE-2014-3566
CVE-2014-3568
3100V2-48
R2110P03
JG315A HP 3100-48 v2 Switch
CVE-2014-3566
CVE-2014-3568
1920
R1105
JG920A HP 1920-8G Switch
JG921A HP 1920-8G-PoE+ (65W) Switch
JG922A HP 1920-8G-PoE+ (180W) Switch
JG923A HP 1920-16G Switch
JG924A HP 1920-24G Switch
JG925A HP 1920-24G-PoE+ (180W) Switch
JG926A HP 1920-24G-PoE+ (370W) Switch
JG927A HP 1920-48G Switch
CVE-2014-3566
CVE-2014-3568
1910 R11XX
R1107
JG536A HP 1910-8 Switch
JG537A HP 1910-8 -PoE+ Switch
JG538A HP 1910-24 Switch
JG539A HP 1910-24-PoE+ Switch
JG540A HP 1910-48 Switch
CVE-2014-3566
CVE-2014-3568
1910 R15XX
R1513P95
JE005A HP 1910-16G Switch
JE006A HP 1910-24G Switch
JE007A HP 1910-24G-PoE (365W) Switch
JE008A HP 1910-24G-PoE(170W) Switch
JE009A HP 1910-48G Switch
JG348A HP 1910-8G Switch
JG349A HP 1910-8G-PoE+ (65W) Switch
JG350A HP 1910-8G-PoE+ (180W) Switch
CVE-2014-3566
CVE-2014-3568
1620
R1104
JG912A HP 1620-8G Switch
JG913A HP 1620-24G Switch
JG914A HP 1620-48G Switch
CVE-2014-3566
CVE-2014-3568
MSR20-1X
R2513P33
JD431A HP MSR20-10 Router
JD667A HP MSR20-15 IW Multi-Service Router
JD668A HP MSR20-13 Multi-Service Router
JD669A HP MSR20-13 W Multi-Service Router
JD670A HP MSR20-15 A Multi-Service Router
JD671A HP MSR20-15 AW Multi-Service Router
JD672A HP MSR20-15 I Multi-Service Router
JD673A HP MSR20-11 Multi-Service Router
JD674A HP MSR20-12 Multi-Service Router
JD675A HP MSR20-12 W Multi-Service Router
JD676A HP MSR20-12 T1 Multi-Service Router
JF236A HP MSR20-15-I Router
JF237A HP MSR20-15-A Router
JF238A HP MSR20-15-I-W Router
JF239A HP MSR20-11 Router
JF240A HP MSR20-13 Router
JF241A HP MSR20-12 Router
JF806A HP MSR20-12-T Router
JF807A HP MSR20-12-W Router
JF808A HP MSR20-13-W Router
JF809A HP MSR20-15-A-W Router
JF817A HP MSR20-15 Router
JG209A HP MSR20-12-T-W Router (NA)
JG210A HP MSR20-13-W Router (NA)
H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)
H3C MSR 20-10 (0235A0A7)
H3C RT-MSR2011-AC-OVS-H3 (0235A395)
H3C RT-MSR2012-AC-OVS-H3 (0235A396)
H3C RT-MSR2012-AC-OVS-W-H3 (0235A397)
H3C RT-MSR2012-T-AC-OVS-H3 (0235A398)
H3C RT-MSR2013-AC-OVS-H3 (0235A390)
H3C RT-MSR2013-AC-OVS-W-H3 (0235A391)
H3C RT-MSR2015-AC-OVS-A-H3 (0235A392)
H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)
H3C RT-MSR2015-AC-OVS-I-H3 (0235A394)
H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)
H3C MSR 20-11 (0235A31V)
H3C MSR 20-12 (0235A32E)
H3C MSR 20-12 T1 (0235A32B)
H3C MSR 20-13 (0235A31W)
H3C MSR 20-13 W (0235A31X)
H3C MSR 20-15 A (0235A31Q)
H3C MSR 20-15 A W (0235A31R)
H3C MSR 20-15 I (0235A31N)
H3C MSR 20-15 IW (0235A31P)
H3C MSR20-12 W (0235A32G)
CVE-2014-3566
CVE-2014-3568
MSR30
R2513P33
JD654A HP MSR30-60 POE Multi-Service Router
JD657A HP MSR30-40 Multi-Service Router
JD658A HP MSR30-60 Multi-Service Router
JD660A HP MSR30-20 POE Multi-Service Router
JD661A HP MSR30-40 POE Multi-Service Router
JD666A HP MSR30-20 Multi-Service Router
JF229A HP MSR30-40 Router
JF230A HP MSR30-60 Router
JF232A HP RT-MSR3040-AC-OVS-AS-H3
JF235A HP MSR30-20 DC Router
JF284A HP MSR30-20 Router
JF287A HP MSR30-40 DC Router
JF801A HP MSR30-60 DC Router
JF802A HP MSR30-20 PoE Router
JF803A HP MSR30-40 PoE Router
JF804A HP MSR30-60 PoE Router
H3C MSR 30-20 Router (0235A328)
H3C MSR 30-40 Router Host(DC) (0235A268)
H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)
H3C RT-MSR3020-DC-OVS-H3 (0235A267)
H3C RT-MSR3040-AC-OVS-H (0235A299)
H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)
H3C RT-MSR3060-AC-OVS-H3 (0235A320)
H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)
H3C RT-MSR3060-DC-OVS-H3 (0235A269)
H3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S)
H3C MSR 30-20 (0235A19L)
H3C MSR 30-20 POE (0235A239)
H3C MSR 30-40 (0235A20J)
H3C MSR 30-40 POE (0235A25R)
H3C MSR 30-60 (0235A20K)
H3C MSR 30-60 POE (0235A25S)
H3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V)
CVE-2014-3566
CVE-2014-3568
MSR30-16
R2513P33
JD659A HP MSR30-16 POE Multi-Service Router
JD665A HP MSR30-16 Multi-Service Router
JF233A HP MSR30-16 Router
JF234A HP MSR30-16 PoE Router
H3C RT-MSR3016-AC-OVS-H3 (0235A327)
H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)
H3C MSR 30-16 (0235A237)
H3C MSR 30-16 POE (0235A238)
CVE-2014-3566
CVE-2014-3568
MSR30-1X
R2513P33
JF800A HP MSR30-11 Router
JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
JG182A HP MSR30-11E Router
JG183A HP MSR30-11F Router
JG184A HP MSR30-10 DC Router
H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)
H3C RT-MSR3011-AC-OVS-H3 (0235A29L)
CVE-2014-3566
CVE-2014-3568
MSR50
R2513P33
JD433A HP MSR50-40 Router
JD653A HP MSR50 Processor Module
JD655A HP MSR50-40 Multi-Service Router
JD656A HP MSR50-60 Multi-Service Router
JF231A HP MSR50-60 Router
JF285A HP MSR50-40 DC Router
JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
H3C MSR 50-40 Router (0235A297)
H3C MSR5040-DC-OVS-H3C (0235A20P)
H3C RT-MSR5060-AC-OVS-H3 (0235A298)
H3C MSR 50-40 Chassis (0235A20N)
H3C MSR 50-60 Chassis (0235A20L)
CVE-2014-3566
CVE-2014-3568
MSR50-G2
R2513P33
JD429A HP MSR50 G2 Processor Module
JD429B HP MSR50 G2 Processor Module
H3C H3C MSR 50 Processor Module-G2 (0231A84Q)
H3C MSR 50 High Performance Main Processing Unit 3GE (Combo)
256F/1GD(0231A0KL)
CVE-2014-3566
CVE-2014-3568
MSR20 Russian version
MSR201X_5.20.R2513L40.RU
JD663B HP MSR20-21 Router
JF228A HP MSR20-40 Router
JF283A HP MSR20-20 Router
H3C RT-MSR2020-AC-OVS-H3C (0235A324)
H3C RT-MSR2040-AC-OVS-H3 (0235A326)
CVE-2014-3566
CVE-2014-3568
MSR20-1X Russian version
MSR201X_5.20.R2513L40.RU
JD431A HP MSR20-10 Router
JF236A HP MSR20-15-I Router
JF237A HP MSR20-15-A Router
JF238A HP MSR20-15-I-W Router
JF239A HP MSR20-11 Router
JF240A HP MSR20-13 Router
JF241A HP MSR20-12 Router
JF806A HP MSR20-12-T Router
JF807A HP MSR20-12-W Router
JF808A HP MSR20-13-W Router
JF809A HP MSR20-15-A-W Router
JF817A HP MSR20-15 Router
H3C MSR 20-10 (0235A0A7)
H3C RT-MSR2015-AC-OVS-I-H3 (0235A394)
H3C RT-MSR2015-AC-OVS-A-H3 (0235A392)
H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)
H3C RT-MSR2011-AC-OVS-H3 (0235A395)
H3C RT-MSR2013-AC-OVS-H3 (0235A390)
H3C RT-MSR2012-AC-OVS-H3 (0235A396)
H3C RT-MSR2012-T-AC-OVS-H3 (0235A398)
H3C RT-MSR2012-AC-OVS-W-H3 (0235A397)
H3C RT-MSR2013-AC-OVS-W-H3 (0235A391)
H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)
H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)
CVE-2014-3566
CVE-2014-3568
MSR30 Russian version
MSR201X_5.20.R2513L40.RU
JF229A HP MSR30-40 Router
JF230A HP MSR30-60 Router
JF235A HP MSR30-20 DC Router
JF284A HP MSR30-20 Router
JF287A HP MSR30-40 DC Router
JF801A HP MSR30-60 DC Router
JF802A HP MSR30-20 PoE Router
JF803A HP MSR30-40 PoE Router
JF804A HP MSR30-60 PoE Router
H3C RT-MSR3040-AC-OVS-H (0235A299)
H3C RT-MSR3060-AC-OVS-H3 (0235A320)
H3C RT-MSR3020-DC-OVS-H3 (0235A267)
H3C MSR 30-20 Router (0235A328)
H3C MSR 30-40 Router Host(DC) (0235A268)
H3C RT-MSR3060-DC-OVS-H3 (0235A269)
H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)
H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)
H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)
CVE-2014-3566
CVE-2014-3568
MSR30-16 Russian version
MSR201X_5.20.R2513L40.RU
JF233A HP MSR30-16 Router
JF234A HP MSR30-16 PoE Router
H3C RT-MSR3016-AC-OVS-H3 (0235A327)
H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)
CVE-2014-3566
CVE-2014-3568
MSR30-1X Russian version
MSR201X_5.20.R2513L40.RU
JF800A HP MSR30-11 Router
JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
JG182A HP MSR30-11E Router
JG183A HP MSR30-11F Router
JG184A HP MSR30-10 DC Router
H3C RT-MSR3011-AC-OVS-H3 (0235A29L)
H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)
CVE-2014-3566
CVE-2014-3568
MSR50 Russian version
MSR201X_5.20.R2513L40.RU
JD433A HP MSR50-40 Router
JD653A HP MSR50 Processor Module
JD655A HP MSR50-40 Multi-Service Router
JD656A HP MSR50-60 Multi-Service Router
JF231A HP MSR50-60 Router
JF285A HP MSR50-40 DC Router
JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
H3C MSR 50-40 Router (0235A297)
H3C MSR 50 Processor Module (0231A791)
H3C MSR 50-40 Chassis (0235A20N)
H3C MSR 50-60 Chassis (0235A20L)
H3C RT-MSR5060-AC-OVS-H3 (0235A298)
H3C MSR5040-DC-OVS-H3C (0235A20P)
CVE-2014-3566
CVE-2014-3568
MSR50 G2 Russian version
MSR201X_5.20.R2513L40.RU
JD429B HP MSR50 G2 Processor Module
H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD
(0231A0KL)
CVE-2014-3566
CVE-2014-3568
MSR9XX
R2513P33
JF812A HP MSR900 Router
JF813A HP MSR920 Router
JF814A HP MSR900-W Router
JF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr
JG207A HP MSR900-W Router (NA)
JG208A HP MSR920-W Router (NA)
H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b
(0235A0C2)
H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX)
H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)
H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)
CVE-2014-3566
CVE-2014-3568
MSR93X
R2513P33
JG512A HP MSR930 Wireless Router
JG513A HP MSR930 3G Router
JG514A HP MSR931 Router
JG515A HP MSR931 3G Router
JG516A HP MSR933 Router
JG517A HP MSR933 3G Router
JG518A HP MSR935 Router
JG519A HP MSR935 Wireless Router
JG520A HP MSR935 3G Router
JG531A HP MSR931 Dual 3G Router
JG596A HP MSR930 4G LTE/3G CDMA Router
JG597A HP MSR936 Wireless Router
JG665A HP MSR930 4G LTE/3G WCDMA Global Router
JG704A HP MSR930 4G LTE/3G WCDMA ATT Router
CVE-2014-3566
CVE-2014-3568
MSR1000
R2513P33
JG732A HP MSR1003-8 AC Router
CVE-2014-3566
CVE-2014-3568
MSR1000 Russian version
R2513L40.RU
JG732A HP MSR1003-8 AC Router
CVE-2014-3566
CVE-2014-3568
MSR2000
R0106P18
JG411A HP MSR2003 AC Router
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
MSR3000
R0106P18
JG404A HP MSR3064 Router
JG405A HP MSR3044 Router
JG406A HP MSR3024 AC Router
JG409A HP MSR3012 AC Router
JG861A HP MSR3024 TAA-compliant AC Router
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
MSR4000
R0106P18
JG402A HP MSR4080 Router Chassis
JG403A HP MSR4060 Router Chassis
JG412A HP MSR4000 MPU-100 Main Processing Unit
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
F5000
F3210P22
JG216A HP F5000 Firewall Standalone Chassis
JD259A HP A5000-A5 VPN Firewall Chassis
H3C SecPath F5000-A5 Host System (0150A0AG)
CVE-2014-3566
CVE-2014-3568
F5000-C
R3811P03
JG650A HP F5000-C VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
F5000-S
R3811P03
JG370A HP F5000-S VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
U200S and CS
F5123P30
JD268A HP 200-CS UTM Appliance
JD273A HP U200-S UTM Appliance
H3C SecPath U200-S (0235A36N)
CVE-2014-3566
CVE-2014-3568
U200A and M
F5123P30
JD274A HP 200-M UTM Appliance
JD275A HP U200-A UTM Appliance
H3C SecPath U200-A (0235A36Q)
CVE-2014-3566
CVE-2014-3568
SecBlade III
R3820P03
JG371A HP 12500 20Gbps VPN Firewall Module
JG372A HP 10500/11900/7500 20Gbps VPN FW Mod
CVE-2014-3566
CVE-2014-3568
SecBlade FW
R3181P05
JC635A HP 12500 VPN Firewall Module
JD245A HP 9500 VPN Firewall Module
JD249A HP 10500/7500 Advanced VPN Firewall Mod
JD250A HP 6600 Firewall Processing Rtr Module
JD251A HP 8800 Firewall Processing Module
JD255A HP 5820 VPN Firewall Module
H3C S9500E SecBlade VPN Firewall Module (0231A0AV)
H3C S7500E SecBlade VPN Firewall Module (0231A832)
H3C SR66 Gigabit Firewall Module (0231A88A)
H3C SR88 Firewall Processing Module (0231A88L)
H3C S5820 SecBlade VPN Firewall Module (0231A94J)
CVE-2014-3566
CVE-2014-3568
F1000-E
R3181P05
JD272A HP F1000-E VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
F1000-A
R3734P06
JG214A HP F1000-A-EI VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
F1000-S
R3734P06
JG213A HP F1000-S-EI VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
SecBlade SSL VPN
Fix in Progress
Use Mitigation
JD253A HP 10500/7500 SSL VPN Mod w 500-user Lic
CVE-2014-3566
CVE-2014-3568
VSR1000
R0204P01
JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
JG811AAE HP VSR1001 Comware 7 Virtual Services Router
JG812AAE HP VSR1004 Comware 7 Virtual Services Router
JG813AAE HP VSR1008 Comware 7 Virtual Services Router
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
WX5002/5004
R2507P34
JD441A HP 5800 ACM for 64-256 APs
JD447B HP WX5002 Access Controller
JD448A HP A-WX5004 Access Controller
JD448B HP WX5004 Access Controller
JD469A HP A-WX5004 (3Com) Access Controller
JG261A HP 5800 Access Controller OAA TAA Mod
CVE-2014-3566
CVE-2014-3568
HP 850/870
R2607P34
JG723A HP 870 Unified Wired-WLAN Appliance
JG725A HP 870 Unifd Wrd-WLAN TAA Applnc
JG722A HP 850 Unified Wired-WLAN Appliance
JG724A HP 850 Unifd Wrd-WLAN TAA Applnc
CVE-2014-3566
CVE-2014-3568
HP 830
R3507P34
JG640A HP 830 24P PoE+ Unifd Wired-WLAN Swch
JG641A HP 830 8P PoE+ Unifd Wired-WLAN Swch
JG646A HP 830 24-Port PoE+ Wrd-WLAN TAA Switch
JG647A HP 830 8-Port PoE+ Wrd-WLAN TAA Switch
CVE-2014-3566
CVE-2014-3568
HP 6000
R2507P34
JG639A HP 10500/7500 20G Unified Wired-WLAN Mod
JG645A HP 10500/7500 20G Unifd Wrd-WLAN TAA Mod
CVE-2014-3566
CVE-2014-3568
VCX
Fix in Progress
Use Mitigation
J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr
J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr
JC517A HP VCX V7205 Platform w/DL 360 G6 Server
JE355A HP VCX V6000 Branch Platform 9.0
JC516A HP VCX V7005 Platform w/DL 120 G6 Server
JC518A HP VCX Connect 200 Primry 120 G6 Server
J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr
JE341A HP VCX Connect 100 Secondary
JE252A HP VCX Connect Primary MIM Module
JE253A HP VCX Connect Secondary MIM Module
JE254A HP VCX Branch MIM Module
JE355A HP VCX V6000 Branch Platform 9.0
JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod
JD023A HP MSR30-40 Router with VCX MIM Module
JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM
JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod
JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod
JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod
JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS
JE340A HP VCX Connect 100 Pri Server 9.0
JE342A HP VCX Connect 100 Sec Server 9.0
CVE-2014-3566
CVE-2014-3568
iMC PLAT
iMC PLAT v7.1 E0303P06
JD125A HP IMC Std S/W Platform w/100-node
JD126A HP IMC Ent S/W Platform w/100-node
JD808A HP IMC Ent Platform w/100-node License
JD815A HP IMC Std Platform w/100-node License
JF377A HP IMC Std S/W Platform w/100-node Lic
JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU
JF378A HP IMC Ent S/W Platform w/200-node Lic
JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU
JG546AAE HP IMC Basic SW Platform w/50-node E-LTU
JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU
JG550AAE HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU
JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU
JG659AAE HP IMC Smart Connect VAE E-LTU
JG660AAE HP IMC Smart Connect w/WLM VAE E-LTU
JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU
JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU
JG766AAE HP IMC SmCnct Vrtl Applnc SW E-LTU
JG767AAE HP IMC SmCnct WSM Vrtl Applnc SW E-LTU
JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU
CVE-2014-3566
iMC UAM
iMC UAM v7.1 E0302P07
JD144A HP IMC UAM S/W Module w/200-User License
JF388A HP IMC UAM S/W Module w/200-user License
JF388AAE HP IMC UAM S/W Module w/200-user E-LTU
JG752AAE HP IMC UAM SW Mod w/ 50-user E-LTU
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
iMC WSM
Fix in Progress
Use Mitigation
JD456A HP WSM Plug-in for IMC
Includes 50 Aps
JF414A HP IMC WSM S/W Module with 50-AP License
JF414AAE HP IMC WSM S/W Module with 50-AP E-LTU
JG551AAE HP PMM to IMC WSM Upgr w/250 AP E-LTU
JG769AAE HP PMM to IMC WSM Upg w/ 250-node E-LTU
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
A
Fixes in progress
use mitigations
J9565A HP 2615-8-PoE Switch
J9562A HP 2915-8G-PoE Switch
E
Fixes in progress
use mitigations
J4850A HP ProCurve Switch 5304xl
J8166A HP ProCurve Switch 5304xl-32G
J4819A HP ProCurve Switch 5308xl
J8167A HP ProCurve Switch 5308xl-48G
J4849A HP ProCurve Switch 5348xl
J4849B HP ProCurve Switch 5348xl
J4848A HP ProCurve Switch 5372xl
J4848B HP ProCurve Switch 5372xl
F
Fixes in progress
use mitigations
J4812A HP ProCurve 2512 Switch
J4813A HP ProCurve 2524 Switch
J4817A HP ProCurve 2312 Switch
J4818A HP ProCurve 2324 Switch
H.07
Fixes in progress
use mitigations
J4902A HP ProCurve 6108 Switch
H.10
Fixes in progress
use mitigations
J8762A HP E2600-8-PoE Switch
J4900A HP PROCURVE SWITCH 2626
J4900B HP ProCurve Switch 2626
J4900C ProCurve Switch 2626
J4899A HP ProCurve Switch 2650
J4899B HP ProCurve Switch 2650
J4899C ProCurve Switch 2650
J8164A ProCurve Switch 2626-PWR
J8165A HP ProCurve Switch 2650-PWR
i.10
Fixes in progress
use mitigations
J4903A ProCurve Switch 2824
J4904A HP ProCurve Switch 2848
J
Fixes in progress
use mitigations
J9299A HP 2520-24G-PoE Switch
J9298A HP 2520-8G-PoE Switch
K
Fixes in progress
use mitigations
J8692A HP 3500-24G-PoE yl Switch
J8693A HP 3500-48G-PoE yl Switch
J9310A HP 3500-24G-PoE+ yl Switch
J9311A HP 3500-48G-PoE+ yl Switch
J9470A HP 3500-24 Switch
J9471A HP 3500-24-PoE Switch
J9472A HP 3500-48 Switch
J9473A HP 3500-48-PoE Switch
J8697A HP E5406 zl Switch Chassis
J8699A HP 5406-48G zl Switch
J9447A HP 5406-44G-PoE+-4SFP zl Switch
J9533A HP 5406-44G-PoE+-2XG v2 zl Swch w Pm SW
J9539A HP 5406-44G-PoE+-4G v2 zl Swch w Prm SW
J9642A HP 5406 zl Switch with Premium Software
J9866A HP 5406 8p10GT 8p10GE Swch and Psw
J8698A HP E5412 zl Switch Chassis
J8700A HP 5412-96G zl Switch
J9448A HP 5412-92G-PoE+-4SFP zl Switch
J9532A HP 5412-92G-PoE+-2XG v2 zl Swch w Pm SW
J9540A HP 5412-92G-PoE+-4G v2 zl Swch w Prm SW
J9643A HP 5412 zl Switch with Premium Software
J8992A HP 6200-24G-mGBIC yl Switch
J9263A HP E6600-24G Switch
J9264A HP 6600-24G-4XG Switch
J9265A HP 6600-24XG Switch
J9451A HP E6600-48G Switch
J9452A HP 6600-48G-4XG Switch
J9475A HP E8206 zl Switch Base System
J9638A HP 8206-44G-PoE+-2XG v2 zl Swch w Pm SW
J9640A HP 8206 zl Switch w/Premium Software
J8715A ProCurve Switch 8212zl Base System
J8715B HP E8212 zl Switch Base System
J9091A ProCurve Switch 8212zl Chassis&Fan Tray
J9639A HP 8212-92G-PoE+-2XG v2 zl Swch w Pm SW
J9641A HP 8212 zl Switch with Premium SW
KA
Fixes in progress
use mitigations
J9573A HP 3800-24G-PoE+-2SFP+ Switch
J9574A HP 3800-48G-PoE+-4SFP+ Switch
J9575A HP 3800-24G-2SFP+ Switch
J9576A HP 3800-48G-4SFP+ Switch
J9584A HP 3800-24SFP-2SFP+ Switch
J9585A HP 3800-24G-2XG Switch
J9586A HP 3800-48G-4XG Switch
J9587A HP 3800-24G-PoE+-2XG Switch
J9588A HP 3800-48G-PoE+-4XG Switch
KB
Fixes in progress
use mitigations
J9821A HP 5406R zl2 Switch
J9822A HP 5412R zl2 Switch
J9823A HP 5406R-Gig-T-PoE+/SFP+ v2 zl2 Swch
J9824A HP 5406R-Gig-T-PoE+/SFP v2 zl2 Swch
J9825A HP 5412R-Gig-T-PoE+/SFP+ v2 zl2 Swch
J9826A HP 5412R-Gig-T-PoE+/SFP v2 zl2 Swch
J9850A HP 5406R zl2 Switch
J9851A HP 5412R zl2 Switch
J9868A HP 5406R-8XGT/8SFP+ v2 zl2 Swch
L
Fixes in progress
use mitigations
J8772B HP 4202-72 Vl Switch
J8770A HP 4204 Vl Switch Chassis
J9064A HP 4204-44G-4SFP Vl Switch
J8773A HP 4208 Vl Switch Chassis
J9030A HP 4208-68G-4SFP Vl Switch
J8775B HP 4208-96 Vl Switch
J8771A ProCurve Switch 4202VL-48G
J8772A ProCurve Switch 4202VL-72
J8774A ProCurve Switch 4208VL-64G
J8775A ProCurve Switch 4208VL-96
M.08
Fixes in progress
use mitigations
J8433A HP 6400-6XG cl Switch
J8474A HP 6410-6XG cl Switch
M.10
Fixes in progress
use mitigations
J4906A HP E3400-48G cl Switch
J4905A HP ProCurve Switch 3400cl-24G
N
Fixes in progress
use mitigations
J9021A HP 2810-24G Switch
J9022A HP 2810-48G Switch
PA
Fixes in progress
use mitigations
J9029A ProCurve Switch 1800-8G
PB
Fixes in progress
use mitigations
J9028A ProCurve Switch 1800-24G
J9028B ProCurve Switch 1800-24G
Q
Fixes in progress
use mitigations
J9019B HP 2510-24 Switch
J9019A ProCurve Switch 2510-24
R
Fixes in progress
use mitigations
J9085A HP 2610-24 Switch
J9087A HP 2610-24-PoE Switch
J9086A HP 2610-24-PPoE Switch
J9088A HP 2610-48 Switch
J9089A HP 2610-48-PoE Switch
RA
Fixes in progress
use mitigations
J9623A HP 2620-24 Switch
J9624A HP 2620-24-PPoE+ Switch
J9625A HP 2620-24-PoE+ Switch
J9626A HP 2620-48 Switch
J9627A HP 2620-48-PoE+ Switch
S
Fixes in progress
use mitigations
J9138A HP 2520-24-PoE Switch
J9137A HP 2520-8-PoE Switch
T
Fixes in progress
use mitigations
J9049A ProCurve Switch 2900- 24G
J9050A ProCurve Switch 2900 48G
U
Fixes in progress
use mitigations
J9020A HP 2510-48 Switch
VA
Fixes in progress
use mitigations
J9079A HP 1700-8 Switch
VB
Fixes in progress
use mitigations
J9080A HP 1700-24 Switch
W
Fixes in progress
use mitigations
J9145A HP 2910-24G al Switch
J9146A HP 2910-24G-PoE+ al Switch
J9147A HP 2910-48G al Switch
J9148A HP 2910-48G-PoE+ al Switch
WB
Fixes in progress
use mitigations
J9726A HP 2920-24G Switch
J9727A HP 2920-24G-POE+ Switch
J9728A HP 2920-48G Switch
J9729A HP 2920-48G-POE+ Switch
J9836A HP 2920-48G-POE+ 740W Switch
Y
Fixes in progress
use mitigations
J9279A HP 2510-24G Switch
J9280A HP 2510-48G Switch
YA
Fixes in progress
use mitigations
J9772A HP 2530-48G-PoE+ Switch
J9773A HP 2530-24G-PoE+ Switch
J9774A HP 2530-8G-PoE+ Switch
J9775A HP 2530-48G Switch
J9776A HP 2530-24G Switch
J9777A HP 2530-8G Switch
J9778A HP 2530-48-PoE+ Switch
J9781A HP 2530-48 Switch
J9853A HP 2530-48G-PoE+-2SFP+ Switch
J9854A HP 2530-24G-PoE+-2SFP+ Switch
J9855A HP 2530-48G-2SFP+ Switch
J9856A HP 2530-24G-2SFP+ Switch
YB
Fixes in progress
use mitigations
J9779A HP 2530-24-PoE+ Switch
J9780A HP 2530-8-PoE+ Switch
J9782A HP 2530-24 Switch
J9783A HP 2530-8 Switch
MSM 6.5
6.5.1.0
J9420A HP MSM760 Premium Mobility Controller
J9421A HP MSM760 Access Controller
J9370A HP MSM765 Zl Premium Mobility Controller
J9693A HP MSM720 Access Controller (WW)
J9694A HP MSM720 Premium Mobility Cntlr (WW)
J9695A HP MSM720 TAA Access Controller
J9696A HP MSM720 TAA Premium Mobility Cntlr
J9840A HP MSM775 zl Premium Controller Module
J9845A HP 560 Wireless 802.11ac (AM) AP
J9846A HP 560 Wireless 802.11ac (WW) AP
J9847A HP 560 Wireless 802.11ac (JP) AP
J9848A HP 560 Wireless 802.11ac (IL) AP
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
J9426A HP E-MSM410 Access Point (US)
J9426B HP MSM410 Access Point (US)
J9427A HP E-MSM410 Access Point (WW)
J9427B HP MSM410 Access Point (WW)
J9427C HP MSM410 Access Point (WW)
J9529A HP E-MSM410 Access Point (JP)
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
MSM 6.4
6.4.2.1
J9840A HP MSM775 zl Premium Controller Module
J9370A HP MSM765 Zl Premium Mobility Controller
J9420A HP MSM760 Premium Mobility Controller
J9421A HP MSM760 Access Controller
J9693A HP MSM720 Access Controller (WW)
J9694A HP MSM720 Premium Mobility Cntlr (WW)
J9695A HP MSM720 TAA Access Controller
J9696A HP MSM720 TAA Premium Mobility Cntlr
J9426A HP E-MSM410 Access Point (US)
J9426B HP MSM410 Access Point (US)
J9427A HP E-MSM410 Access Point (WW)
J9427B HP MSM410 Access Point (WW)
J9427C HP MSM410 Access Point (WW)
J9529A HP E-MSM410 Access Point (JP)
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
MSM 6.3
6.3.1.0
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
J9356A HP E-MSM335 Access Point (US)
J9356B HP MSM335 Access Point (US)
J9357A HP E-MSM335 Access Point (WW)
J9357B HP MSM335 Access Point (WW)
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
J9360A HP E-MSM320 Access Point (US)
J9360B HP MSM320 Access Point (US)
J9364A HP E-MSM320 Access Point (WW)
J9364B HP MSM320 Access Point (WW)
J9365A HP MSM320-R Access Point (US)
J9365B HP MSM320-R Access Point (US)
J9368A HP E-MSM320-R Access Point (WW)
J9368B HP MSM320-R Access Point (WW)
J9373A HP E-MSM325 Access Point (WW)
J9373B HP MSM325 Access Point (WW)
J9374A HP E-MSM310 Access Point (US)
J9374B HP MSM310 Access Point (US)
J9379A HP MSM310 Access Point (WW)
J9379B HP MSM310 Access Point (WW)
J9380A HP E-MSM310-R Access Point (US)
J9380B HP MSM310-R Access Point (US)
J9383A HP E-MSM310-R Access Point (WW)
J9383B HP MSM310-R Access Point (WW)
J9524A HP E-MSM310 Access Point (JP)
J9524B HP MSM310 Access Point (JP)
J9527A HP E-MSM320 Access Point (JP)
J9527B HP MSM320 Access Point (JP)
J9528A HP E-MSM320-R Access Point (JP)
J9528B HP MSM320-R Access Point (JP)
MSM 6.2
6.2.1.2
J9370A HP MSM765 Zl Premium Mobility Controller
J9356A HP E-MSM335 Access Point (US)
J9356B HP MSM335 Access Point (US)
J9357A HP E-MSM335 Access Point (WW)
J9357B HP MSM335 Access Point (WW)
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
J9420A HP MSM760 Premium Mobility Controller
J9421A HP MSM760 Access Controller
J9840A HP MSM775 zl Premium Controller Module
J9360A HP E-MSM320 Access Point (US)
J9360B HP MSM320 Access Point (US)
J9364A HP E-MSM320 Access Point (WW)
J9364B HP MSM320 Access Point (WW)
J9365A HP MSM320-R Access Point (US)
J9365B HP MSM320-R Access Point (US)
J9368A HP E-MSM320-R Access Point (WW)
J9368B HP MSM320-R Access Point (WW)
J9373A HP E-MSM325 Access Point (WW)
J9373B HP MSM325 Access Point (WW)
J9374A HP E-MSM310 Access Point (US)
J9374B HP MSM310 Access Point (US)
J9379A HP MSM310 Access Point (WW)
J9379B HP MSM310 Access Point (WW)
J9380A HP E-MSM310-R Access Point (US)
J9380B HP MSM310-R Access Point (US)
J9383A HP E-MSM310-R Access Point (WW)
J9383B HP MSM310-R Access Point (WW)
J9524A HP E-MSM310 Access Point (JP)
J9524B HP MSM310 Access Point (JP)
J9527A HP E-MSM320 Access Point (JP)
J9527B HP MSM320 Access Point (JP)
J9528A HP E-MSM320-R Access Point (JP)
J9528B HP MSM320-R Access Point (JP)
J9426A HP E-MSM410 Access Point (US)
J9426B HP MSM410 Access Point (US)
J9427A HP E-MSM410 Access Point (WW)
J9427B HP MSM410 Access Point (WW)
J9427C HP MSM410 Access Point (WW)
J9529A HP E-MSM410 Access Point (JP)
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
J9693A HP MSM720 Access Controller (WW)
J9694A HP MSM720 Premium Mobility Cntlr (WW)
J9695A HP MSM720 TAA Access Controller
J9696A HP MSM720 TAA Premium Mobility Cntlr
M220
Fixes in progress
use mitigations
J9798A HP M220 802.11n (AM) Access Point
J9799A HP M220 802.11n (WW) Access Point
M210
Fixes in progress
use mitigations
JL023A HP M210 802.11n (AM) Access Point
JL024A HP M210 802.11n (WW) Access Point
PS110
Fixes in progress
use mitigations
JL065A HP PS110 Wireless 802.11n VPN AM Router
JL066A HP PS110 Wireless 802.11n VPN WW Router
HP Office Connect 1810 PK
Fixes in progress
use mitigations
J9660A HP 1810-48G Switch
HP Office Connect 1810 P
Fixes in progress
use mitigations
J9450A HP 1810-24G Switch
J9449A HP 1810-8G Switch
HP Office Connect 1810 PL
Fixes in progress
use mitigations
J9802A HP 1810-8G v2 Switch
J9803A HP 1810-24G v2 Switch
RF Manager
Fixes in progress
use mitigations
J9522A HP E-MSM415 RF Security Sensor J9521A HP RF Manager Controller with
50 Sensor License J9838AAE HP RF Manager for VMware 50 Sensor E-LTU
HP Office Connect 1810 PM
Fixes in progress
use mitigations
J9800A HP 1810-8 v2 Switch
J9801A HP 1810-24 v2 Switch
HP Office Connect PS1810
Fixes in progress
use mitigations
J9833A HP PS1810-8G Switch
J9834A HP PS1810-24G Switch
Mitigation Instructions
For SSLv3 Server Functionality on Impacted Products:
Disable SSLv3 on clients
and/or disable CBC ciphers on clients
Use Access Control functionality to control client access
For SSLv3 Client Functionality on Impacted Products:
Go to SSL server and disable SSLv3
and/or disable CBC ciphers
Use Access Control functionality to control access to servers
HISTORY
Version:1 (rev.1) - 2 April 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy
| VAR-201410-0371 | CVE-2014-3513 | OpenSSL of DTLS SRTP Extension d1_srtp.c Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message. OpenSSL is prone to an information disclosure vulnerability.
An attacker can exploit this issue to gain access to sensitive information that may aid in further attacks and to crash the affected application.
OpenSSL 1.0.1 versions prior to 1.0.1j are affected. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: openssl security update
Advisory ID: RHSA-2014:1692-01
Product: Red Hat Storage
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1692.html
Issue date: 2014-10-22
CVE Names: CVE-2014-3513 CVE-2014-3567
=====================================================================
1. Summary:
Updated openssl packages that contain a backported patch to mitigate the
CVE-2014-3566 issue and fix two security issues are now available for Red
Hat Storage 2.1.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Storage Server 2.1 - x86_64
3. Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),
Transport Layer Security (TLS), and Datagram Transport Layer Security
(DTLS) protocols, as well as a full-strength, general purpose cryptography
library.
This update adds support for the TLS Fallback Signaling Cipher Suite Value
(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade
attacks against applications which re-connect using a lower SSL/TLS
protocol version when the initial connection indicating the highest
supported protocol version fails.
This can prevent a forceful downgrade of the communication to SSL 3.0.
The SSL 3.0 protocol was found to be vulnerable to the padding oracle
attack when using block cipher suites in cipher block chaining (CBC) mode.
This issue is identified as CVE-2014-3566, and also known under the alias
POODLE. This SSL 3.0 protocol flaw will not be addressed in a future
update; it is recommended that users configure their applications to
require at least TLS protocol version 1.0 for secure communication.
For additional information about this flaw, see the Knowledgebase article
at https://access.redhat.com/articles/1232123
A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure
Real-time Transport Protocol (SRTP) extension data. (CVE-2014-3567)
All OpenSSL users are advised to upgrade to these updated packages, which
contain backported patches to mitigate the CVE-2014-3566 issue and correct
the CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect,
all services linked to the OpenSSL library (such as httpd and other
SSL-enabled services) must be restarted or the system rebooted.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Storage Server 2.1:
Source:
openssl-1.0.1e-30.el6_6.2.src.rpm
x86_64:
openssl-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm
openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-3513
https://access.redhat.com/security/cve/CVE-2014-3567
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/articles/1232123
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUR/NUXlSAg2UNWIIRAlZHAJwPwsoiJDn5RhI6U8eFkIzxyQopkQCePynp
RpfQCptdJIpd6WXO7pw1vVo=
=T20t
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2015-09-16-2 Xcode 7.0
Xcode 7.0 is now available and addresses the following:
DevTools
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker may be able to bypass access restrictions
Description: An API issue existed in the apache configuration. This
issue was addressed by updating header files to use the latest
version.
CVE-ID
CVE-2015-3185 : Branko Aibej of the Apache Software Foundation
IDE Xcode Server
Available for: OS X Yosemite 10.10 or later
Impact: An attacker may be able to access restricted parts of the
filesystem
Description: A comparison issue existed in the node.js send module
prior to version 0.8.4. This issue was addressed by upgrading to
version 0.12.3.
CVE-ID
CVE-2014-6394 : Ilya Kantor
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilties in OpenSSL
Description: Multiple vulnerabilties existed in the node.js OpenSSL
module prior to version 1.0.1j.
CVE-ID
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker with a privileged network position may be able
to inspect traffic to Xcode Server
Description: Connections to Xcode Server may have been made without
encryption. This issue was addressed through improved network
connection logic.
CVE-ID
CVE-2015-5910 : an anonymous researcher
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Build notifications may be sent to unintended recipients
Description: An access issue existed in the handling of repository
email lists. This issue was addressed through improved validation.
CVE-ID
CVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of
Anchorfree
subversion
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities existed in svn versions prior to
1.7.19
Description: Multiple vulnerabilities existed in svn versions prior
to 1.7.19. These issues were addressed by updating svn to version
1.7.20.
CVE-ID
CVE-2015-0248
CVE-2015-0251
Xcode 7.0 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "7.0". ============================================================================
Ubuntu Security Notice USN-2385-1
October 16, 2014
openssl vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in OpenSSL.
This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libssl1.0.0 1.0.1f-1ubuntu2.7
Ubuntu 12.04 LTS:
libssl1.0.0 1.0.1-4ubuntu5.20
Ubuntu 10.04 LTS:
libssl0.9.8 0.9.8k-7ubuntu8.22
After a standard system update you need to reboot your computer to make all
the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04616259
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04616259
Version: 1
HPSBHF03300 rev.1 - HP Network Products running OpenSSL, Remote Denial of
Service (DoS), Unauthorized Access, Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2015-04-02
Last Updated: 2015-04-02
Potential Security Impact: Remote Denial of Service (DoS), unauthorized
access, disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP Network
Products running OpenSSL including...
The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy
Encryption" also known as "POODLE", which could be exploited remotely
resulting in disclosure of information.
References:
CVE-2014-3513 Remote Denial of Service (DoS)
CVE-2014-3566 Remote Disclosure of Information (POODLE)
CVE-2014-3567 Remote Denial of Service (DoS)
CVE-2014-3568 Remote Unauthorized Access
SSRT101997, SSRT101774
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Please refer to the RESOLUTION
section below for a list of impacted products.
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-3513 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1
CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3
CVE-2014-3567 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1
CVE-2014-3568 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following software updates to resolve the vulnerabilities
in the HP Networking products listed.
Note: mitigation instructions are included below if the following software
updates cannot be applied.
Family
Fixed Version
HP Branded Products Impacted
H3C Branded Products Impacted
3Com Branded Products Impacted
CVE
12900 Switch Series
R1005P15
JG619A HP FF 12910 Switch AC Chassis
JG621A HP FF 12910 Main Processing Unit
JG632A HP FF 12916 Switch AC Chassis
JG634A HP FF 12916 Main Processing Unit
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
12500
R1828P06
JC085A HP A12518 Switch Chassis
JC086A HP A12508 Switch Chassis
JC652A HP 12508 DC Switch Chassis
JC653A HP 12518 DC Switch Chassis
JC654A HP 12504 AC Switch Chassis
JC655A HP 12504 DC Switch Chassis
JF430A HP A12518 Switch Chassis
JF430B HP 12518 Switch Chassis
JF430C HP 12518 AC Switch Chassis
JF431A HP A12508 Switch Chassis
JF431B HP 12508 Switch Chassis
JF431C HP 12508 AC Switch Chassis
JC072B HP 12500 Main Processing Unit
JC808A HP 12500 TAA Main Processing Unit
H3C S12508 Routing Switch(AC-1) (0235A0GE)
H3C S12518 Routing Switch(AC-1) (0235A0GF)
H3C S12508 Chassis (0235A0E6)
H3C S12508 Chassis (0235A38N)
H3C S12518 Chassis (0235A0E7)
H3C S12518 Chassis (0235A38M)
H3C 12508 DC Switch Chassis (0235A38L)
H3C 12518 DC Switch Chassis (0235A38K)
CVE-2014-3566
CVE-2014-3568
12500 (Comware v7)
R7328P04
JC085A HP A12518 Switch Chassis
JC086A HP A12508 Switch Chassis
JC652A HP 12508 DC Switch Chassis
JC653A HP 12518 DC Switch Chassis
JC654A HP 12504 AC Switch Chassis
JC655A HP 12504 DC Switch Chassis
JF430A HP A12518 Switch Chassis
JF430B HP 12518 Switch Chassis
JF430C HP 12518 AC Switch Chassis
JF431A HP A12508 Switch Chassis
JF431B HP 12508 Switch Chassis
JF431C HP 12508 AC Switch Chassis
JC072B HP 12500 Main Processing Unit
JG497A HP 12500 MPU w/Comware V7 OS
JG782A HP FF 12508E AC Switch Chassis
JG783A HP FF 12508E DC Switch Chassis
JG784A HP FF 12518E AC Switch Chassis
JG785A HP FF 12518E DC Switch Chassis
JG802A HP FF 12500E MPU
H3C S12508 Routing Switch(AC-1) (0235A0GE)
H3C S12518 Routing Switch(AC-1) (0235A0GF)
H3C S12508 Chassis (0235A0E6)
H3C S12508 Chassis (0235A38N)
H3C S12518 Chassis (0235A0E7)
H3C S12518 Chassis (0235A38M)
H3C 12508 DC Switch Chassis (0235A38L)
H3C 12518 DC Switch Chassis (0235A38K)
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
11900 Switch Series
R2111P06
JG608A HP FF 11908-V Switch Chassis
JG609A HP FF 11900 Main Processing Unit
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
10500 Switch Series (Comware v5)
R1208P10
JC611A HP 10508-V Switch Chassis
JC612A HP 10508 Switch Chassis
JC613A HP 10504 Switch Chassis
JC614A HP 10500 Main Processing Unit
JC748A HP 10512 Switch Chassis
JG375A HP 10500 TAA Main Processing Unit
JG820A HP 10504 TAA Switch Chassis
JG821A HP 10508 TAA Switch Chassis
JG822A HP 10508-V TAA Switch Chassis
JG823A HP 10512 TAA Switch Chassis
CVE-2014-3566
CVE-2014-3568
10500 Switch Series (Comware v7)
R2111P06
JC611A HP 10508-V Switch Chassis
JC612A HP 10508 Switch Chassis
JC613A HP 10504 Switch Chassis
JC748A HP 10512 Switch Chassis
JG820A HP 10504 TAA Switch Chassis
JG821A HP 10508 TAA Switch Chassis
JG822A HP 10508-V TAA Switch Chassis
JG823A HP 10512 TAA Switch Chassis
JG496A HP 10500 Type A MPU w/Comware v7 OS
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
9500E
R1828P06
JC124A HP A9508 Switch Chassis
JC124B HP 9505 Switch Chassis
JC125A HP A9512 Switch Chassis
JC125B HP 9512 Switch Chassis
JC474A HP A9508-V Switch Chassis
JC474B HP 9508-V Switch Chassis
H3C S9505E Routing-Switch Chassis (0235A0G6)
H3C S9512E Routing-Switch Chassis (0235A0G7)
H3C S9508E-V Routing-Switch Chassis (0235A38Q)
H3C S9505E Chassis w/ Fans (0235A38P)
H3C S9512E Chassis w/ Fans (0235A38R)
CVE-2014-3566
CVE-2014-3568
7900
R2122
JG682A HP FlexFabric 7904 Switch Chassis
JH001A HP FF 7910 2.4Tbps Fabric / MPU
JG842A HP FF 7910 7.2Tbps Fabric / MPU
JG841A HP FF 7910 Switch Chassis
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
7500 Switch Series
R6708P10
JC666A HP A7503-S 144 Gbps Fab/MPU w 24p Gig-T
JC697A HP A7502 TAA Main Processing Unit
JC698A HP A7503S 144 Gbps TAA Fab/MPU w 24p GbE
JC699A HP A7500 384Gbps TAA Fab/MPU w 2p 10-GbE
JC700A HP A7500 384 Gbps TAA Fabric / MPU
JC701A HP A7510 768 Gbps TAA Fabric / MPU
JD193A HP 384 Gbps A7500 Fab Mod w/2 XFP Ports
JD193B HP 7500 384Gbps Fab Mod w/2 XFP Ports
JD194A HP 384 Gbps Fabric A7500 Module
JD194B HP 7500 384Gbps Fabric Module
JD195A HP 7500 384Gbps Advanced Fabric Module
JD196A HP 7502 Fabric Module
JD220A HP 7500 768Gbps Fabric Module
JD238A HP A7510 Switch Chassis
JD238B HP 7510 Switch Chassis
JD239A HP A7506 Switch Chassis
JD239B HP 7506 Switch Chassis
JD240A HP A7503 Switch Chassis
JD240B HP 7503 Switch Chassis
JD241A HP A7506 Vertical Switch Chassis
JD241B HP 7506-V Switch Chassis
JD242A HP A7502 Switch Chassis
JD242B HP 7502 Switch Chassis
JD243A HP A7503 Switch Chassis w/1 Fabric Slot
JD243B HP 7503-S Switch Chassis w/1 Fabric Slot
H3C S7502E Ethernet Switch Chassis with Fan (0235A0G4)
H3C S7503E Ethernet Switch Chassis with Fan (0235A0G2)
H3C S7503E-S Ethernet Switch Chassis with Fan (0235A0G5)
H3C S7506E Ethernet Switch Chassis with Fan (0235A0G1)
H3C S7506E-V Ethernet Switch Chassis with Fan (0235A0G3)
H3C S7510E Ethernet Switch Chassis with Fan (0235A0G0)
H3C S7502E Chassis w/ fans (0235A29A)
H3C S7503E Chassis w/ fans (0235A27R)
H3C S7503E-S Chassis w/ fans (0235A33R)
H3C S7506E Chassis w/ fans (0235A27Q)
H3C S7506E-V Chassis w/ fans (0235A27S)
CVE-2014-3566
CVE-2014-3568
HSR6800
R3303P18
JG361A HP HSR6802 Router Chassis
JG362A HP HSR6804 Router Chassis
JG363A HP HSR6808 Router Chassis
JG364A HP HSR6800 RSE-X2 Router MPU
JG779A HP HSR6800 RSE-X2 Router TAA MPU
CVE-2014-3566
CVE-2014-3568
HSR6800 Russian Version
R3303P18
JG361A HP HSR6802 Router Chassis
JG362A HP HSR6804 Router Chassis
JG363A HP HSR6808 Router Chassis
JG364A HP HSR6800 RSE-X2 Router MPU
JG779A HP HSR6800 RSE-X2 Router TAA MPU
CVE-2014-3566
CVE-2014-3568
HSR6602
R3303P18
JG353A HP HSR6602-G Router
JG354A HP HSR6602-XG Router
JG776A HP HSR6602-G TAA Router
JG777A HP HSR6602-XG TAA Router
JG777A HP HSR6602-XG TAA Router
CVE-2014-3566
CVE-2014-3568
HSR6602 Russian Version
R3303P18
JG353A HP HSR6602-G Router
JG354A HP HSR6602-XG Router
JG776A HP HSR6602-G TAA Router
JG777A HP HSR6602-XG TAA Router
CVE-2014-3566
CVE-2014-3568
6602
R3303P18
JC176A HP 6602 Router Chassis
H3C SR6602 1U Router Host (0235A27D)
CVE-2014-3566
CVE-2014-3568
6602 Russian Version
R3303P18
JC176A HP 6602 Router Chassis
H3C SR6602 1U Router Host (0235A27D)
CVE-2014-3566
CVE-2014-3568
A6600
R3303P18
JC165A HP 6600 RPE-X1 Router Module
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JC566A HP A6600 RSE-X1 Main Processing Unit
JG780A HP 6600 RSE-X1 Router TAA MPU
H3C RT-SR66-RPE-X1-H3 (0231A761)
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
A6600 Russian Version
R3303P18
JC165A HP 6600 RPE-X1 Router Module
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JC566A HP A6600 RSE-X1 Main Processing Unit
JG780A HP 6600 RSE-X1 Router TAA MPU
H3C RT-SR66-RPE-X1-H3 (0231A761)
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
6600 MCP
R3303P18
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JG778A HP 6600 MCP-X2 Router TAA MPU. JG355A HP 6600 MCP-X1 Router MPU
JG356A HP 6600 MCP-X2 Router MPU
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
6600 MCP Russian Version
R3303P18
JC177A HP 6608 Router
JC177B HP A6608 Router Chassis
JC178A HP 6604 Router Chassis
JC178B HP A6604 Router Chassis
JC496A HP 6616 Router Chassis
JG355A HP 6600 MCP-X1 Router MPU
JG356A HP 6600 MCP-X2 Router MPU
JG776A HP HSR6602-G TAA Router
JG777A HP HSR6602-XG TAA Router
JG778A HP 6600 MCP-X2 Router TAA MPU
H3C RT-SR6608-OVS-H3 (0235A32X)
H3C RT-SR6604-OVS-H3 (0235A37X)
H3C SR6616 Router Chassis (0235A41D)
CVE-2014-3566
CVE-2014-3568
5920 Switch Series
R2311P05
JG296A HP 5920AF-24XG Switch
JG555A HP 5920AF-24XG TAA Switch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5900 Switch Series
R2311P05
JC772A HP 5900AF-48XG-4QSFP+ Switch
JG336A HP 5900AF-48XGT-4QSFP+ Switch
JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
JG838A HP FF 5900CP-48XG-4QSFP+ Switch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5830 Switch Series
R1118P11
JC691A HP A5830AF-48G Switch w/1 Interface Slot
JC694A HP A5830AF-96G Switch
JG316A HP 5830AF-48G TAA Switch w/1 Intf Slot
JG374A HP 5830AF-96G TAA Switch
CVE-2014-3566
CVE-2014-3568
5820 Switch Series
R1809P03
JC102A HP 5820-24XG-SFP+ Switch
JC106A HP 5820-14XG-SFP+ Switch with 2 Slots
JG219A HP 5820AF-24XG Switch
JG243A HP 5820-24XG-SFP+ TAA-compliant Switch
JG259A HP 5820X-14XG-SFP+ TAA Switch w 2 Slots
H3C S5820X-28C 14 port (SFP Plus ) Plus 4-port BT (RJ45) Plus 2 media
modules Plus OSM (0235A37L)
H3C S5820X-28S 24-port 10GBASE-X (SFP Plus ) Plus 4-port 10/100/1000BASE-T
(RJ45) (0235A370)
CVE-2014-3566
CVE-2014-3568
5800 Switch Series
R1809P03
JC099A HP 5800-24G-PoE Switch
JC100A HP 5800-24G Switch
JC101A HP 5800-48G Switch with 2 Slots
JC103A HP 5800-24G-SFP Switch
JC104A HP 5800-48G-PoE Switch
JC105A HP 5800-48G Switch
JG225A HP 5800AF-48G Switch
JG242A HP 5800-48G-PoE+ TAA Switch w 2 Slots
JG254A HP 5800-24G-PoE+ TAA-compliant Switch
JG255A HP 5800-24G TAA-compliant Switch
JG256A HP 5800-24G-SFP TAA Switch w 1 Intf Slt
JG257A HP 5800-48G-PoE+ TAA Switch with 1 Slot
JG258A HP 5800-48G TAA Switch w 1 Intf Slot
H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot
(0235A36U)
H3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X
(SFP Plus ) Plus 1 media module PoE (0235A36S)
H3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus
media module (no power) (0235A374)
H3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus
) Plus media module (0235A379)
H3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module
(0235A378)
H3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM
(0235A36W)
CVE-2014-3566
CVE-2014-3568
5700
R2311P05
JG894A HP FF 5700-48G-4XG-2QSFP+ Switch
JG895A HP FF 5700-48G-4XG-2QSFP+ TAA Switch
JG896A HP FF 5700-40XG-2QSFP+ Switch
JG897A HP FF 5700-40XG-2QSFP+ TAA Switch
JG898A HP FF 5700-32XGT-8XG-2QSFP+ Switch
JG899A HP FF 5700-32XGT-8XG-2QSFP+ TAA Switch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5500 HI Switch Series
R5501P06
JG311A HP HI 5500-24G-4SFP w/2 Intf Slts Switch
JG312A HP HI 5500-48G-4SFP w/2 Intf Slts Switch
JG541A HP 5500-24G-PoE+-4SFP HI Switch w/2 Slt
JG542A HP 5500-48G-PoE+-4SFP HI Switch w/2 Slt
JG543A HP 5500-24G-SFP HI Switch w/2 Intf Slt
JG679A HP 5500-24G-PoE+-4SFP HI TAA Swch w/2Slt
JG680A HP 5500-48G-PoE+-4SFP HI TAA Swch w/2Slt
JG681A HP 5500-24G-SFP HI TAA Swch w/2Slt
CVE-2014-3566
CVE-2014-3568
5500 EI Switch Series
R2221P08
JD373A HP 5500-24G DC EI Switch
JD374A HP 5500-24G-SFP EI Switch
JD375A HP 5500-48G EI Switch
JD376A HP 5500-48G-PoE EI Switch
JD377A HP 5500-24G EI Switch
JD378A HP 5500-24G-PoE EI Switch
JD379A HP 5500-24G-SFP DC EI Switch
JG240A HP 5500-48G-PoE+ EI Switch w/2 Intf Slts
JG241A HP 5500-24G-PoE+ EI Switch w/2 Intf Slts
JG249A HP 5500-24G-SFP EI TAA Switch w 2 Slts
JG250A HP 5500-24G EI TAA Switch w 2 Intf Slts
JG251A HP 5500-48G EI TAA Switch w 2 Intf Slts
JG252A HP 5500-24G-PoE+ EI TAA Switch w/2 Slts
JG253A HP 5500-48G-PoE+ EI TAA Switch w/2 Slts
H3C S5500-28C-EI Ethernet Switch (0235A253)
H3C S5500-28F-EI Eth Switch AC Single (0235A24U)
H3C S5500-52C-EI Ethernet Switch (0235A24X)
H3C S5500-28C-EI-DC Ethernet Switch (0235A24S)
H3C S5500-28C-PWR-EI Ethernet Switch (0235A255)
H3C S5500-28F-EI Eth Swtch DC Single Pwr (0235A259)
H3C S5500-52C-PWR-EI Ethernet Switch (0235A251)
CVE-2014-3566
CVE-2014-3568
5500 SI Switch Series
R2221P08
JD369A HP 5500-24G SI Switch
JD370A HP 5500-48G SI Switch
JD371A HP 5500-24G-PoE SI Switch
JD372A HP 5500-48G-PoE SI Switch
JG238A HP 5500-24G-PoE+ SI Switch w/2 Intf Slts
JG239A HP 5500-48G-PoE+ SI Switch w/2 Intf Slts
H3C S5500-28C-SI Ethernet Switch (0235A04U)
H3C S5500-52C-SI Ethernet Switch (0235A04V)
H3C S5500-28C-PWR-SI Ethernet Switch (0235A05H)
H3C S5500-52C-PWR-SI Ethernet Switch (0235A05J)
CVE-2014-3566
CVE-2014-3568
5130 EI switch Series
R3108P03
JG932A HP 5130-24G-4SFP+ EI Switch
JG933A HP 5130-24G-SFP-4SFP+ EI Switch
JG934A HP 5130-48G-4SFP+ EI Switch
JG936A HP 5130-24G-PoE+-4SFP+ EI Swch
JG937A HP 5130-48G-PoE+-4SFP+ EI Swch
JG975A HP 5130-24G-4SFP+ EI BR Switch
JG976A HP 5130-48G-4SFP+ EI BR Switch
JG977A HP 5130-24G-PoE+-4SFP+ EI BR Swch
JG978A HP 5130-48G-PoE+-4SFP+ EI BR Swch
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
5120 EI Switch Series
R2221P08
JE066A HP 5120-24G EI Switch
JE067A HP 5120-48G EI Switch
JE068A HP 5120-24G EI Switch with 2 Slots
JE069A HP 5120-48G EI Switch with 2 Slots
JE070A HP 5120-24G-PoE EI Switch with 2 Slots
JE071A HP 5120-48G-PoE EI Switch with 2 Slots
JG236A HP 5120-24G-PoE+ EI Switch w/2 Intf Slts
JG237A HP 5120-48G-PoE+ EI Switch w/2 Intf Slts
JG245A HP 5120-24G EI TAA Switch w 2 Intf Slts
JG246A HP 5120-48G EI TAA Switch w 2 Intf Slts
JG247A HP 5120-24G-PoE+ EI TAA Switch w 2 Slts
JG248A HP 5120-48G-PoE+ EI TAA Switch w 2 Slts
H3C S5120-24P-EI 24GE Plus 4ComboSFP (0235A0BQ)
H3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt (0235A0BS)
H3C S5120-48P-EI 48GE Plus 4ComboSFP (0235A0BR)
H3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt (0235A0BT)
H3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE (0235A0BU)
H3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE (0235A0BV)
CVE-2014-3566
CVE-2014-3568
5120 SI switch Series
R1513P95
JE072A HP 5120-48G SI Switch
JE073A HP 5120-16G SI Switch
JE074A HP 5120-24G SI Switch
JG091A HP 5120-24G-PoE+ (370W) SI Switch
JG092A HP 5120-24G-PoE+ (170W) SI Switch
H3C S5120-52P-SI 48GE Plus 4 SFP (0235A41W)
H3C S5120-20P-SI L2
16GE Plus 4SFP (0235A42B)
H3C S5120-28P-SI 24GE Plus 4 SFP (0235A42D)
H3C S5120-28P-HPWR-SI (0235A0E5)
H3C S5120-28P-PWR-SI (0235A0E3)
CVE-2014-3566
CVE-2014-3568
4800 G Switch Series
R2221P08
JD007A HP 4800-24G Switch
JD008A HP 4800-24G-PoE Switch
JD009A HP 4800-24G-SFP Switch
JD010A HP 4800-48G Switch
JD011A HP 4800-48G-PoE Switch
3Com Switch 4800G 24-Port (3CRS48G-24-91)
3Com Switch 4800G 24-Port SFP (3CRS48G-24S-91)
3Com Switch 4800G 48-Port (3CRS48G-48-91)
3Com Switch 4800G PWR 24-Port (3CRS48G-24P-91)
3Com Switch 4800G PWR 48-Port (3CRS48G-48P-91)
CVE-2014-3566
CVE-2014-3568
4510G Switch Series
R2221P08
JF428A HP 4510-48G Switch
JF847A HP 4510-24G Switch
3Com Switch 4510G 48 Port (3CRS45G-48-91)
3Com Switch 4510G PWR 24-Port (3CRS45G-24P-91)
3Com Switch E4510-24G (3CRS45G-24-91)
CVE-2014-3566
CVE-2014-3568
4210G Switch Series
R2221P08
JF844A HP 4210-24G Switch
JF845A HP 4210-48G Switch
JF846A HP 4210-24G-PoE Switch
3Com Switch 4210-24G (3CRS42G-24-91)
3Com Switch 4210-48G (3CRS42G-48-91)
3Com Switch E4210-24G-PoE (3CRS42G-24P-91)
CVE-2014-3566
CVE-2014-3568
3610 Switch Series
R5319P10
JD335A HP 3610-48 Switch
JD336A HP 3610-24-4G-SFP Switch
JD337A HP 3610-24-2G-2G-SFP Switch
JD338A HP 3610-24-SFP Switch
H3C S3610-52P - model LS-3610-52P-OVS (0235A22C)
H3C S3610-28P - model LS-3610-28P-OVS (0235A22D)
H3C S3610-28TP - model LS-3610-28TP-OVS (0235A22E)
H3C S3610-28F - model LS-3610-28F-OVS (0235A22F)
CVE-2014-3566
CVE-2014-3568
3600 V2 Switch Series
R2110P03
JG299A HP 3600-24 v2 EI Switch
JG300A HP 3600-48 v2 EI Switch
JG301A HP 3600-24-PoE+ v2 EI Switch
JG301B HP 3600-24-PoE+ v2 EI Switch
JG302A HP 3600-48-PoE+ v2 EI Switch
JG302B HP 3600-48-PoE+ v2 EI Switch
JG303A HP 3600-24-SFP v2 EI Switch
JG304A HP 3600-24 v2 SI Switch
JG305A HP 3600-48 v2 SI Switch
JG306A HP 3600-24-PoE+ v2 SI Switch
JG306B HP 3600-24-PoE+ v2 SI Switch
JG307A HP 3600-48-PoE+ v2 SI Switch
JG307B HP 3600-48-PoE+ v2 SI Switch
CVE-2014-3566
CVE-2014-3568
3100V2
R5203P11
JD313B HP 3100-24-PoE v2 EI Switch
JD318B HP 3100-8 v2 EI Switch
JD319B HP 3100-16 v2 EI Switch
JD320B HP 3100-24 v2 EI Switch
JG221A HP 3100-8 v2 SI Switch
JG222A HP 3100-16 v2 SI Switch
JG223A HP 3100-24 v2 SI Switch
CVE-2014-3566
CVE-2014-3568
3100V2-48
R2110P03
JG315A HP 3100-48 v2 Switch
CVE-2014-3566
CVE-2014-3568
1920
R1105
JG920A HP 1920-8G Switch
JG921A HP 1920-8G-PoE+ (65W) Switch
JG922A HP 1920-8G-PoE+ (180W) Switch
JG923A HP 1920-16G Switch
JG924A HP 1920-24G Switch
JG925A HP 1920-24G-PoE+ (180W) Switch
JG926A HP 1920-24G-PoE+ (370W) Switch
JG927A HP 1920-48G Switch
CVE-2014-3566
CVE-2014-3568
1910 R11XX
R1107
JG536A HP 1910-8 Switch
JG537A HP 1910-8 -PoE+ Switch
JG538A HP 1910-24 Switch
JG539A HP 1910-24-PoE+ Switch
JG540A HP 1910-48 Switch
CVE-2014-3566
CVE-2014-3568
1910 R15XX
R1513P95
JE005A HP 1910-16G Switch
JE006A HP 1910-24G Switch
JE007A HP 1910-24G-PoE (365W) Switch
JE008A HP 1910-24G-PoE(170W) Switch
JE009A HP 1910-48G Switch
JG348A HP 1910-8G Switch
JG349A HP 1910-8G-PoE+ (65W) Switch
JG350A HP 1910-8G-PoE+ (180W) Switch
CVE-2014-3566
CVE-2014-3568
1620
R1104
JG912A HP 1620-8G Switch
JG913A HP 1620-24G Switch
JG914A HP 1620-48G Switch
CVE-2014-3566
CVE-2014-3568
MSR20-1X
R2513P33
JD431A HP MSR20-10 Router
JD667A HP MSR20-15 IW Multi-Service Router
JD668A HP MSR20-13 Multi-Service Router
JD669A HP MSR20-13 W Multi-Service Router
JD670A HP MSR20-15 A Multi-Service Router
JD671A HP MSR20-15 AW Multi-Service Router
JD672A HP MSR20-15 I Multi-Service Router
JD673A HP MSR20-11 Multi-Service Router
JD674A HP MSR20-12 Multi-Service Router
JD675A HP MSR20-12 W Multi-Service Router
JD676A HP MSR20-12 T1 Multi-Service Router
JF236A HP MSR20-15-I Router
JF237A HP MSR20-15-A Router
JF238A HP MSR20-15-I-W Router
JF239A HP MSR20-11 Router
JF240A HP MSR20-13 Router
JF241A HP MSR20-12 Router
JF806A HP MSR20-12-T Router
JF807A HP MSR20-12-W Router
JF808A HP MSR20-13-W Router
JF809A HP MSR20-15-A-W Router
JF817A HP MSR20-15 Router
JG209A HP MSR20-12-T-W Router (NA)
JG210A HP MSR20-13-W Router (NA)
H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)
H3C MSR 20-10 (0235A0A7)
H3C RT-MSR2011-AC-OVS-H3 (0235A395)
H3C RT-MSR2012-AC-OVS-H3 (0235A396)
H3C RT-MSR2012-AC-OVS-W-H3 (0235A397)
H3C RT-MSR2012-T-AC-OVS-H3 (0235A398)
H3C RT-MSR2013-AC-OVS-H3 (0235A390)
H3C RT-MSR2013-AC-OVS-W-H3 (0235A391)
H3C RT-MSR2015-AC-OVS-A-H3 (0235A392)
H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)
H3C RT-MSR2015-AC-OVS-I-H3 (0235A394)
H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)
H3C MSR 20-11 (0235A31V)
H3C MSR 20-12 (0235A32E)
H3C MSR 20-12 T1 (0235A32B)
H3C MSR 20-13 (0235A31W)
H3C MSR 20-13 W (0235A31X)
H3C MSR 20-15 A (0235A31Q)
H3C MSR 20-15 A W (0235A31R)
H3C MSR 20-15 I (0235A31N)
H3C MSR 20-15 IW (0235A31P)
H3C MSR20-12 W (0235A32G)
CVE-2014-3566
CVE-2014-3568
MSR30
R2513P33
JD654A HP MSR30-60 POE Multi-Service Router
JD657A HP MSR30-40 Multi-Service Router
JD658A HP MSR30-60 Multi-Service Router
JD660A HP MSR30-20 POE Multi-Service Router
JD661A HP MSR30-40 POE Multi-Service Router
JD666A HP MSR30-20 Multi-Service Router
JF229A HP MSR30-40 Router
JF230A HP MSR30-60 Router
JF232A HP RT-MSR3040-AC-OVS-AS-H3
JF235A HP MSR30-20 DC Router
JF284A HP MSR30-20 Router
JF287A HP MSR30-40 DC Router
JF801A HP MSR30-60 DC Router
JF802A HP MSR30-20 PoE Router
JF803A HP MSR30-40 PoE Router
JF804A HP MSR30-60 PoE Router
H3C MSR 30-20 Router (0235A328)
H3C MSR 30-40 Router Host(DC) (0235A268)
H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)
H3C RT-MSR3020-DC-OVS-H3 (0235A267)
H3C RT-MSR3040-AC-OVS-H (0235A299)
H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)
H3C RT-MSR3060-AC-OVS-H3 (0235A320)
H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)
H3C RT-MSR3060-DC-OVS-H3 (0235A269)
H3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S)
H3C MSR 30-20 (0235A19L)
H3C MSR 30-20 POE (0235A239)
H3C MSR 30-40 (0235A20J)
H3C MSR 30-40 POE (0235A25R)
H3C MSR 30-60 (0235A20K)
H3C MSR 30-60 POE (0235A25S)
H3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V)
CVE-2014-3566
CVE-2014-3568
MSR30-16
R2513P33
JD659A HP MSR30-16 POE Multi-Service Router
JD665A HP MSR30-16 Multi-Service Router
JF233A HP MSR30-16 Router
JF234A HP MSR30-16 PoE Router
H3C RT-MSR3016-AC-OVS-H3 (0235A327)
H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)
H3C MSR 30-16 (0235A237)
H3C MSR 30-16 POE (0235A238)
CVE-2014-3566
CVE-2014-3568
MSR30-1X
R2513P33
JF800A HP MSR30-11 Router
JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
JG182A HP MSR30-11E Router
JG183A HP MSR30-11F Router
JG184A HP MSR30-10 DC Router
H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)
H3C RT-MSR3011-AC-OVS-H3 (0235A29L)
CVE-2014-3566
CVE-2014-3568
MSR50
R2513P33
JD433A HP MSR50-40 Router
JD653A HP MSR50 Processor Module
JD655A HP MSR50-40 Multi-Service Router
JD656A HP MSR50-60 Multi-Service Router
JF231A HP MSR50-60 Router
JF285A HP MSR50-40 DC Router
JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
H3C MSR 50-40 Router (0235A297)
H3C MSR5040-DC-OVS-H3C (0235A20P)
H3C RT-MSR5060-AC-OVS-H3 (0235A298)
H3C MSR 50-40 Chassis (0235A20N)
H3C MSR 50-60 Chassis (0235A20L)
CVE-2014-3566
CVE-2014-3568
MSR50-G2
R2513P33
JD429A HP MSR50 G2 Processor Module
JD429B HP MSR50 G2 Processor Module
H3C H3C MSR 50 Processor Module-G2 (0231A84Q)
H3C MSR 50 High Performance Main Processing Unit 3GE (Combo)
256F/1GD(0231A0KL)
CVE-2014-3566
CVE-2014-3568
MSR20 Russian version
MSR201X_5.20.R2513L40.RU
JD663B HP MSR20-21 Router
JF228A HP MSR20-40 Router
JF283A HP MSR20-20 Router
H3C RT-MSR2020-AC-OVS-H3C (0235A324)
H3C RT-MSR2040-AC-OVS-H3 (0235A326)
CVE-2014-3566
CVE-2014-3568
MSR20-1X Russian version
MSR201X_5.20.R2513L40.RU
JD431A HP MSR20-10 Router
JF236A HP MSR20-15-I Router
JF237A HP MSR20-15-A Router
JF238A HP MSR20-15-I-W Router
JF239A HP MSR20-11 Router
JF240A HP MSR20-13 Router
JF241A HP MSR20-12 Router
JF806A HP MSR20-12-T Router
JF807A HP MSR20-12-W Router
JF808A HP MSR20-13-W Router
JF809A HP MSR20-15-A-W Router
JF817A HP MSR20-15 Router
H3C MSR 20-10 (0235A0A7)
H3C RT-MSR2015-AC-OVS-I-H3 (0235A394)
H3C RT-MSR2015-AC-OVS-A-H3 (0235A392)
H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)
H3C RT-MSR2011-AC-OVS-H3 (0235A395)
H3C RT-MSR2013-AC-OVS-H3 (0235A390)
H3C RT-MSR2012-AC-OVS-H3 (0235A396)
H3C RT-MSR2012-T-AC-OVS-H3 (0235A398)
H3C RT-MSR2012-AC-OVS-W-H3 (0235A397)
H3C RT-MSR2013-AC-OVS-W-H3 (0235A391)
H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)
H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)
CVE-2014-3566
CVE-2014-3568
MSR30 Russian version
MSR201X_5.20.R2513L40.RU
JF229A HP MSR30-40 Router
JF230A HP MSR30-60 Router
JF235A HP MSR30-20 DC Router
JF284A HP MSR30-20 Router
JF287A HP MSR30-40 DC Router
JF801A HP MSR30-60 DC Router
JF802A HP MSR30-20 PoE Router
JF803A HP MSR30-40 PoE Router
JF804A HP MSR30-60 PoE Router
H3C RT-MSR3040-AC-OVS-H (0235A299)
H3C RT-MSR3060-AC-OVS-H3 (0235A320)
H3C RT-MSR3020-DC-OVS-H3 (0235A267)
H3C MSR 30-20 Router (0235A328)
H3C MSR 30-40 Router Host(DC) (0235A268)
H3C RT-MSR3060-DC-OVS-H3 (0235A269)
H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)
H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)
H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)
CVE-2014-3566
CVE-2014-3568
MSR30-16 Russian version
MSR201X_5.20.R2513L40.RU
JF233A HP MSR30-16 Router
JF234A HP MSR30-16 PoE Router
H3C RT-MSR3016-AC-OVS-H3 (0235A327)
H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)
CVE-2014-3566
CVE-2014-3568
MSR30-1X Russian version
MSR201X_5.20.R2513L40.RU
JF800A HP MSR30-11 Router
JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
JG182A HP MSR30-11E Router
JG183A HP MSR30-11F Router
JG184A HP MSR30-10 DC Router
H3C RT-MSR3011-AC-OVS-H3 (0235A29L)
H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)
CVE-2014-3566
CVE-2014-3568
MSR50 Russian version
MSR201X_5.20.R2513L40.RU
JD433A HP MSR50-40 Router
JD653A HP MSR50 Processor Module
JD655A HP MSR50-40 Multi-Service Router
JD656A HP MSR50-60 Multi-Service Router
JF231A HP MSR50-60 Router
JF285A HP MSR50-40 DC Router
JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
H3C MSR 50-40 Router (0235A297)
H3C MSR 50 Processor Module (0231A791)
H3C MSR 50-40 Chassis (0235A20N)
H3C MSR 50-60 Chassis (0235A20L)
H3C RT-MSR5060-AC-OVS-H3 (0235A298)
H3C MSR5040-DC-OVS-H3C (0235A20P)
CVE-2014-3566
CVE-2014-3568
MSR50 G2 Russian version
MSR201X_5.20.R2513L40.RU
JD429B HP MSR50 G2 Processor Module
H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD
(0231A0KL)
CVE-2014-3566
CVE-2014-3568
MSR9XX
R2513P33
JF812A HP MSR900 Router
JF813A HP MSR920 Router
JF814A HP MSR900-W Router
JF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr
JG207A HP MSR900-W Router (NA)
JG208A HP MSR920-W Router (NA)
H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b
(0235A0C2)
H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX)
H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)
H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)
CVE-2014-3566
CVE-2014-3568
MSR93X
R2513P33
JG512A HP MSR930 Wireless Router
JG513A HP MSR930 3G Router
JG514A HP MSR931 Router
JG515A HP MSR931 3G Router
JG516A HP MSR933 Router
JG517A HP MSR933 3G Router
JG518A HP MSR935 Router
JG519A HP MSR935 Wireless Router
JG520A HP MSR935 3G Router
JG531A HP MSR931 Dual 3G Router
JG596A HP MSR930 4G LTE/3G CDMA Router
JG597A HP MSR936 Wireless Router
JG665A HP MSR930 4G LTE/3G WCDMA Global Router
JG704A HP MSR930 4G LTE/3G WCDMA ATT Router
CVE-2014-3566
CVE-2014-3568
MSR1000
R2513P33
JG732A HP MSR1003-8 AC Router
CVE-2014-3566
CVE-2014-3568
MSR1000 Russian version
R2513L40.RU
JG732A HP MSR1003-8 AC Router
CVE-2014-3566
CVE-2014-3568
MSR2000
R0106P18
JG411A HP MSR2003 AC Router
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
MSR3000
R0106P18
JG404A HP MSR3064 Router
JG405A HP MSR3044 Router
JG406A HP MSR3024 AC Router
JG409A HP MSR3012 AC Router
JG861A HP MSR3024 TAA-compliant AC Router
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
MSR4000
R0106P18
JG402A HP MSR4080 Router Chassis
JG403A HP MSR4060 Router Chassis
JG412A HP MSR4000 MPU-100 Main Processing Unit
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
F5000
F3210P22
JG216A HP F5000 Firewall Standalone Chassis
JD259A HP A5000-A5 VPN Firewall Chassis
H3C SecPath F5000-A5 Host System (0150A0AG)
CVE-2014-3566
CVE-2014-3568
F5000-C
R3811P03
JG650A HP F5000-C VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
F5000-S
R3811P03
JG370A HP F5000-S VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
U200S and CS
F5123P30
JD268A HP 200-CS UTM Appliance
JD273A HP U200-S UTM Appliance
H3C SecPath U200-S (0235A36N)
CVE-2014-3566
CVE-2014-3568
U200A and M
F5123P30
JD274A HP 200-M UTM Appliance
JD275A HP U200-A UTM Appliance
H3C SecPath U200-A (0235A36Q)
CVE-2014-3566
CVE-2014-3568
SecBlade III
R3820P03
JG371A HP 12500 20Gbps VPN Firewall Module
JG372A HP 10500/11900/7500 20Gbps VPN FW Mod
CVE-2014-3566
CVE-2014-3568
SecBlade FW
R3181P05
JC635A HP 12500 VPN Firewall Module
JD245A HP 9500 VPN Firewall Module
JD249A HP 10500/7500 Advanced VPN Firewall Mod
JD250A HP 6600 Firewall Processing Rtr Module
JD251A HP 8800 Firewall Processing Module
JD255A HP 5820 VPN Firewall Module
H3C S9500E SecBlade VPN Firewall Module (0231A0AV)
H3C S7500E SecBlade VPN Firewall Module (0231A832)
H3C SR66 Gigabit Firewall Module (0231A88A)
H3C SR88 Firewall Processing Module (0231A88L)
H3C S5820 SecBlade VPN Firewall Module (0231A94J)
CVE-2014-3566
CVE-2014-3568
F1000-E
R3181P05
JD272A HP F1000-E VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
F1000-A
R3734P06
JG214A HP F1000-A-EI VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
F1000-S
R3734P06
JG213A HP F1000-S-EI VPN Firewall Appliance
CVE-2014-3566
CVE-2014-3568
SecBlade SSL VPN
Fix in Progress
Use Mitigation
JD253A HP 10500/7500 SSL VPN Mod w 500-user Lic
CVE-2014-3566
CVE-2014-3568
VSR1000
R0204P01
JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
JG811AAE HP VSR1001 Comware 7 Virtual Services Router
JG812AAE HP VSR1004 Comware 7 Virtual Services Router
JG813AAE HP VSR1008 Comware 7 Virtual Services Router
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
WX5002/5004
R2507P34
JD441A HP 5800 ACM for 64-256 APs
JD447B HP WX5002 Access Controller
JD448A HP A-WX5004 Access Controller
JD448B HP WX5004 Access Controller
JD469A HP A-WX5004 (3Com) Access Controller
JG261A HP 5800 Access Controller OAA TAA Mod
CVE-2014-3566
CVE-2014-3568
HP 850/870
R2607P34
JG723A HP 870 Unified Wired-WLAN Appliance
JG725A HP 870 Unifd Wrd-WLAN TAA Applnc
JG722A HP 850 Unified Wired-WLAN Appliance
JG724A HP 850 Unifd Wrd-WLAN TAA Applnc
CVE-2014-3566
CVE-2014-3568
HP 830
R3507P34
JG640A HP 830 24P PoE+ Unifd Wired-WLAN Swch
JG641A HP 830 8P PoE+ Unifd Wired-WLAN Swch
JG646A HP 830 24-Port PoE+ Wrd-WLAN TAA Switch
JG647A HP 830 8-Port PoE+ Wrd-WLAN TAA Switch
CVE-2014-3566
CVE-2014-3568
HP 6000
R2507P34
JG639A HP 10500/7500 20G Unified Wired-WLAN Mod
JG645A HP 10500/7500 20G Unifd Wrd-WLAN TAA Mod
CVE-2014-3566
CVE-2014-3568
VCX
Fix in Progress
Use Mitigation
J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr
J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr
JC517A HP VCX V7205 Platform w/DL 360 G6 Server
JE355A HP VCX V6000 Branch Platform 9.0
JC516A HP VCX V7005 Platform w/DL 120 G6 Server
JC518A HP VCX Connect 200 Primry 120 G6 Server
J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr
JE341A HP VCX Connect 100 Secondary
JE252A HP VCX Connect Primary MIM Module
JE253A HP VCX Connect Secondary MIM Module
JE254A HP VCX Branch MIM Module
JE355A HP VCX V6000 Branch Platform 9.0
JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod
JD023A HP MSR30-40 Router with VCX MIM Module
JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM
JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod
JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod
JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod
JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS
JE340A HP VCX Connect 100 Pri Server 9.0
JE342A HP VCX Connect 100 Sec Server 9.0
CVE-2014-3566
CVE-2014-3568
iMC PLAT
iMC PLAT v7.1 E0303P06
JD125A HP IMC Std S/W Platform w/100-node
JD126A HP IMC Ent S/W Platform w/100-node
JD808A HP IMC Ent Platform w/100-node License
JD815A HP IMC Std Platform w/100-node License
JF377A HP IMC Std S/W Platform w/100-node Lic
JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU
JF378A HP IMC Ent S/W Platform w/200-node Lic
JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU
JG546AAE HP IMC Basic SW Platform w/50-node E-LTU
JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU
JG550AAE HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU
JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU
JG659AAE HP IMC Smart Connect VAE E-LTU
JG660AAE HP IMC Smart Connect w/WLM VAE E-LTU
JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU
JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU
JG766AAE HP IMC SmCnct Vrtl Applnc SW E-LTU
JG767AAE HP IMC SmCnct WSM Vrtl Applnc SW E-LTU
JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU
CVE-2014-3566
iMC UAM
iMC UAM v7.1 E0302P07
JD144A HP IMC UAM S/W Module w/200-User License
JF388A HP IMC UAM S/W Module w/200-user License
JF388AAE HP IMC UAM S/W Module w/200-user E-LTU
JG752AAE HP IMC UAM SW Mod w/ 50-user E-LTU
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
iMC WSM
Fix in Progress
Use Mitigation
JD456A HP WSM Plug-in for IMC
Includes 50 Aps
JF414A HP IMC WSM S/W Module with 50-AP License
JF414AAE HP IMC WSM S/W Module with 50-AP E-LTU
JG551AAE HP PMM to IMC WSM Upgr w/250 AP E-LTU
JG769AAE HP PMM to IMC WSM Upg w/ 250-node E-LTU
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
A
Fixes in progress
use mitigations
J9565A HP 2615-8-PoE Switch
J9562A HP 2915-8G-PoE Switch
E
Fixes in progress
use mitigations
J4850A HP ProCurve Switch 5304xl
J8166A HP ProCurve Switch 5304xl-32G
J4819A HP ProCurve Switch 5308xl
J8167A HP ProCurve Switch 5308xl-48G
J4849A HP ProCurve Switch 5348xl
J4849B HP ProCurve Switch 5348xl
J4848A HP ProCurve Switch 5372xl
J4848B HP ProCurve Switch 5372xl
F
Fixes in progress
use mitigations
J4812A HP ProCurve 2512 Switch
J4813A HP ProCurve 2524 Switch
J4817A HP ProCurve 2312 Switch
J4818A HP ProCurve 2324 Switch
H.07
Fixes in progress
use mitigations
J4902A HP ProCurve 6108 Switch
H.10
Fixes in progress
use mitigations
J8762A HP E2600-8-PoE Switch
J4900A HP PROCURVE SWITCH 2626
J4900B HP ProCurve Switch 2626
J4900C ProCurve Switch 2626
J4899A HP ProCurve Switch 2650
J4899B HP ProCurve Switch 2650
J4899C ProCurve Switch 2650
J8164A ProCurve Switch 2626-PWR
J8165A HP ProCurve Switch 2650-PWR
i.10
Fixes in progress
use mitigations
J4903A ProCurve Switch 2824
J4904A HP ProCurve Switch 2848
J
Fixes in progress
use mitigations
J9299A HP 2520-24G-PoE Switch
J9298A HP 2520-8G-PoE Switch
K
Fixes in progress
use mitigations
J8692A HP 3500-24G-PoE yl Switch
J8693A HP 3500-48G-PoE yl Switch
J9310A HP 3500-24G-PoE+ yl Switch
J9311A HP 3500-48G-PoE+ yl Switch
J9470A HP 3500-24 Switch
J9471A HP 3500-24-PoE Switch
J9472A HP 3500-48 Switch
J9473A HP 3500-48-PoE Switch
J8697A HP E5406 zl Switch Chassis
J8699A HP 5406-48G zl Switch
J9447A HP 5406-44G-PoE+-4SFP zl Switch
J9533A HP 5406-44G-PoE+-2XG v2 zl Swch w Pm SW
J9539A HP 5406-44G-PoE+-4G v2 zl Swch w Prm SW
J9642A HP 5406 zl Switch with Premium Software
J9866A HP 5406 8p10GT 8p10GE Swch and Psw
J8698A HP E5412 zl Switch Chassis
J8700A HP 5412-96G zl Switch
J9448A HP 5412-92G-PoE+-4SFP zl Switch
J9532A HP 5412-92G-PoE+-2XG v2 zl Swch w Pm SW
J9540A HP 5412-92G-PoE+-4G v2 zl Swch w Prm SW
J9643A HP 5412 zl Switch with Premium Software
J8992A HP 6200-24G-mGBIC yl Switch
J9263A HP E6600-24G Switch
J9264A HP 6600-24G-4XG Switch
J9265A HP 6600-24XG Switch
J9451A HP E6600-48G Switch
J9452A HP 6600-48G-4XG Switch
J9475A HP E8206 zl Switch Base System
J9638A HP 8206-44G-PoE+-2XG v2 zl Swch w Pm SW
J9640A HP 8206 zl Switch w/Premium Software
J8715A ProCurve Switch 8212zl Base System
J8715B HP E8212 zl Switch Base System
J9091A ProCurve Switch 8212zl Chassis&Fan Tray
J9639A HP 8212-92G-PoE+-2XG v2 zl Swch w Pm SW
J9641A HP 8212 zl Switch with Premium SW
KA
Fixes in progress
use mitigations
J9573A HP 3800-24G-PoE+-2SFP+ Switch
J9574A HP 3800-48G-PoE+-4SFP+ Switch
J9575A HP 3800-24G-2SFP+ Switch
J9576A HP 3800-48G-4SFP+ Switch
J9584A HP 3800-24SFP-2SFP+ Switch
J9585A HP 3800-24G-2XG Switch
J9586A HP 3800-48G-4XG Switch
J9587A HP 3800-24G-PoE+-2XG Switch
J9588A HP 3800-48G-PoE+-4XG Switch
KB
Fixes in progress
use mitigations
J9821A HP 5406R zl2 Switch
J9822A HP 5412R zl2 Switch
J9823A HP 5406R-Gig-T-PoE+/SFP+ v2 zl2 Swch
J9824A HP 5406R-Gig-T-PoE+/SFP v2 zl2 Swch
J9825A HP 5412R-Gig-T-PoE+/SFP+ v2 zl2 Swch
J9826A HP 5412R-Gig-T-PoE+/SFP v2 zl2 Swch
J9850A HP 5406R zl2 Switch
J9851A HP 5412R zl2 Switch
J9868A HP 5406R-8XGT/8SFP+ v2 zl2 Swch
L
Fixes in progress
use mitigations
J8772B HP 4202-72 Vl Switch
J8770A HP 4204 Vl Switch Chassis
J9064A HP 4204-44G-4SFP Vl Switch
J8773A HP 4208 Vl Switch Chassis
J9030A HP 4208-68G-4SFP Vl Switch
J8775B HP 4208-96 Vl Switch
J8771A ProCurve Switch 4202VL-48G
J8772A ProCurve Switch 4202VL-72
J8774A ProCurve Switch 4208VL-64G
J8775A ProCurve Switch 4208VL-96
M.08
Fixes in progress
use mitigations
J8433A HP 6400-6XG cl Switch
J8474A HP 6410-6XG cl Switch
M.10
Fixes in progress
use mitigations
J4906A HP E3400-48G cl Switch
J4905A HP ProCurve Switch 3400cl-24G
N
Fixes in progress
use mitigations
J9021A HP 2810-24G Switch
J9022A HP 2810-48G Switch
PA
Fixes in progress
use mitigations
J9029A ProCurve Switch 1800-8G
PB
Fixes in progress
use mitigations
J9028A ProCurve Switch 1800-24G
J9028B ProCurve Switch 1800-24G
Q
Fixes in progress
use mitigations
J9019B HP 2510-24 Switch
J9019A ProCurve Switch 2510-24
R
Fixes in progress
use mitigations
J9085A HP 2610-24 Switch
J9087A HP 2610-24-PoE Switch
J9086A HP 2610-24-PPoE Switch
J9088A HP 2610-48 Switch
J9089A HP 2610-48-PoE Switch
RA
Fixes in progress
use mitigations
J9623A HP 2620-24 Switch
J9624A HP 2620-24-PPoE+ Switch
J9625A HP 2620-24-PoE+ Switch
J9626A HP 2620-48 Switch
J9627A HP 2620-48-PoE+ Switch
S
Fixes in progress
use mitigations
J9138A HP 2520-24-PoE Switch
J9137A HP 2520-8-PoE Switch
T
Fixes in progress
use mitigations
J9049A ProCurve Switch 2900- 24G
J9050A ProCurve Switch 2900 48G
U
Fixes in progress
use mitigations
J9020A HP 2510-48 Switch
VA
Fixes in progress
use mitigations
J9079A HP 1700-8 Switch
VB
Fixes in progress
use mitigations
J9080A HP 1700-24 Switch
W
Fixes in progress
use mitigations
J9145A HP 2910-24G al Switch
J9146A HP 2910-24G-PoE+ al Switch
J9147A HP 2910-48G al Switch
J9148A HP 2910-48G-PoE+ al Switch
WB
Fixes in progress
use mitigations
J9726A HP 2920-24G Switch
J9727A HP 2920-24G-POE+ Switch
J9728A HP 2920-48G Switch
J9729A HP 2920-48G-POE+ Switch
J9836A HP 2920-48G-POE+ 740W Switch
Y
Fixes in progress
use mitigations
J9279A HP 2510-24G Switch
J9280A HP 2510-48G Switch
YA
Fixes in progress
use mitigations
J9772A HP 2530-48G-PoE+ Switch
J9773A HP 2530-24G-PoE+ Switch
J9774A HP 2530-8G-PoE+ Switch
J9775A HP 2530-48G Switch
J9776A HP 2530-24G Switch
J9777A HP 2530-8G Switch
J9778A HP 2530-48-PoE+ Switch
J9781A HP 2530-48 Switch
J9853A HP 2530-48G-PoE+-2SFP+ Switch
J9854A HP 2530-24G-PoE+-2SFP+ Switch
J9855A HP 2530-48G-2SFP+ Switch
J9856A HP 2530-24G-2SFP+ Switch
YB
Fixes in progress
use mitigations
J9779A HP 2530-24-PoE+ Switch
J9780A HP 2530-8-PoE+ Switch
J9782A HP 2530-24 Switch
J9783A HP 2530-8 Switch
MSM 6.5
6.5.1.0
J9420A HP MSM760 Premium Mobility Controller
J9421A HP MSM760 Access Controller
J9370A HP MSM765 Zl Premium Mobility Controller
J9693A HP MSM720 Access Controller (WW)
J9694A HP MSM720 Premium Mobility Cntlr (WW)
J9695A HP MSM720 TAA Access Controller
J9696A HP MSM720 TAA Premium Mobility Cntlr
J9840A HP MSM775 zl Premium Controller Module
J9845A HP 560 Wireless 802.11ac (AM) AP
J9846A HP 560 Wireless 802.11ac (WW) AP
J9847A HP 560 Wireless 802.11ac (JP) AP
J9848A HP 560 Wireless 802.11ac (IL) AP
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
J9426A HP E-MSM410 Access Point (US)
J9426B HP MSM410 Access Point (US)
J9427A HP E-MSM410 Access Point (WW)
J9427B HP MSM410 Access Point (WW)
J9427C HP MSM410 Access Point (WW)
J9529A HP E-MSM410 Access Point (JP)
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
MSM 6.4
6.4.2.1
J9840A HP MSM775 zl Premium Controller Module
J9370A HP MSM765 Zl Premium Mobility Controller
J9420A HP MSM760 Premium Mobility Controller
J9421A HP MSM760 Access Controller
J9693A HP MSM720 Access Controller (WW)
J9694A HP MSM720 Premium Mobility Cntlr (WW)
J9695A HP MSM720 TAA Access Controller
J9696A HP MSM720 TAA Premium Mobility Cntlr
J9426A HP E-MSM410 Access Point (US)
J9426B HP MSM410 Access Point (US)
J9427A HP E-MSM410 Access Point (WW)
J9427B HP MSM410 Access Point (WW)
J9427C HP MSM410 Access Point (WW)
J9529A HP E-MSM410 Access Point (JP)
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
MSM 6.3
6.3.1.0
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
J9356A HP E-MSM335 Access Point (US)
J9356B HP MSM335 Access Point (US)
J9357A HP E-MSM335 Access Point (WW)
J9357B HP MSM335 Access Point (WW)
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
J9360A HP E-MSM320 Access Point (US)
J9360B HP MSM320 Access Point (US)
J9364A HP E-MSM320 Access Point (WW)
J9364B HP MSM320 Access Point (WW)
J9365A HP MSM320-R Access Point (US)
J9365B HP MSM320-R Access Point (US)
J9368A HP E-MSM320-R Access Point (WW)
J9368B HP MSM320-R Access Point (WW)
J9373A HP E-MSM325 Access Point (WW)
J9373B HP MSM325 Access Point (WW)
J9374A HP E-MSM310 Access Point (US)
J9374B HP MSM310 Access Point (US)
J9379A HP MSM310 Access Point (WW)
J9379B HP MSM310 Access Point (WW)
J9380A HP E-MSM310-R Access Point (US)
J9380B HP MSM310-R Access Point (US)
J9383A HP E-MSM310-R Access Point (WW)
J9383B HP MSM310-R Access Point (WW)
J9524A HP E-MSM310 Access Point (JP)
J9524B HP MSM310 Access Point (JP)
J9527A HP E-MSM320 Access Point (JP)
J9527B HP MSM320 Access Point (JP)
J9528A HP E-MSM320-R Access Point (JP)
J9528B HP MSM320-R Access Point (JP)
MSM 6.2
6.2.1.2
J9370A HP MSM765 Zl Premium Mobility Controller
J9356A HP E-MSM335 Access Point (US)
J9356B HP MSM335 Access Point (US)
J9357A HP E-MSM335 Access Point (WW)
J9357B HP MSM335 Access Point (WW)
J9358A HP E-MSM422 Access Point (US)
J9358B HP MSM422 Access Point (US)
J9359A HP E-MSM422 Access Point (WW)
J9359B HP MSM422 Access Point (WW)
J9530A HP E-MSM422 Access Point (JP)
J9530B HP MSM422 Access Point (JP)
J9617A HP MSM422 Dual Radio 802.11n AP (IL)
J9420A HP MSM760 Premium Mobility Controller
J9421A HP MSM760 Access Controller
J9840A HP MSM775 zl Premium Controller Module
J9360A HP E-MSM320 Access Point (US)
J9360B HP MSM320 Access Point (US)
J9364A HP E-MSM320 Access Point (WW)
J9364B HP MSM320 Access Point (WW)
J9365A HP MSM320-R Access Point (US)
J9365B HP MSM320-R Access Point (US)
J9368A HP E-MSM320-R Access Point (WW)
J9368B HP MSM320-R Access Point (WW)
J9373A HP E-MSM325 Access Point (WW)
J9373B HP MSM325 Access Point (WW)
J9374A HP E-MSM310 Access Point (US)
J9374B HP MSM310 Access Point (US)
J9379A HP MSM310 Access Point (WW)
J9379B HP MSM310 Access Point (WW)
J9380A HP E-MSM310-R Access Point (US)
J9380B HP MSM310-R Access Point (US)
J9383A HP E-MSM310-R Access Point (WW)
J9383B HP MSM310-R Access Point (WW)
J9524A HP E-MSM310 Access Point (JP)
J9524B HP MSM310 Access Point (JP)
J9527A HP E-MSM320 Access Point (JP)
J9527B HP MSM320 Access Point (JP)
J9528A HP E-MSM320-R Access Point (JP)
J9528B HP MSM320-R Access Point (JP)
J9426A HP E-MSM410 Access Point (US)
J9426B HP MSM410 Access Point (US)
J9427A HP E-MSM410 Access Point (WW)
J9427B HP MSM410 Access Point (WW)
J9427C HP MSM410 Access Point (WW)
J9529A HP E-MSM410 Access Point (JP)
J9529B HP MSM410 Access Point (JP)
J9589A HP MSM460 Dual Radio 802.11n AP (JP)
J9590A HP MSM460 Dual Radio 802.11n AP (AM)
J9591A HP MSM460 Dual Radio 802.11n AP (WW)
J9616A HP MSM410 Single Radio 802.11n AP (IL)
J9618A HP MSM460 Dual Radio 802.11n AP (IL)
J9619A HP MSM466 Dual Radio 802.11n AP (IL)
J9620A HP MSM466 Dual Radio 802.11n AP (JP)
J9621A HP MSM466 Dual Radio 802.11n AP (AM)
J9622A HP MSM466 Dual Radio 802.11n AP (WW)
J9650A HP MSM430 Dual Radio 802.11n AP (AM)
J9651A HP MSM430 Dual Radio 802.11n AP (WW)
J9652A HP MSM430 Dual Radio 802.11n AP (JP)
J9653A HP MSM430 Dual Radio 802.11n AP (IL)
J9654A HP MSM430 Dual Radio 802.11n TAA AP
J9655A HP MSM460 Dual Radio 802.11n TAA AP
J9656A HP MSM466 Dual Radio 802.11n TAA AP
J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM)
J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW)
J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP)
J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL)
J9693A HP MSM720 Access Controller (WW)
J9694A HP MSM720 Premium Mobility Cntlr (WW)
J9695A HP MSM720 TAA Access Controller
J9696A HP MSM720 TAA Premium Mobility Cntlr
M220
Fixes in progress
use mitigations
J9798A HP M220 802.11n (AM) Access Point
J9799A HP M220 802.11n (WW) Access Point
M210
Fixes in progress
use mitigations
JL023A HP M210 802.11n (AM) Access Point
JL024A HP M210 802.11n (WW) Access Point
PS110
Fixes in progress
use mitigations
JL065A HP PS110 Wireless 802.11n VPN AM Router
JL066A HP PS110 Wireless 802.11n VPN WW Router
HP Office Connect 1810 PK
Fixes in progress
use mitigations
J9660A HP 1810-48G Switch
HP Office Connect 1810 P
Fixes in progress
use mitigations
J9450A HP 1810-24G Switch
J9449A HP 1810-8G Switch
HP Office Connect 1810 PL
Fixes in progress
use mitigations
J9802A HP 1810-8G v2 Switch
J9803A HP 1810-24G v2 Switch
RF Manager
Fixes in progress
use mitigations
J9522A HP E-MSM415 RF Security Sensor J9521A HP RF Manager Controller with
50 Sensor License J9838AAE HP RF Manager for VMware 50 Sensor E-LTU
HP Office Connect 1810 PM
Fixes in progress
use mitigations
J9800A HP 1810-8 v2 Switch
J9801A HP 1810-24 v2 Switch
HP Office Connect PS1810
Fixes in progress
use mitigations
J9833A HP PS1810-8G Switch
J9834A HP PS1810-24G Switch
Mitigation Instructions
For SSLv3 Server Functionality on Impacted Products:
Disable SSLv3 on clients
and/or disable CBC ciphers on clients
Use Access Control functionality to control client access
For SSLv3 Client Functionality on Impacted Products:
Go to SSL server and disable SSLv3
and/or disable CBC ciphers
Use Access Control functionality to control access to servers
HISTORY
Version:1 (rev.1) - 2 April 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
Existing users may upgrade to HP OneView version 1.20 using the Update
Appliance feature in HP OneView.
HP OneView version 1.20 is available from the following location:
https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber
=Z7550-63180
Note: The upgrade (.bin) or a new install (.ova) is also available:
An HP Passport login is required.
Go to the HP Software Depot site at http://www.software.hp.com and search for
HP OneView.
HISTORY
Version:1 (rev.1) - 13 January 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz: Upgraded.
(* Security fix *)
patches/packages/openssl-1.0.1j-i486-1_slack14.1.txz: Upgraded.
For more information, see:
https://www.openssl.org/news/secadv_20141015.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zc-i486-1_slack13.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.0.txz
Updated packages for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz
Updated packages for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zc-i486-1_slack13.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.1.txz
Updated packages for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz
Updated packages for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zc-i486-1_slack13.37.txz
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.37.txz
Updated packages for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.37.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz
Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1j-i486-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.0.txz
Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1j-x86_64-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz
Updated packages for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1j-i486-1_slack14.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz
Updated packages for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1j-x86_64-1_slack14.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1j-i486-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1j-i486-1.txz
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1j-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1j-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 13.0 packages:
44d336a121b39296f0e6bbeeb283dd2b openssl-0.9.8zc-i486-1_slack13.0.txz
8342cfb351e59ecf5ea6d8cba66f0040 openssl-solibs-0.9.8zc-i486-1_slack13.0.txz
Slackware x86_64 13.0 packages:
671f12535bdc10ab24388b713351aca2 openssl-0.9.8zc-x86_64-1_slack13.0.txz
21e380284cdfab2fd15fffe2e0aed526 openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz
Slackware 13.1 packages:
64cb819f1e07522bd5d7ceedd0a9ab50 openssl-0.9.8zc-i486-1_slack13.1.txz
5fe4e385b2251cfd7e8ae5963ec6cef1 openssl-solibs-0.9.8zc-i486-1_slack13.1.txz
Slackware x86_64 13.1 packages:
94feb6699d6f2cc7750a6b2e17ccaaa2 openssl-0.9.8zc-x86_64-1_slack13.1.txz
2c17e4286509c29074ab0168367b851e openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz
Slackware 13.37 packages:
4483d91c776c7e23c59246c4e0aa24aa openssl-0.9.8zc-i486-1_slack13.37.txz
fedd58eb19bc13c9dd88d947827a7370 openssl-solibs-0.9.8zc-i486-1_slack13.37.txz
Slackware x86_64 13.37 packages:
5d48ac1e9339efc35e304c7d48b2e762 openssl-0.9.8zc-x86_64-1_slack13.37.txz
6f5e2b576259477c13f12cbed9be8804 openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz
Slackware 14.0 packages:
2b678160283bc696565dc8bd8b28c0eb openssl-1.0.1j-i486-1_slack14.0.txz
f7762615c990713e9e86d4da962f1022 openssl-solibs-1.0.1j-i486-1_slack14.0.txz
Slackware x86_64 14.0 packages:
41010ca37d49b74e7d7dc3f1c6ddc57e openssl-1.0.1j-x86_64-1_slack14.0.txz
40dc6f3de217279d6140c1efcc0d45c8 openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz
Slackware 14.1 packages:
024ecea55e22e47f9fbb4b81a7b72a51 openssl-1.0.1j-i486-1_slack14.1.txz
0a575668bb41ec4c2160800611f7f627 openssl-solibs-1.0.1j-i486-1_slack14.1.txz
Slackware x86_64 14.1 packages:
d07fe289f7998a584c2b0d9810a8b9aa openssl-1.0.1j-x86_64-1_slack14.1.txz
1ffc5d0c02b0c60cefa5cf9189bfc71d openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz
Slackware -current packages:
53c9f51a79460bbfc5dec5720317cd53 a/openssl-solibs-1.0.1j-i486-1.txz
cc059aa63494f3b005a886c70bc3f5d6 n/openssl-1.0.1j-i486-1.txz
Slackware x86_64 -current packages:
500709555e652adcd84b4e02dfab4eeb a/openssl-solibs-1.0.1j-x86_64-1.txz
c483ca9c450fa90a901ac013276ccc53 n/openssl-1.0.1j-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg openssl-1.0.1j-i486-1_slack14.1.txz openssl-solibs-1.0.1j-i486-1_slack14.1.txz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. This could be
exploited in a Denial Of Service attack. This issue affects OpenSSL
1.0.1 server implementations for both SSL/TLS and DTLS regardless of
whether SRTP is used or configured.
This issue was reported to OpenSSL on 26th September 2014, based on an original
issue and patch developed by the LibreSSL project. Further analysis of the issue
was performed by the OpenSSL team.
The fix was developed by the OpenSSL team.
Session Ticket Memory Leak (CVE-2014-3567)
==========================================
Severity: Medium
When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
integrity of that ticket is first verified. In the event of a session
ticket integrity check failing, OpenSSL will fail to free memory
causing a memory leak.
This issue was reported to OpenSSL on 8th October 2014.
The fix was developed by Stephen Henson of the OpenSSL core team.
SSL 3.0 Fallback protection
===========================
Severity: Medium
OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol
downgrade.
Some client applications (such as browsers) will reconnect using a
downgraded protocol to work around interoperability bugs in older
servers. This could be exploited by an active man-in-the-middle to
downgrade connections to SSL 3.0 even if both sides of the connection
support higher protocols. SSL 3.0 contains a number of weaknesses
including POODLE (CVE-2014-3566).
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
https://www.openssl.org/~bodo/ssl-poodle.pdf
Support for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller.
Build option no-ssl3 is incomplete (CVE-2014-3568)
==================================================
Severity: Low
When OpenSSL is configured with "no-ssl3" as a build option, servers
could accept and complete a SSL 3.0 handshake, and clients could be
configured to send them.
This issue was reported to OpenSSL by Akamai Technologies on 14th October 2014.
The fix was developed by Akamai and the OpenSSL team.
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20141015.txt
Note: the online version of the advisory may be updated with additional
details over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html
| VAR-201410-1418 | CVE-2014-3566 |
OpenSSL Used in and other products SSL Vulnerability in obtaining plaintext data in the protocol
Related entries in the VARIoT exploits database: VAR-E-201410-0385 |
CVSS V2: 4.3 CVSS V3: 3.4 Severity: LOW |
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue. This vulnerability "POODLE" It is called.Man-in-the-middle attacks (man-in-the-middle attack) May get plain text data through padding oracle attacks. SSL protocol is the abbreviation of Secure Socket Layer protocol (Secure Socket Layer) developed by Netscape, which provides security and data integrity guarantee for Internet communication. There is a security vulnerability in the SSL protocol 3.0 version used in OpenSSL 1.0.1i and earlier versions.
HP Storage Data Protector Cell Manager v8 before v8.13_206 and v9 before
v9.03MMR running on HP-UX 11i, Windows Server 2008/2008R2/2012/2012R2,
Redhat, CentOS, Oracle Linux, and SUSE Linux_x64. Relevant releases/architectures:
RHOSE Node 2.0 - noarch
3. Description:
OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or private
cloud deployments.
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
A flaw was found in the way SSL 3.0 handled padding bytes when decrypting
messages encrypted using block ciphers in cipher block chaining (CBC) mode.
This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected
byte of a cipher text in as few as 256 tries if they are able to force a
victim application to repeatedly send the same data over newly created SSL
3.0 connections. Bugs fixed (https://bugzilla.redhat.com/):
1152789 - CVE-2014-3566 SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
6. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: java-1.7.1-ibm security update
Advisory ID: RHSA-2014:1880-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1880.html
Issue date: 2014-11-20
CVE Names: CVE-2014-3065 CVE-2014-3566 CVE-2014-4288
CVE-2014-6456 CVE-2014-6457 CVE-2014-6458
CVE-2014-6476 CVE-2014-6492 CVE-2014-6493
CVE-2014-6502 CVE-2014-6503 CVE-2014-6506
CVE-2014-6511 CVE-2014-6512 CVE-2014-6515
CVE-2014-6527 CVE-2014-6531 CVE-2014-6532
CVE-2014-6558
=====================================================================
1. Summary:
Updated java-1.7.1-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 6 and 7 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client Supplementary (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Supplementary (v. 7) - x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 7) - ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 7) - x86_64
3. Description:
IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment
and the IBM Java Software Development Kit.
This update fixes several vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM Security alerts
page, listed in the References section. (CVE-2014-3065, CVE-2014-3566,
CVE-2014-4288, CVE-2014-6456, CVE-2014-6457, CVE-2014-6458, CVE-2014-6476,
CVE-2014-6492, CVE-2014-6493, CVE-2014-6502, CVE-2014-6503, CVE-2014-6506,
CVE-2014-6511, CVE-2014-6512, CVE-2014-6515, CVE-2014-6527, CVE-2014-6531,
CVE-2014-6532, CVE-2014-6558)
The CVE-2014-6512 issue was discovered by Florian Weimer of Red Hat
Product Security.
Note: With this update, the IBM SDK now disables the SSL 3.0 protocol to
address the CVE-2014-3566 issue (also known as POODLE). Refer to the IBM
article linked to in the References section for additional details about
this change and instructions on how to re-enable SSL 3.0 support if needed.
All users of java-1.7.1-ibm are advised to upgrade to these updated
packages, containing the IBM Java SE 7R1 SR2 release. All running instances
of IBM Java must be restarted for the update to take effect.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1071210 - CVE-2014-6512 OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509)
1150155 - CVE-2014-6506 OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564)
1150651 - CVE-2014-6531 OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274)
1150669 - CVE-2014-6502 OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797)
1151046 - CVE-2014-6457 OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066)
1151063 - CVE-2014-6558 OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
1151517 - CVE-2014-6511 ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540)
1152756 - CVE-2014-6532 Oracle JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment)
1152757 - CVE-2014-6503 Oracle JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment)
1152758 - CVE-2014-6456 Oracle JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment)
1152759 - CVE-2014-6492 Oracle JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment)
1152760 - CVE-2014-6493 Oracle JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment)
1152761 - CVE-2014-4288 Oracle JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment)
1152763 - CVE-2014-6458 Oracle JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment)
1152765 - CVE-2014-6476 Oracle JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment)
1152766 - CVE-2014-6515 Oracle JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment)
1152767 - CVE-2014-6527 Oracle JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment)
1152789 - CVE-2014-3566 SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
1162554 - CVE-2014-3065 IBM JDK: privilege escalation via shared class cache
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
x86_64:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
ppc64:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.ppc.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.ppc64.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el6_6.ppc64.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.ppc.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.ppc64.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el6_6.ppc64.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el6_6.ppc.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el6_6.ppc64.rpm
s390x:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.s390.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.s390x.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el6_6.s390x.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.s390.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.s390x.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el6_6.s390x.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el6_6.s390x.rpm
x86_64:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
x86_64:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux Client Supplementary (v. 7):
x86_64:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.i686.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Supplementary (v. 7):
x86_64:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.i686.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
Red Hat Enterprise Linux Server Supplementary (v. 7):
ppc64:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.ppc.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.ppc64.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el7_0.ppc64.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.ppc.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.ppc64.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el7_0.ppc64.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el7_0.ppc.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el7_0.ppc64.rpm
s390x:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.s390.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.s390x.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el7_0.s390x.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.s390.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.s390x.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el7_0.s390x.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el7_0.s390x.rpm
x86_64:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.i686.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 7):
x86_64:
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.i686.rpm
java-1.7.1-ibm-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-demo-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.i686.rpm
java-1.7.1-ibm-devel-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-jdbc-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-plugin-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
java-1.7.1-ibm-src-1.7.1.2.0-1jpp.3.el7_0.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-3065
https://access.redhat.com/security/cve/CVE-2014-3566
https://access.redhat.com/security/cve/CVE-2014-4288
https://access.redhat.com/security/cve/CVE-2014-6456
https://access.redhat.com/security/cve/CVE-2014-6457
https://access.redhat.com/security/cve/CVE-2014-6458
https://access.redhat.com/security/cve/CVE-2014-6476
https://access.redhat.com/security/cve/CVE-2014-6492
https://access.redhat.com/security/cve/CVE-2014-6493
https://access.redhat.com/security/cve/CVE-2014-6502
https://access.redhat.com/security/cve/CVE-2014-6503
https://access.redhat.com/security/cve/CVE-2014-6506
https://access.redhat.com/security/cve/CVE-2014-6511
https://access.redhat.com/security/cve/CVE-2014-6512
https://access.redhat.com/security/cve/CVE-2014-6515
https://access.redhat.com/security/cve/CVE-2014-6527
https://access.redhat.com/security/cve/CVE-2014-6531
https://access.redhat.com/security/cve/CVE-2014-6532
https://access.redhat.com/security/cve/CVE-2014-6558
https://access.redhat.com/security/updates/classification/#critical
https://www.ibm.com/developerworks/java/jdk/alerts/
https://www-01.ibm.com/support/docview.wss?uid=swg21688165
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUbh0WXlSAg2UNWIIRAi2fAKDExQmcZYqy6INJOtUbpQK5QrXWUgCgmnhC
K/vkNngAOzoTqWX0yFnSTr0=
=nHUV
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04583581
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04583581
Version: 1
HPSBUX03281 SSRT101968 rev.1 - HP-UX running Java7, Remote Unauthorized
Access, Disclosure of Information, and
Other Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2015-03-10
Last Updated: 2015-03-10
Potential Security Impact: Remote unauthorized access, disclosure of
information, and other vulnerabilities
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in the Java Runtime
Environment (JRE) and the Java
Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow
remote unauthorized access, disclosure
of information, and other vulnerabilities.
References: CVE-2014-3566
CVE-2014-6585
CVE-2014-6587
CVE-2014-6591
CVE-2014-6593
CVE-2014-6601
CVE-2015-0383
CVE-2015-0395
CVE-2015-0400
CVE-2015-0403
CVE-2015-0406
CVE-2015-0407
CVE-2015-0408
CVE-2015-4010
CVE-2015-0412
CVE-2015-0413
SSRT101968
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.23 and B.11.31 running HP JDK and JRE v7.0.11 and earlier.
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3
CVE-2014-6585 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6
CVE-2014-6587 (AV:L/AC:L/Au:S/C:P/I:P/A:P) 4.3
CVE-2014-6591 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6
CVE-2014-6593 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0
CVE-2014-6601 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0
CVE-2015-0383 (AV:L/AC:M/Au:N/C:N/I:P/A:C) 5.4
CVE-2015-0395 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3
CVE-2015-0400 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0
CVE-2015-0403 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9
CVE-2015-0406 (AV:N/AC:M/Au:N/C:P/I:N/A:P) 5.8
CVE-2015-0407 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0
CVE-2015-0408 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0
CVE-2015-0410 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2015-0412 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2
CVE-2015-0413 (AV:L/AC:M/Au:N/C:N/I:P/A:N) 1.9
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following Java version upgrade to resolve these
vulnerabilities.
The upgrade is available from the following location: http://www.hp.com/java
OS Version
Release Version
HP-UX B.11.23, B.11.31
JDK and JRE v7.0.12 or subsequent
MANUAL ACTIONS: Yes - Update
For HP-UX 11i v2 and v3 update to Java v7.0.12 or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch
Check. It analyzes all Security Bulletins issued by HP and lists recommended
actions that may apply to a
specific HP-UX system. It can also download patches and create a depot
automatically. For more information see
https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.23
HP-UX B.11.31
===========
Jdk70.JDK70
Jdk70.JDK70-COM
Jdk70.JDK70-IPF32
Jdk70.JDK70-IPF64
Jdk70.JDK70-DEMO
Jre70.JRE70
Jre70.JRE70-COM
Jre70.JRE70-COM-DOC
Jre70.JRE70-IPF32
Jre70.JRE70-IPF32-HS
Jre70.JRE70-IPF64
Jre70.JRE70-IPF64-HS
action: install revision 1.7.0.12.00 or subsequent
END AFFECTED VERSIONS
HISTORY
Version:1 (rev.1) - 10 March 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners. A second vulnerability could be exploited to cause a Denial of
Service (Dos).
The update is available from HPE Software Depot: https://h20392.www2.hpe.com/
portal/swdepot/displayProductInfo.do?productNumber=HPVPRhttps://www.hpe.com
Note: HPE recommends customers using OV4VC 7.8.1 and earlier should upgrade
to OV4VC 7.8.2. This addresses all SSL security vulnerabilities reported
through March 28, 2016. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2014-10-16-3 OS X Server v4.0
OS X Server v4.0 is now available and addresses the following:
BIND
Available for: OS X Yosemite v10.10 or later
Impact: Multiple vulnerabilities in BIND, the most serious of which
may lead to a denial of service
Description: Multiple vulnerabilities existed in BIND. These issues
were addressed by updating BIND to version 9.9.2-P2
CVE-ID
CVE-2013-3919
CVE-2013-4854
CVE-2014-0591
CoreCollaboration
Available for: OS X Yosemite v10.10 or later
Impact: A remote attacker may be able to execute arbitrary SQL
queries
Description: A SQL injection issue existed in Wiki Server. This
issue was addressed through additional validation of SQL queries.
CVE-ID
CVE-2014-4424 : Sajjad Pourali (sajjad@securation.com) of CERT of
Ferdowsi University of Mashhad
CoreCollaboration
Available for: OS X Yosemite v10.10 or later
Impact: Visiting a maliciously crafted website may lead to a cross-
site scripting attack
Description: A cross-site scripting issue existed in Xcode Server.
This issue was addressed through improved encoding of HTML output.
CVE-ID
CVE-2014-4406 : David Hoyt of Hoyt LLC
CoreCollaboration
Available for: OS X Yosemite v10.10 or later
Impact: Multiple vulnerabilities in PostgreSQL, the most serious of
which may lead to arbitrary code execution
Description: Multiple vulnerabilities existed in PostgreSQL. These
issues were addressed by updating PostgreSQL to version 9.2.7.
CVE-ID
CVE-2014-0060
CVE-2014-0061
CVE-2014-0062
CVE-2014-0063
CVE-2014-0064
CVE-2014-0065
CVE-2014-0066
Mail Service
Available for: OS X Yosemite v10.10 or later
Impact: Group SACL changes for Mail may not be respected until after
a restart of the Mail service
Description: SACL settings for Mail were cached and changes to the
SACLs were not respected until after a restart of the Mail service.
This issue was addressed by resetting the cache upon changes to the
SACLs.
CVE-ID
CVE-2014-4446 : Craig Courtney
Profile Manager
Available for: OS X Yosemite v10.10 or later
Impact: Multiple vulnerabilities in LibYAML, the most serious of
which may lead to arbitrary code execution
Description: Multiple vulnerabilities existed in LibYAML. These
issues were addressed by switching from YAML to JSON as Profile
Manager's internal serialization format.
CVE-ID
CVE-2013-4164
CVE-2013-6393
Profile Manager
Available for: OS X Yosemite v10.10 or later
Impact: A local user may obtain passwords after setting up or
editing profiles in Profile Manager
Description: In certain circumstances, setting up or editing
profiles in Profile Manager may have logged passwords to a file. This
issue was addressed through improved handling of credentials.
CVE-ID
CVE-2014-4447 : Mayo Jordanov
Server
Available for: OS X Yosemite v10.10 or later
Impact: An attacker may be able to decrypt data protected by SSL
Description: There are known attacks on the confidentiality of SSL
3.0 when a cipher suite uses a block cipher in CBC mode. An attacker
could force the use of SSL 3.0, even when the server would support a
better TLS version, by blocking TLS 1.0 and higher connection
attempts. This issue was addressed by disabling SSL 3.0 support in
Web Server, Calendar & Contacts Server, and Remote Administration.
CVE-ID
CVE-2014-3566 : Bodo Moeller, Thai Duong, and Krzysztof Kotowicz of
Google Security Team
ServerRuby
Available for: OS X Yosemite v10.10 or later
Impact: Running a Ruby script that handles untrusted YAML tags may
lead to an unexpected application termination or arbitrary code
execution
Description: An integer overflow issue existed in LibYAML's handling
of YAML tags. This issue was addressed through additional validation
of YAML tags. This issue does not affect systems prior to OS X
Mavericks.
CVE-ID
CVE-2013-6393
OS X Server v4.0 may be obtained from the Mac App Store. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201606-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: claws-mail: Multiple Vulnerabilities
Date: June 26, 2016
Bugs: #525588, #569010, #570692
ID: 201606-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in claws-mail, particularly in
the default SSL implementation.
Background
==========
Claws Mail is a GTK based e-mail client.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 mail-client/claws-mail < 3.13.2 >= 3.13.2
Description
===========
Multiple vulnerabilities have been discovered in claws-mail. Please
review the CVE identifiers referenced below for details.
Impact
======
An attacker could possibly intercept communications due to the default
implementation of SSL 3.0.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All claws-mail users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/claws-mail-3.13.2"
References
==========
[ 1 ] CVE-2014-3566
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566
[ 2 ] CVE-2015-8614
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8614
[ 3 ] CVE-2015-8614
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8614
[ 4 ] CVE-2015-8708
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8708
[ 5 ] CVE-2015-8708
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8708
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201606-11
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
HP has released the following updates to resolve this vulnerability for HP
Vertica products.
Update to the latest VM image available at: https://my.vertica.com
For customers using the AMI version of the HP Vertica Analytics platform,
please install the latest image available at Amazon
| VAR-201410-0859 | CVE-2014-6559 | Oracle MySQL Server Security hole |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING. Oracle MySQL Server is an open source relational database management system developed by Oracle Corporation. The database system has the characteristics of high performance, low cost and good reliability.
Additionally MariaDB 5.5.40 removed the bundled copy of jemalloc from
the source tarball and only builds with jemalloc if a system copy
of the jemalloc library is detecting during the build. The verification
of md5 checksums and GPG signatures is performed automatically for you. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFUT0QSmqjQ0CJFipgRAmnhAKCOd9QLoxRrlcA8U4XLA46+ZhjfFwCfQzhY
tRKQjAv7QAJqbwipIkIIC8Q=
=uyHd
-----END PGP SIGNATURE-----
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: mariadb security update
Advisory ID: RHSA-2014:1861-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1861.html
Issue date: 2014-11-17
CVE Names: CVE-2014-2494 CVE-2014-4207 CVE-2014-4243
CVE-2014-4258 CVE-2014-4260 CVE-2014-4274
CVE-2014-4287 CVE-2014-6463 CVE-2014-6464
CVE-2014-6469 CVE-2014-6484 CVE-2014-6505
CVE-2014-6507 CVE-2014-6520 CVE-2014-6530
CVE-2014-6551 CVE-2014-6555 CVE-2014-6559
=====================================================================
1. Summary:
Updated mariadb packages that fix several security issues are now available
for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
MariaDB is a multi-user, multi-threaded SQL database server that is binary
compatible with MySQL.
This update fixes several vulnerabilities in the MariaDB database server.
Information about these flaws can be found on the Oracle Critical Patch
Update Advisory page, listed in the References section. (CVE-2014-2494,
CVE-2014-4207, CVE-2014-4243, CVE-2014-4258, CVE-2014-4260, CVE-2014-4287,
CVE-2014-4274, CVE-2014-6463, CVE-2014-6464, CVE-2014-6469, CVE-2014-6484,
CVE-2014-6505, CVE-2014-6507, CVE-2014-6520, CVE-2014-6530, CVE-2014-6551,
CVE-2014-6555, CVE-2014-6559)
These updated packages upgrade MariaDB to version 5.5.40. Refer to the
MariaDB Release Notes listed in the References section for a complete list
of changes.
All MariaDB users should upgrade to these updated packages, which correct
these issues. After installing this update, the MariaDB server daemon
(mysqld) will be restarted automatically.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1120382 - CVE-2014-2494 mysql: unspecified vulnerability related to ENARC (CPU July 2014)
1120383 - CVE-2014-4207 mysql: unspecified vulnerability related to SROPTZR (CPU July 2014)
1120385 - CVE-2014-4243 mysql: unspecified vulnerability related to ENFED (CPU July 2014)
1120387 - CVE-2014-4258 mysql: unspecified vulnerability related to SRINFOSC (CPU July 2014)
1120388 - CVE-2014-4260 mysql: unspecified vulnerability related to SRCHAR (CPU July 2014)
1126271 - CVE-2014-4274 mysql: unspecified MyISAM temporary file issue fixed in 5.5.39 and 5.6.20
1153461 - CVE-2014-4287 mysql: unspecified vulnerability related to SERVER:CHARACTER SETS (CPU October 2014)
1153462 - CVE-2014-6463 mysql: unspecified vulnerability related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (CPU October 2014)
1153463 - CVE-2014-6464 mysql: unspecified vulnerability related to SERVER:INNODB DML FOREIGN KEYS (CPU October 2014)
1153464 - CVE-2014-6469 mysql: unspecified vulnerability related to SERVER:OPTIMIZER (CPU October 2014)
1153467 - CVE-2014-6484 mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014)
1153489 - CVE-2014-6505 mysql: unspecified vulnerability related to SERVER:MEMORY STORAGE ENGINE (CPU October 2014)
1153490 - CVE-2014-6507 mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014)
1153491 - CVE-2014-6520 mysql: unspecified vulnerability related to SERVER:DDL (CPU October 2014)
1153493 - CVE-2014-6530 mysql: unspecified vulnerability related to CLIENT:MYSQLDUMP (CPU October 2014)
1153494 - CVE-2014-6551 mysql: unspecified vulnerability related to CLIENT:MYSQLADMIN (CPU October 2014)
1153495 - CVE-2014-6555 mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014)
1153496 - CVE-2014-6559 mysql: unspecified vulnerability related to C API SSL CERTIFICATE HANDLING (CPU October 2014)
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
mariadb-5.5.40-1.el7_0.src.rpm
x86_64:
mariadb-5.5.40-1.el7_0.x86_64.rpm
mariadb-debuginfo-5.5.40-1.el7_0.i686.rpm
mariadb-debuginfo-5.5.40-1.el7_0.x86_64.rpm
mariadb-libs-5.5.40-1.el7_0.i686.rpm
mariadb-libs-5.5.40-1.el7_0.x86_64.rpm
mariadb-server-5.5.40-1.el7_0.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
mariadb-bench-5.5.40-1.el7_0.x86_64.rpm
mariadb-debuginfo-5.5.40-1.el7_0.i686.rpm
mariadb-debuginfo-5.5.40-1.el7_0.x86_64.rpm
mariadb-devel-5.5.40-1.el7_0.i686.rpm
mariadb-devel-5.5.40-1.el7_0.x86_64.rpm
mariadb-embedded-5.5.40-1.el7_0.i686.rpm
mariadb-embedded-5.5.40-1.el7_0.x86_64.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.i686.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.x86_64.rpm
mariadb-test-5.5.40-1.el7_0.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
mariadb-5.5.40-1.el7_0.src.rpm
x86_64:
mariadb-5.5.40-1.el7_0.x86_64.rpm
mariadb-debuginfo-5.5.40-1.el7_0.i686.rpm
mariadb-debuginfo-5.5.40-1.el7_0.x86_64.rpm
mariadb-libs-5.5.40-1.el7_0.i686.rpm
mariadb-libs-5.5.40-1.el7_0.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
mariadb-bench-5.5.40-1.el7_0.x86_64.rpm
mariadb-debuginfo-5.5.40-1.el7_0.i686.rpm
mariadb-debuginfo-5.5.40-1.el7_0.x86_64.rpm
mariadb-devel-5.5.40-1.el7_0.i686.rpm
mariadb-devel-5.5.40-1.el7_0.x86_64.rpm
mariadb-embedded-5.5.40-1.el7_0.i686.rpm
mariadb-embedded-5.5.40-1.el7_0.x86_64.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.i686.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.x86_64.rpm
mariadb-server-5.5.40-1.el7_0.x86_64.rpm
mariadb-test-5.5.40-1.el7_0.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
mariadb-5.5.40-1.el7_0.src.rpm
ppc64:
mariadb-5.5.40-1.el7_0.ppc64.rpm
mariadb-bench-5.5.40-1.el7_0.ppc64.rpm
mariadb-debuginfo-5.5.40-1.el7_0.ppc.rpm
mariadb-debuginfo-5.5.40-1.el7_0.ppc64.rpm
mariadb-devel-5.5.40-1.el7_0.ppc.rpm
mariadb-devel-5.5.40-1.el7_0.ppc64.rpm
mariadb-libs-5.5.40-1.el7_0.ppc.rpm
mariadb-libs-5.5.40-1.el7_0.ppc64.rpm
mariadb-server-5.5.40-1.el7_0.ppc64.rpm
mariadb-test-5.5.40-1.el7_0.ppc64.rpm
s390x:
mariadb-5.5.40-1.el7_0.s390x.rpm
mariadb-bench-5.5.40-1.el7_0.s390x.rpm
mariadb-debuginfo-5.5.40-1.el7_0.s390.rpm
mariadb-debuginfo-5.5.40-1.el7_0.s390x.rpm
mariadb-devel-5.5.40-1.el7_0.s390.rpm
mariadb-devel-5.5.40-1.el7_0.s390x.rpm
mariadb-libs-5.5.40-1.el7_0.s390.rpm
mariadb-libs-5.5.40-1.el7_0.s390x.rpm
mariadb-server-5.5.40-1.el7_0.s390x.rpm
mariadb-test-5.5.40-1.el7_0.s390x.rpm
x86_64:
mariadb-5.5.40-1.el7_0.x86_64.rpm
mariadb-bench-5.5.40-1.el7_0.x86_64.rpm
mariadb-debuginfo-5.5.40-1.el7_0.i686.rpm
mariadb-debuginfo-5.5.40-1.el7_0.x86_64.rpm
mariadb-devel-5.5.40-1.el7_0.i686.rpm
mariadb-devel-5.5.40-1.el7_0.x86_64.rpm
mariadb-libs-5.5.40-1.el7_0.i686.rpm
mariadb-libs-5.5.40-1.el7_0.x86_64.rpm
mariadb-server-5.5.40-1.el7_0.x86_64.rpm
mariadb-test-5.5.40-1.el7_0.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
mariadb-debuginfo-5.5.40-1.el7_0.ppc.rpm
mariadb-debuginfo-5.5.40-1.el7_0.ppc64.rpm
mariadb-embedded-5.5.40-1.el7_0.ppc.rpm
mariadb-embedded-5.5.40-1.el7_0.ppc64.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.ppc.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.ppc64.rpm
s390x:
mariadb-debuginfo-5.5.40-1.el7_0.s390.rpm
mariadb-debuginfo-5.5.40-1.el7_0.s390x.rpm
mariadb-embedded-5.5.40-1.el7_0.s390.rpm
mariadb-embedded-5.5.40-1.el7_0.s390x.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.s390.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.s390x.rpm
x86_64:
mariadb-debuginfo-5.5.40-1.el7_0.i686.rpm
mariadb-debuginfo-5.5.40-1.el7_0.x86_64.rpm
mariadb-embedded-5.5.40-1.el7_0.i686.rpm
mariadb-embedded-5.5.40-1.el7_0.x86_64.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.i686.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
mariadb-5.5.40-1.el7_0.src.rpm
x86_64:
mariadb-5.5.40-1.el7_0.x86_64.rpm
mariadb-bench-5.5.40-1.el7_0.x86_64.rpm
mariadb-debuginfo-5.5.40-1.el7_0.i686.rpm
mariadb-debuginfo-5.5.40-1.el7_0.x86_64.rpm
mariadb-devel-5.5.40-1.el7_0.i686.rpm
mariadb-devel-5.5.40-1.el7_0.x86_64.rpm
mariadb-libs-5.5.40-1.el7_0.i686.rpm
mariadb-libs-5.5.40-1.el7_0.x86_64.rpm
mariadb-server-5.5.40-1.el7_0.x86_64.rpm
mariadb-test-5.5.40-1.el7_0.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
mariadb-debuginfo-5.5.40-1.el7_0.i686.rpm
mariadb-debuginfo-5.5.40-1.el7_0.x86_64.rpm
mariadb-embedded-5.5.40-1.el7_0.i686.rpm
mariadb-embedded-5.5.40-1.el7_0.x86_64.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.i686.rpm
mariadb-embedded-devel-5.5.40-1.el7_0.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-2494
https://access.redhat.com/security/cve/CVE-2014-4207
https://access.redhat.com/security/cve/CVE-2014-4243
https://access.redhat.com/security/cve/CVE-2014-4258
https://access.redhat.com/security/cve/CVE-2014-4260
https://access.redhat.com/security/cve/CVE-2014-4274
https://access.redhat.com/security/cve/CVE-2014-4287
https://access.redhat.com/security/cve/CVE-2014-6463
https://access.redhat.com/security/cve/CVE-2014-6464
https://access.redhat.com/security/cve/CVE-2014-6469
https://access.redhat.com/security/cve/CVE-2014-6484
https://access.redhat.com/security/cve/CVE-2014-6505
https://access.redhat.com/security/cve/CVE-2014-6507
https://access.redhat.com/security/cve/CVE-2014-6520
https://access.redhat.com/security/cve/CVE-2014-6530
https://access.redhat.com/security/cve/CVE-2014-6551
https://access.redhat.com/security/cve/CVE-2014-6555
https://access.redhat.com/security/cve/CVE-2014-6559
https://access.redhat.com/security/updates/classification/#important
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html#AppendixMSQL
https://mariadb.com/kb/en/mariadb/development/release-notes/mariadb-5540-release-notes/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUadeuXlSAg2UNWIIRAq0FAKC2DOhAOg/q+zlOLLV3ztECJ+Gh0gCdEGtr
rmT+kQlZKObKWBl1L2CyGEU=
=yhRc
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. ============================================================================
Ubuntu Security Notice USN-2384-1
October 15, 2014
mysql-5.5 vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in MySQL.
Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-39.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-40.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
mysql-server-5.5 5.5.40-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
mysql-server-5.5 5.5.40-0ubuntu0.12.04.1
In general, a standard system update will make all the necessary changes.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/mariadb-5.5.40-i486-1_slack14.1.txz: Upgraded.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/mariadb-5.5.40-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/mariadb-5.5.40-x86_64-1_slack14.1.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/mariadb-5.5.40-i486-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/mariadb-5.5.40-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 14.1 package:
da0aff5bebbbdc0621359c0fea027ae6 mariadb-5.5.40-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
dbb7d695a22ae538b5ad9c024823b190 mariadb-5.5.40-x86_64-1_slack14.1.txz
Slackware -current package:
f9ca4cf6015ddbb73dfba16c535caffc ap/mariadb-5.5.40-i486-1.txz
Slackware x86_64 -current package:
6924f64b6c147556a58a2c6f1929ab5e ap/mariadb-5.5.40-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg mariadb-5.5.40-i486-1_slack14.1.txz
Then, restart the database server:
# sh /etc/rc.d/rc.mysqld restart
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201411-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: MySQL, MariaDB: Multiple vulnerabilities
Date: November 05, 2014
Bugs: #525504
ID: 201411-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in the MySQL and MariaDB,
possibly allowing attackers to cause unspecified impact. MariaDB is an
enhanced, drop-in replacement for MySQL.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-db/mysql < 5.5.40 >= 5.5.40
2 dev-db/mariadb < 5.5.40-r1 >= 5.5.40-r1
-------------------------------------------------------------------
2 affected packages
Description
===========
Multiple unspecified vulnerabilities have been discovered in MySQL.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could exploit these vulnerabilities to cause
unspecified impact, possibly including remote execution of arbitrary
code, Denial of Service, or disclosure of sensitive information.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All MySQL users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/mysql-5.5.40"
All MariaDB users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/mariadb-5.5.40-r1"
References
==========
[ 1 ] CVE-2014-6464
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6464
[ 2 ] CVE-2014-6469
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6469
[ 3 ] CVE-2014-6491
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6491
[ 4 ] CVE-2014-6494
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6494
[ 5 ] CVE-2014-6496
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6496
[ 6 ] CVE-2014-6500
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6500
[ 7 ] CVE-2014-6507
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6507
[ 8 ] CVE-2014-6555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6555
[ 9 ] CVE-2014-6559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6559
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-02.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
For the unstable distribution (sid), these problems will be fixed soon. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
3
| VAR-201410-0978 | CVE-2014-8755 | Panasonic Network Camera View WebVideoCam ActiveX Remote code execution vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Panasonic Network Camera View 3 and 4 allows remote attackers to execute arbitrary code via a crafted page, which triggers an invalid pointer dereference, related to "the ability to nullify an arbitrary address in memory.". User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the GetImageDataPrint method of the WebVideoCam ActiveX control. The issue lies in the ability to nullify an arbitrary address in memory. An attacker can leverage this vulnerability to execute code under the context of the current process. Panasonic Network Camera View is a webcam viewing app. Failed exploit attempts will likely result in denial-of-service conditions
| VAR-201410-1415 | CVE-2014-8756 | Panasonic Network Camera Recorder Remote code execution vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The NcrCtl4.NcrNet.1 control in Panasonic Network Camera Recorder before 4.04R03 allows remote attackers to execute arbitrary code via a crafted GetVOLHeader method call, which writes null bytes to an arbitrary address. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within then NcrCtl4.NcrNet.1 control. An attacker can leverage this to execute arbitrary code in the context of the browser. Panasonic Network Camera is a Panasonic network camera. Failed exploit attempts will likely result in denial-of-service conditions
| VAR-201410-0066 | CVE-2014-3406 | Cisco Intrusion Prevention System Software IP Service operation interruption in logging function (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Race condition in the IP logging feature in Cisco Intrusion Prevention System (IPS) Software 7.1(7)E4 and earlier allows remote attackers to cause a denial of service (device reload) via crafted IP traffic that matches a problematic rule, aka Bug ID CSCud82085. ( Device reload ) There are vulnerabilities that are put into a state. Cisco Intrusion Prevention System is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to cause denial-of-service conditions.
This issue is being tracked by Cisco Bug ID CSCud82085. The system can immediately interrupt, adjust or isolate some abnormal or harmful network data transmission behaviors
| VAR-201410-1419 | No CVE | SAP BusinessObjects Explorer XML External Entity Injection Vulnerability (CNVD-2014-06710) |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Business Objects is the world's leading business intelligence (BI) software company. SAP BusinessObjects Explorer is a browser that it launched. An external XML material injection vulnerability exists in SAP BusinessObjects Explorer. An information disclosure vulnerability exists because the program failed to properly authenticate the user's input
| VAR-201410-1417 | CVE-2014-0564 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK & Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0558. This vulnerability CVE-2014-0558 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1648-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1648.html
Issue date: 2014-10-15
CVE Names: CVE-2014-0558 CVE-2014-0564 CVE-2014-0569
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-22,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1152775 - CVE-2014-0564 CVE-2014-0558 CVE-2014-0569 flash-plugin: multiple code execution flaws (APSB14-22)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.411-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.411-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.411-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.411-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.411-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.411-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.411-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.411-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.411-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.411-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.411-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2014-0558.html
https://www.redhat.com/security/data/cve/CVE-2014-0564.html
https://www.redhat.com/security/data/cve/CVE-2014-0569.html
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-22.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUPuDGXlSAg2UNWIIRAsobAJ9vnW0PysUhlqb4KDFHcw8Q7+rzqgCePtuZ
Wum8dH3c44zrI0LJNv9/khY=
=kNs5
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201410-1416 | CVE-2014-0569 | Adobe Flash Player and Adobe AIR Integer overflow vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Integer overflow in Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK & Compiler before 15.0.0.302 allows attackers to execute arbitrary code via unspecified vectors. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the implementation of casi32. The issue lies in the failure to properly sanitize a user-supplied length value with a specific array implementation. An attacker can leverage this vulnerability to execute code within the context of the current process. Failed exploit attempts will likely cause a denial-of-service condition.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1648-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1648.html
Issue date: 2014-10-15
CVE Names: CVE-2014-0558 CVE-2014-0564 CVE-2014-0569
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-22,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1152775 - CVE-2014-0564 CVE-2014-0558 CVE-2014-0569 flash-plugin: multiple code execution flaws (APSB14-22)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.411-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.411-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.411-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.411-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.411-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.411-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.411-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.411-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.411-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.411-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.411-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2014-0558.html
https://www.redhat.com/security/data/cve/CVE-2014-0564.html
https://www.redhat.com/security/data/cve/CVE-2014-0569.html
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-22.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUPuDGXlSAg2UNWIIRAsobAJ9vnW0PysUhlqb4KDFHcw8Q7+rzqgCePtuZ
Wum8dH3c44zrI0LJNv9/khY=
=kNs5
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce