The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of OpenSSL: information disclosure via Heartbeat

Synthesis of the vulnerability

An attacker can use the Heartbeat protocol on an application compiled with OpenSSL, in order to obtain sensitive information, such as keys stored in memory.
Severity of this threat: 3/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 08/04/2014.
Références of this weakness: 1669839, 190438, 2076225, 2962393, c04236102, c04267775, c04286049, CA20140413-01, CERTFR-2014-ALE-003, CERTFR-2014-AVI-156, CERTFR-2014-AVI-161, CERTFR-2014-AVI-162, CERTFR-2014-AVI-167, CERTFR-2014-AVI-169, CERTFR-2014-AVI-177, CERTFR-2014-AVI-178, CERTFR-2014-AVI-179, CERTFR-2014-AVI-180, CERTFR-2014-AVI-181, CERTFR-2014-AVI-198, CERTFR-2014-AVI-199, CERTFR-2014-AVI-213, cisco-sa-20140409-heartbleed, CTX140605, CVE-2014-0160, CVE-2014-0346-REJECT, DSA-2896-1, DSA-2896-2, emr_na-c04236102-7, ESA-2014-034, ESA-2014-036, ESA-2014-075, FEDORA-2014-4879, FEDORA-2014-4910, FEDORA-2014-4982, FEDORA-2014-4999, FG-IR-14-011, FreeBSD-SA-14:06.openssl, Heartbleed, HPSBMU02995, HPSBMU03025, HPSBMU03040, ICSA-14-105-03, JSA10623, MDVSA-2014:123, MDVSA-2015:062, NetBSD-SA2014-004, openSUSE-SU-2014:0492-1, openSUSE-SU-2014:0560-1, openSUSE-SU-2014:0719-1, pfSense-SA-14_04.openssl, RHSA-2014:0376-01, RHSA-2014:0377-01, RHSA-2014:0378-01, RHSA-2014:0396-01, RHSA-2014:0416-01, SA40005, SA79, SB10071, SOL15159, SPL-82696, SSA:2014-098-01, SSA-635659, SSRT101565, USN-2165-1, VIGILANCE-VUL-14534, VMSA-2014-0004, VMSA-2014-0004.1, VMSA-2014-0004.2, VMSA-2014-0004.3, VMSA-2014-0004.6, VMSA-2014-0004.7, VU#720951.

Description of the vulnerability

The Heartbeat extension of TLS (RFC 6520) provides a keep-alive feature, without performing a renegotiation. It exchanges random data in a payload.

Version 1.0.1 of OpenSSL implements Heartbeat, which is enabled by default. The [d]tls1_process_heartbeat() function manages Heartbeat messages. However, it does not check the size of random data, and continues to read after the end of the payload, and then sends the full memory area (up to 64kb) to the peer (client or server).

An attacker can therefore use the Heartbeat protocol on an application compiled with OpenSSL, in order to obtain sensitive information, such as keys stored in memory.
Full Vigil@nce bulletin... (Free trial)

This computer weakness impacts software or systems such as Tomcat, ARCserve Backup, ArubaOS, i-Suite, ProxyAV, ProxySG par Blue Coat, SGOS by Blue Coat, ASA, Cisco Catalyst, IOS XE Cisco, Prime Infrastructure, Cisco PRSM, Cisco Router, Cisco CUCM, Cisco IP Phone, Unity Cisco, XenDesktop, Clearswift Email Gateway, Clearswift Web Gateway, Debian, ECC, PowerPath, ArcGIS ArcView, ArcGIS for Desktop, ArcGIS for Server, Black Diamond, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiClient, FortiGate, FortiGate Virtual Appliance, FortiOS, FreeBSD, HP Diagnostics, LoadRunner, Performance Center, AIX, WebSphere MQ, IVE OS, Juniper J-Series, Junos OS, Junos Pulse, Juniper Network Connect, Juniper SA, Juniper UAC, LibreOffice, McAfee Email Gateway, ePO, GroupShield, McAfee NGFW, VirusScan, McAfee Web Gateway, Windows 8, Windows RT, MySQL Enterprise, NetBSD, OpenBSD, OpenSSL, openSUSE, Opera, Solaris, pfSense, HDX, RealPresence Collaboration Server, Polycom VBP, Puppet, RHEL, RSA Authentication Manager, SIMATIC, Slackware, Sophos AV, Splunk Enterprise, Stonesoft NGFW/VPN, stunnel, ASE, OfficeScan, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, VMware Player, vCenter Server, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation, Websense Email Security, Websense Web Filter, Websense Web Security.

Our Vigil@nce team determined that the severity of this vulnerability note is important.

The trust level is of type confirmed by the editor, with an origin of internet client.

This bulletin is about 2 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a beginner ability can exploit this cybersecurity threat.

Solutions for this threat

OpenSSL: version 1.0.1g.
The version 1.0.1g is fixed:
  http://www.openssl.org/

OpenSSL: advise for Heartbeat.
Administrators are advised to change passwords, and to regenerate SSL keys, because they may have been stolen (there is no way to know).

OpenSSL: patch for Heartbeat.
A patch is available in information sources.

OpenSSL: workaround for Heartbeat.
A workaround is to recompile OpenSSL with "-DOPENSSL_NO_HEARTBEATS".

Apache Tomcat Native: version 1.1.30.
The version 1.1.30 is fixed:
  http://tomcat.apache.org/native-doc/

LibreOffice: version 4.2.3.
The version 4.2.3 is fixed:
  http://www.libreoffice.org/download/

OpenVPN Access Server: version 2.0.6.
The version 2.0.6 is fixed:
  https://openvpn.net/

Opera: version 12.17.
The version 12.17 is fixed:
  http://www.opera.com/

pfSense: version 2.1.2.
The version 2.1.2 is fixed:
  http://www.pfsense.org/

Splunk: version 6.0.3.
The version 6.0.3 is fixed:
  http://www.splunk.com/download

stunnel: version 5.01.
The version 5.01 is fixed:
  https://www.stunnel.org/downloads.html

AIX: OpenSSL version 1.0.1.502.
The version 1.0.1.502 is fixed:
  https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=aixbp&lang=en_US&S_PKG=openssl&cp=UTF-8

ArubaOS: versions 6.3.1.5 and 6.4.0.3.
Versions 6.3.1.5 and 6.4.0.3 are fixed:
  http://support.arubanetworks.com

Bee Ware i-Suite: solution for OpenSSL Heartbeat.
A solution is available:
  http://documentation.bee-ware.net/display/SECU/CVE-2014-0160+-+OpenSSL+Heartbleed+Bug
  https://my.bee-ware.net/

Blue Coat: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

CA ARCserve: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Cisco: workaround for OpenSSL Heartbeat.
A workaround is indicated in the information source.

Citrix XenDesktop 7.5 Virtual Desktop Agents: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Clearswift SECURE Email Gateway: version 3.7.3.
The version 3.7.3 is fixed:
  http://www.clearswift.com/

Clearswift SECURE Web Gateway: version 3.1.3.
The version 3.1.3 is fixed:
  http://www.clearswift.com/

Debian: new openssl packages.
New packages are available:
  Debian 7: openssl 1.0.1e-2+deb7u5

EMC ControlCenter: solution for OpenSSL Heartbleed.
The solution is indicated in information sources.

EMC PowerPath: solution for OpenSSL Heartbleed.
The solution is indicated in information sources.

ESRI ArcGIS for Server: patch for OpenSSL Heartbeat.
A patch is available:
  http://support.esri.com/en/downloads/patches-servicepacks/view/productid/66/metaid/2088

Extreme Networks Black Diamond, Summit: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

F5 BIG-IP: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Fedora: new mingw-openssl packages.
New packages are available:
  Fedora 19: mingw-openssl 1.0.1e-6.fc19
  Fedora 20: mingw-openssl 1.0.1e-6.fc20

Fedora: new openssl packages.
New packages are available:
  Fedora 19: openssl 1.0.1e-37.fc19.1
  Fedora 20: openssl 1.0.1e-37.fc20.1
  openssl 1.0.1e-37.fc19.1
  openssl 1.0.1e-37.fc20.1

FortiGate, FortiClient: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Fortinet FortiClient: version 5.0.9.
The version 5.0.9 is fixed:
  http://docs.fortinet.com/d/forticlient-windows-5.0.9-release-notes

FreeBSD: patch for OpenSSL.
A patch is available:
  http://security.FreeBSD.org/patches/SA-14:06/openssl.patch
  http://security.FreeBSD.org/patches/SA-14:06/openssl-10.patch

HP Diagnostics: patch for OpenSSL Heartbeat.
The Diagnostics 9.23 IP #2 patch is available.

HP LoadRunner, Performance Center: patch for OpenSSL Heartbeat.
A patch is available in information sources.

Ipswitch WS_FTP Server: version 7.6.3.
The version 7.6.3 is fixed:
  http://www.ipswitchft.com/ws-ftp-server/

Juniper: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Mandriva BS2: new openssl packages.
New packages are available:
  Mandriva BS2: openssl 1.0.1m-1.mbs2

Mandriva BS: new tor packages.
New packages are available:
  Mandriva BS1: tor 0.2.4.22-1.mbs1

McAfee: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

MySQL Enterprise: version 5.6.18.
The version 5.6.18 is fixed:
  http://www.mysql.com/

NetBSD: solution for OpenSSL.
The solution is indicated in information sources.

NetBSD: version 6.0.5.
The version 6.0.5 is fixed:
  http://www.netbsd.org/

NetBSD: version 6.1.4.
The version 6.1.4 is fixed:
  http://www.netbsd.org/

OpenBSD: patch for OpenSSL.
A patch is available:
  http://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/014_openssl.patch
  http://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/007_openssl.patch
  http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/002_openssl.patch.sig

openSUSE: new openssl packages.
New packages are available:
  openSUSE 12.3: openssl 1.0.1e-1.44.1
  openSUSE 13.1: openssl 1.0.1e-11.32.1

openSUSE: new tor packages.
New packages are available:
  openSUSE 12.3: tor 0.2.4.22-2.8.1
  openSUSE 13.1: tor 0.2.4.22-5.8.1

Polycom: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Puppet Enterprise: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Red Hat Enterprise Virtualization Hypervisor 3.2: new rhev-hypervisor6 packages.
New packages are available:
  RHEL 6: rhev-hypervisor6 6.5-20140118.1.3.2.el6_5

Red Hat Enterprise Virtualization: new rhevm-spice-client packages.
New packages are available:
  RHEL 6: rhevm-spice-client x64-cab-3.3-12.el6_5

Red Hat Storage Server 2.1: new openssl packages.
New packages are available:
  RHEL 6: openssl 1.0.1e-16.el6_5.7

RHEL 6.5: new openssl packages.
New packages are available:
  RHEL 6: openssl 1.0.1e-16.el6_5.7

RHEL 6: new rhev-hypervisor6 packages.
New packages are available:
  RHEL 6: rhev-hypervisor6 6.5-20140407.0.el6ev

RSA Authentication Manager: solution for OpenSSL Heartbleed.
The solution is indicated in information sources.

Siemens: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Slackware: new openssl packages.
New packages are available:
  Slackware 14.0: openssl 1.0.1g-i486-1_slack14.0, openssl-solibs 1.0.1g-i486-1_slack14.0
  Slackware 14.1: openssl 1.0.1g-i486-1_slack14.1, openssl-solibs 1.0.1g-i486-1_slack14.1

Solaris 11.2: patch for OpenSSL.
A patch is available:
  https://updates.oracle.com/download/19298012.html

Sophos Anti-Virus for VMware vShield: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Sybase: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Trend Micro OfficeScan: Critical Patch 1044.
A patch is available:
  http://downloadcenter.trendmicro.com/index.php?regs=NABU&clk=latest&clkval=4554&lang_loc=1

Ubuntu: new libssl1.0.0 packages.
New packages are available:
  Ubuntu 13.10: libssl1.0.0 1.0.1e-3ubuntu1.2
  Ubuntu 12.10: libssl1.0.0 1.0.1c-3ubuntu2.7
  Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.12

VMware ESXi 5.5: patch ESXi550-201404401.
A patch is available:
  https://www.vmware.com/patchmgr/download.portal

VMware ESXi 5.5: patch ESXi550-201404420.
A patch is available:
  https://www.vmware.com/patchmgr/download.portal

VMware Player: version 6.0.2.
The version 6.0.2 is fixed:
  https://www.vmware.com/go/downloadplayer

VMware: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.
The following solutions are also available:
  VIGILANCE-SOL-34346 : VMware ESXi : patch ESXi550-201404401
  VIGILANCE-SOL-34345 : VMware ESXi : patch ESXi550-201404420
  VIGILANCE-SOL-34326 : VMware Player : version 6.0.2
  VIGILANCE-SOL-34343 : VMware vCenter : version 5.5.0c
  VIGILANCE-SOL-34344 : VMware vCenter : version 5.5 Update 1a
  VIGILANCE-SOL-34327 : VMware Workstation : version 10.0.2

VMware vCenter: version 5.5.0c.
The version 5.5.0c is fixed:
  https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/5_5

VMware vCenter: version 5.5 Update 1a.
The version 5.5 Update 1a is fixed:
  https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/5_5

VMware Workstation: version 10.0.2.
The version 10.0.2 is fixed:
  https://www.vmware.com/go/downloadworkstation

Websense: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

WebSphere MQ: solution for OpenSSL Heartbeat.
The solution is indicated in information sources.

Windows In-Box Junos Pulse Client: patch.
A patch is available:
  https://support.microsoft.com/kb/2962393
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides software vulnerability alerts. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.