The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL: information disclosure via rsaz_1024_mul_avx2

Synthesis of the vulnerability 

An attacker can bypass access restrictions to data via rsaz_1024_mul_avx2() of OpenSSL, in order to obtain sensitive information.
Vulnerable systems: ProxySG par Blue Coat, SGOS by Blue Coat, ProxySG by Symantec, SGOS by Symantec, Debian, Unisphere EMC, Fedora, FreeBSD, hMailServer, DB2 UDB, QRadar SIEM, Tivoli Storage Manager, Juniper J-Series, Junos OS, NSM Central Manager, NSMXpress, SRX-Series, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle Internet Directory, Solaris, Tuxedo, Oracle Virtual Directory, VirtualBox, WebLogic, Percona Server, pfSense, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu, WinSCP, X2GoClient.
Severity of this threat: 1/4.
Creation date: 07/12/2017.
Références of this weakness: 2014324, bulletinapr2018, bulletinjan2018, CERTFR-2017-AVI-452, CERTFR-2018-AVI-155, cpuapr2018, cpuapr2019, cpujan2018, cpujan2019, cpujul2018, cpujul2019, cpuoct2018, CVE-2017-3738, DSA-2020-062, DSA-4065-1, DSA-4157-1, FEDORA-2017-e6be32cb7a, FreeBSD-SA-17:12.openssl, ibm10716907, ibm10717405, ibm10717409, ibm10719113, JSA10851, openSUSE-SU-2017:3345-1, openSUSE-SU-2018:0029-1, openSUSE-SU-2018:0315-1, RHSA-2018:0998-01, SA159, SSA:2017-342-01, SUSE-SU-2019:14246-1, swg21647054, USN-3512-1, VIGILANCE-VUL-24698.

Description of the vulnerability 

An attacker can bypass access restrictions to data via rsaz_1024_mul_avx2() of OpenSSL, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer weakness impacts software or systems such as ProxySG par Blue Coat, SGOS by Blue Coat, ProxySG by Symantec, SGOS by Symantec, Debian, Unisphere EMC, Fedora, FreeBSD, hMailServer, DB2 UDB, QRadar SIEM, Tivoli Storage Manager, Juniper J-Series, Junos OS, NSM Central Manager, NSMXpress, SRX-Series, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle Internet Directory, Solaris, Tuxedo, Oracle Virtual Directory, VirtualBox, WebLogic, Percona Server, pfSense, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu, WinSCP, X2GoClient.

Our Vigil@nce team determined that the severity of this vulnerability note is low.

The trust level is of type confirmed by the editor, with an origin of intranet client.

An attacker with a expert ability can exploit this cybersecurity threat.

Solutions for this threat 

OpenSSL: version 1.0.2n.
The version 1.0.2n is fixed:
  https://www.openssl.org/

OpenSSL: version 1.1.0h.
The version 1.1.0h is fixed:
  https://www.openssl.org/

Debian 8/9: new openssl packages.
New packages are available:
  Debian 8: openssl 1.0.1t-1+deb8u8
  Debian 9: openssl 1.1.0f-3+deb9u2

Debian 9: new openssl1.0 packages.
New packages are available:
  Debian 9: openssl1.0 1.0.2l-2+deb9u2

Dell EMC Unisphere for PowerMax: solution.
The solution is indicated in information sources.

Fedora 27: new nodejs packages.
New packages are available:
  Fedora 27: nodejs 8.9.3-2.fc27

FreeBSD: patch for OpenSSL.
A patch is available:
  https://security.FreeBSD.org/patches/SA-17:12/openssl-10.patch
  https://security.FreeBSD.org/patches/SA-17:12/openssl-11.patch

hMailServer: version 5.6.7.
The version 5.6.7 is fixed:
  https://www.hmailserver.com/download_getfile/?performdownload=1&downloadid=262

IBM DB2: solution for OpenSSL.
The solution is indicated in information sources.

IBM DB2: version 10.5 Fix Pack 10.
The version 10.5 Fix Pack 10 is fixed:
  http://www-01.ibm.com/support/docview.wss?uid=swg24045012

IBM QRadar SIEM: patch for OpenSSL.
A patch is indicated in information sources.

IBM Spectrum Protect: solution for OpenSSL.
The solution is indicated in information sources.

IBM Tivoli Storage Manager: patch for OpenSSL.
A patch is indicated in information sources.

Junos, NSM: solution for OpenSSL.
The solution is indicated in information sources.

MariaDB: version 10.0.34.
The version 10.0.34 is fixed:
  https://mariadb.com/downloads/mariadb-tx

MySQL: version 5.5.59.
The version 5.5.59 is fixed:
  https://support.oracle.com/rs?type=doc&id=2336646.1
  https://dev.mysql.com/downloads/mysql/

MySQL: version 5.6.39.
The version 5.6.39 is fixed:
  https://support.oracle.com/rs?type=doc&id=2336646.1
  https://dev.mysql.com/downloads/mysql/

MySQL: version 5.7.21.
The version 5.7.21 is fixed:
  https://support.oracle.com/rs?type=doc&id=2336646.1
  https://dev.mysql.com/downloads/mysql/

Node Core: version 4.8.7.
The version 4.8.7 is fixed:
  https://nodejs.org/

Node Core: version 6.12.2.
The version 6.12.2 is fixed:
  https://nodejs.org/

Node Core: version 8.9.3.
The version 8.9.3 is fixed:
  https://nodejs.org/

Node Core: version 9.2.1.
The version 9.2.1 is fixed:
  https://nodejs.org/

openSUSE Leap: new nodejs4 packages.
New packages are available:
  openSUSE Leap 42.2: nodejs4 4.8.7-5.9.1
  openSUSE Leap 42.3: nodejs4 4.8.7-11.1

openSUSE Leap: new nodejs6 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs6 6.12.2-6.1

openSUSE Leap: new openssl packages.
New packages are available:
  openSUSE Leap 42.2: openssl 1.0.2j-6.9.1
  openSUSE Leap 42.3: openssl 1.0.2j-16.1

Oracle Communications: CPU of April 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2518758.1
  https://support.oracle.com/rs?type=doc&id=2518763.1
  https://support.oracle.com/rs?type=doc&id=2522151.1
  https://support.oracle.com/rs?type=doc&id=2519787.1
  https://support.oracle.com/rs?type=doc&id=2522126.1
  https://support.oracle.com/rs?type=doc&id=2522123.1
  https://support.oracle.com/rs?type=doc&id=2518753.1
  https://support.oracle.com/rs?type=doc&id=2522121.1
  https://support.oracle.com/rs?type=doc&id=2528862.1
  https://support.oracle.com/rs?type=doc&id=2518754.1

Oracle Communications: CPU of January 2019.
A Critical Patch Update is available:
  https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Oracle Communications: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2559239.1
  https://support.oracle.com/rs?type=doc&id=2563691.1
  https://support.oracle.com/rs?type=doc&id=2559240.1
  https://support.oracle.com/rs?type=doc&id=2559722.1
  https://support.oracle.com/rs?type=doc&id=2559225.1
  https://support.oracle.com/rs?type=doc&id=2559721.1
  https://support.oracle.com/rs?type=doc&id=2559256.1
  https://support.oracle.com/rs?type=doc&id=2559242.1
  https://support.oracle.com/rs?type=doc&id=2559243.1
  https://support.oracle.com/rs?type=doc&id=2559648.1

Oracle Fusion Middleware: CPU of April 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2353306.1

Oracle Fusion Middleware: CPU of July 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2394520.1

Oracle Fusion Middleware: CPU of Octobre 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2433477.1

Oracle MySQL: version 5.5.60.
The version 5.5.60 is fixed:
  https://support.oracle.com/rs?type=doc&id=2375344.1
  https://dev.mysql.com/downloads/mysql/

Oracle MySQL: version 5.5.61.
The version 5.5.61 is fixed:
  https://support.oracle.com/rs?type=doc&id=2417138.1
  https://dev.mysql.com/downloads/mysql/

Oracle MySQL: version 5.6.40.
The version 5.6.40 is fixed:
  https://support.oracle.com/rs?type=doc&id=2375344.1
  https://dev.mysql.com/downloads/mysql/

Oracle MySQL: version 5.6.41.
The version 5.6.41 is fixed:
  https://support.oracle.com/rs?type=doc&id=2417138.1
  https://dev.mysql.com/downloads/mysql/

Oracle MySQL: version 5.7.22.
The version 5.7.22 is fixed:
  https://support.oracle.com/rs?type=doc&id=2375344.1
  https://dev.mysql.com/downloads/mysql/

Oracle MySQL: version 5.7.23.
The version 5.7.23 is fixed:
  https://support.oracle.com/rs?type=doc&id=2417138.1
  https://dev.mysql.com/downloads/mysql/

Oracle MySQL: version 8.0.12.
The version 8.0.12 is fixed:
  https://support.oracle.com/rs?type=doc&id=2417138.1
  https://dev.mysql.com/downloads/mysql/

Oracle Solaris: patch for third party software of April 2018 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Oracle Solaris: patch for third party software of April 2018 v2.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Oracle Solaris: patch for third party software of January 2018 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Oracle VM VirtualBox: version 5.1.36.
The version 5.1.36 is fixed:
  https://www.virtualbox.org/

Oracle VM VirtualBox: version 5.2.10.
The version 5.2.10 is fixed:
  https://www.virtualbox.org/

Percona Server for MySQL: version 5.5.59-38.11.
The version 5.5.59-38.11 is fixed:
  https://www.percona.com/

Percona Server for MySQL: version 5.5.60-38.12.
The version 5.5.60-38.12 is fixed:
  https://www.percona.com/

Percona Server: version 5.7.22-22.
The version 5.7.22-22 is fixed:
  https://www.percona.com/doc/percona-server/5.7/installation.html

Percona XtraDB Cluster: version 5.7.22-29.26.
The version 5.7.22-29.26 is fixed:
  http://www.percona.com/downloads/Percona-XtraDB-Cluster-57/

pfSense: version 2.3.5-p1.
The version 2.3.5-p1 is fixed:
  https://www.pfsense.org/download/

pfSense: version 2.4.2-p1.
The version 2.4.2-p1 is fixed:
  https://www.pfsense.org/download/

ProxySG: solution for OpenSSL.
The solution is indicated in information sources.

RHEL 7: new openssl packages.
New packages are available:
  RHEL 7: openssl 1.0.2k-12.el7

Slackware: new openssl packages.
New packages are available:
  Slackware 13.0: openssl 0.9.8zh-*-2_slack13.0
  Slackware 13.1: openssl 0.9.8zh-*-2_slack13.1
  Slackware 13.37: openssl 0.9.8zh-*-2_slack13.37
  Slackware 14.0: openssl 1.0.1u-*-1_slack14.0
  Slackware 14.1: openssl 1.0.1u-*-1_slack14.1
  Slackware 14.2: openssl 1.0.2n-*-1_slack14.2

SUSE LE 11 SP4: new MozillaFirefox packages (12/12/2019).
New packages are available:
  SUSE LE 11 SP4: MozillaFirefox 68.2.0-78.51.4

Synology DS/RS: version 6.1.4-15217-3.
The version 6.1.4-15217-3 is fixed:
  https://www.synology.com/

Ubuntu: new libssl1.0.0 packages.
New packages are available:
  Ubuntu 17.10: libssl1.0.0 1.0.2g-1ubuntu13.3
  Ubuntu 17.04: libssl1.0.0 1.0.2g-1ubuntu11.4
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.10

WinSCP: version 5.11.3.
The version 5.11.3 is fixed:
  https://sourceforge.net/p/winscp/

X2Go Client: version 4.1.2.0.
The version 4.1.2.0 is fixed:
  https://wiki.x2go.org/doku.php
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a cybersecurity note. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.