The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of TLS: information disclosure via ROBOT Attack

Synthesis of the vulnerability 

An attacker can bypass access restrictions to data via ROBOT Attack of TLS, in order to obtain sensitive information.
Impacted systems: Bouncy Castle JCE, Cisco ACE, BIG-IP Hardware, TMOS, Domino by IBM, Mule ESB, Java OpenJDK, Java Oracle, Palo Alto Firewall PA***, PAN-OS, RabbitMQ, Unix (platform) ~ not comprehensive.
Severity of this alert: 1/4.
Creation date: 13/12/2017.
Références of this alert: CERTFR-2017-ALE-020, cisco-sa-20171212-bleichenbacher, CSCvg74693, CTX230238, K21905460, KB0080545, PAN-SA-2017-0032, ROBOT Attack, VIGILANCE-VUL-24749, VU#144389.

Description of the vulnerability 

An attacker can bypass access restrictions to data via ROBOT Attack of TLS, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This security weakness impacts software or systems such as Bouncy Castle JCE, Cisco ACE, BIG-IP Hardware, TMOS, Domino by IBM, Mule ESB, Java OpenJDK, Java Oracle, Palo Alto Firewall PA***, PAN-OS, RabbitMQ, Unix (platform) ~ not comprehensive.

Our Vigil@nce team determined that the severity of this threat bulletin is low.

The trust level is of type confirmed by the editor, with an origin of internet client.

An attacker with a expert ability can exploit this threat.

Solutions for this threat 

Bouncy Castle: solution for ROBOT Attack.
The solution is indicated in information sources.

Bouncy Castle: version 1.59.
The version 1.59 is fixed:
  https://www.bouncycastle.org/latest_releases.html

Cisco ACE: solution CSCvg74693.
The solution is described on the Cisco site:
  https://tools.cisco.com/bugsearch/bug/CSCvg74693
  https://tools.cisco.com/quickview/bug/CSCvg74693

Citrix NetScaler: fixed versions for ROBOT Attack.
Fixed versions are indicated in information sources.

Erlang/OTP: versions 18.3.4.7, 19.3.6.4 and 20.1.7.
Versions 18.3.4.7, 19.3.6.4 and 20.1.7 are fixed:
  https://github.com/erlang/otp/releases

F5 BIG-IP: fixed versions for ROBOT Attack.
Fixed versions are indicated in information sources.

HCL Domino: patch for ROBOT Attack.
A patch is available:
  https://hclsoftware.flexnetoperations.com/flexnet/operationsportal/entitledDownloadFile.action?downloadPkgId=HCL_DominoServer_901

IcedTea6: version 1.10.10.
The version 1.10.10 is corrected:
  http://icedtea.classpath.org/download/source/icedtea6-1.10.10.tar.gz

IcedTea6: version 1.11.5.
The version 1.11.5 is corrected:
  http://icedtea.classpath.org/download/source/icedtea6-1.11.5.tar.gz

IcedTea: versions 2.1.3, 2.2.3 and 2.3.3.
Versions 2.1.3, 2.2.3 and 2.3.3 are corrected:
  http://icedtea.classpath.org/download/source/icedtea-2.1.3.tar.gz
  http://icedtea.classpath.org/download/source/icedtea-2.2.3.tar.gz
  http://icedtea.classpath.org/download/source/icedtea-2.3.3.tar.gz

Java JRE/JDK: version 1.4.2_40.
The version 1.4.2_40 is corrected:
  http://www.oracle.com/technetwork/java/javase/downloads/index.html
  http://www.oracle.com/technetwork/java/javase/documentation/overview-142120.html

Java JRE/JDK: version 5 Update 38.
The version 5 Update 38 is corrected:
  http://www.oracle.com/technetwork/java/javase/downloads/index.html
  http://www.oracle.com/technetwork/java/javase/documentation/overview-137139.html

Java JRE/JDK: version 6 Update 37.
The version 6 Update 37 is corrected:
  http://www.oracle.com/technetwork/java/javase/downloads/index.html

Java JRE/JDK: version 7 Update 9.
The version 7 Update 9 is corrected:
  http://www.oracle.com/technetwork/java/javase/downloads/index.html

Mule Runtime: version 3.9.1.
The version 3.9.1 is fixed:
  https://www.mulesoft.com/

Mule Runtime: version 4.1.2.
The version 4.1.2 is fixed:
  https://www.mulesoft.com/

PAN-OS: fixed versions for ROBOT Attack.
Fixed versions are indicated in information sources.

RabbitMQ: workaround for ROBOT.
A workaround is to upgrade Erlang/OTP to version 19.3.6.4 or 20.1.7.
(cf. VIGILANCE-SOL-56134)
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides software vulnerabilities bulletins. The technology watch team tracks security threats targeting the computer system.