• Support
  • Forums
  • Blogs

Security Advisory, AlienVault v4.10.0 addresses several vulnerabilities

jhansenjhansen

AlienVault Employee
+10
Several vulnerabilities were discovered that have been confirmed and fixed in AlienVault v4.10.0 release. Due to the severity of these vulnerabilities, AlienVault encourages customers to upgrade immediately to v4.10.0.

Debian Security Update (DSA-2950-1)
------------------------------------------------------------------------------------------------
Description: Several vulnerabilities were discovered in the OpenSSL package on the AlienVault appliance. These vulnerabilities allow execution of arbitrary code, denial of service, and potential Man-in-the-Middle attacks.
AlienVault IDs: ENG-95946, ENG-95808, ENG-95948, ENG-95949
Affected Products: AlienVault 4.9.0 and lower
  • CVE-2014-0195, A buffer overflow in processing DTLS fragments could lead to the execution of arbitrary code or denial of service.
  • CVE-2014-0224, carefully crafted handshakes can force the use of weak keys, resulting in potential man-in-the-middle attacks.
  • CVE-2014-0221, processing of DTLS hello packets is susceptible to denial of service.
  • CVE-2014-3470, implementation of anonymous ECDH ciphersuites is suspectible to denial of service.
OpenSSL has been updated to eliminate these vulnerabilities. See here for more information from Debian.

Debian Security Update (DSA-2931-1)
------------------------------------------------------------------------------------------------
AlienVault ID: ENG-95947
Description: Incorrect memory handling in OpenSSL's do_ssl3_write() function could result in denial of service.
CVE ID: CVE-2014-0198
Affected Products: AlienVault 4.9.0 and lower

Debian Security Update (DSA-2931-1)
------------------------------------------------------------------------------------------------
Description: Multiple vulnerabilities were discovered in the OpenSSL package on the AlienVault appliance. The following Common Vulnerabilities and Exposures project ids identify them:
  • CVE-2010-5298, A read buffer can be freed even when it still contains data that is used later on, leading to a use-after-free. Given a race condition in a multi-threaded application it may permit an attacker to inject data from one connection into another or cause denial of service.
  • CVE-2014-0076, ECDSA nonces can be recovered through the Yarom/Benger FLUSH+RELOAD cache side-channel attack.
    Affected Products: AlienVault 4.9.0 and lower



Share post:

This discussion has been closed.