Scopia Desktop V7.7.3: OpenSSL Multiple Remote Security Vulnerabilities on VC URL


Doc ID    SOLN255577
Version:    2.0
Status:    Published
Published date:    14 Oct 2016
Created Date:    29 Aug 2014
Author:   
Grace Jiang
 

Details

The qualysguard has scanned a high severity Vulnerabilities "OpenSSL Multiple Remote Security Vulnerabilities" in both UAT and Production SDS. (please see the attachment below)

Scopia Desktop 7.7.3

Scopia Management 8.0.1

Problem Clarification

         port 443/tcp over SSL

 
QID: 38602
Category: General remote services
Bugtraq ID: -
Service Modified: 06/06/2014
User Modified: -
Edited: No
PCI Vuln: Yes
 
THREAT:
The OpenSSL Project is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a general purpose cryptography library. OpenSSL contains the following vulnerabilities:
CVE-2014-0224: An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.
CVE-2014-0221: By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. Only applications using OpenSSL as a DTLS client are affected.
CVE-2014-0195: A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected.
CVE-2014-3470: OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack.
Affected Versions: OpenSSL 0.9.8 through 0.9.8za OpenSSL 1.0.0 through 1.0.0m. OpenSSL 1.0.1 through 1.0.1h.
IMPACT:
Depending on the vulnerability being exploited, an unauthenticated, remote attacker could conduct man-in-the-middle attacks, run arbitrary code or cause a denial of service condition on the targeted system.
 

Cause

 

*      Our b2bua SIP engine is using OpenSSL 0.9.8e.
*      When B2BUA service is disabled, OpenSSL is not used. So, for setups not require the SIP protocol, this is a simple protection option.

Solution

Upgrade Scopia Management from V8.0.3 to V8.3, R & D team suggested full upgrade to align iview, SDS, Pathfinder to 8.3. (Please kindly check the doc below, which name is Scopia Management V8 OpenSSL )

SDS v8.3 can resolve all the six vulnerabilities, (please find the attachment with the name "Scopia Desktop OpenSSL vulnerability")

 

Attachment Description

Scopia UAT

Attachment File

Scopia UAT.mht
855K • 3 minute(s) @ 56k, < 1 minute @ broadband


Attachment Description

Scopia Desktop 7.7.3

Attachment File

Attachment Description

Scopia Management V8 OpenSSL

Attachment File

Scopia Management V8 OpenSSL.DOCX
14K • < 1 minute @ 56k, < 1 minute @ broadband


Attachment Description

Scopia Desktop OpenSSL vulnerability

Attachment File

Scopia Desktop OpenSSL vulnerability.docx
15K • < 1 minute @ 56k, < 1 minute @ broadband


Additional Relevant Phrases

SDS OpenSSL vulnerability, SDS security vulnerability

Avaya -- Proprietary. Use pursuant to the terms of your signed agreement or Avaya policy