Lucene search

K
symantecSymantec Security ResponseSMNTC-1364
HistoryMay 12, 2016 - 8:00 a.m.

Symantec Messaging Gateway 10.6.x ACE Library Static Link to Vulnerable SSL Version

2016-05-1208:00:00
Symantec Security Response
68

EPSS

0.974

Percentile

99.9%

SUMMARY

Symantec Messaging Gateway (SMG) Appliance 10.6.x management console was susceptible to potential unauthorized loss of privileged information due to an inadvertent static link of an updated component library to a version of SSL susceptible to the Heartbleed vulnerability (CVE-2014-0160) .

AFFECTED PRODUCTS

Symantec Messaging Gateway Appliance


CVE

|

Affected Version(s)

|

Remediation

CVE-2014-0160

|

10.6.0, 10.6.1

|

Update to SMG Appliance maintenance patch 10.6.1-3

ISSUES

CVE-2014-0160


Severity/CVSSv3:

|

Medium / 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

References:

Impact:

|

Securityfocus: BID 66690 / NVD: CVE-2014-0160

Static Link to SSL Version Vulnerable to Heartbleed

Description:

|

Symantec became aware of a recently updated ACE library shipped in SMG 10.6.x that was statically linked inadvertently to a version of SSL susceptible to CVE-2014-0160, Heartbleed vice dynamically linked to the non-vulnerable SSL version in the shipping OS of the Appliance.

The susceptible port, is a privileged/protected non-standard port that is not exposed external to the authorized network. This default configuration should restrict exposure to an internal-only malicious user. The affected data channel is used to store email logs for reporting purposes but doesn't not contain complete email bodies in the logs. However, a non-privileged but authorized user who could successfully exploit this issue, could potential retrieve unauthorized information from these logs for further malicious attempts.

MITIGATION

Symantec Response
Symantec product engineers have addressed these issues in SMG Appliance maintenance release 10.6.1-3. Customers should update to the latest maintenance release as soon as possible to address this issue.

Symantec is not aware of exploitation or adverse customer impact from this issue.

Update Information

Symantec Mail Gateway Appliance maintenance release 10.6.1-3 is available through the software update facility.

Best Practices

As part of normal best practices, Symantec strongly recommends the following:

  • Restrict access to administrative or management systems to authorized privileged users.

  • Restrict remote access, if required, to trusted/authorized systems only.

  • Run under the principle of least privilege where possible to limit the impact of potential exploit.

  • Keep all operating systems and applications current with vendor patches.

  • Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection to both inbound and outbound threats.

  • Deploy network- and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.