SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Encryption/VPN)  >   Citrix NetScaler Vendors:   Citrix
(Citrix Issues Fix for Citrix NetScaler) OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code
SecurityTracker Alert ID:  1036819
SecurityTracker URL:  http://securitytracker.com/id/1036819
CVE Reference:   CVE-2014-3508, CVE-2014-3509, CVE-2014-3511   (Links to External Site)
Date:  Sep 15 2016
Impact:   Denial of service via network, Disclosure of system information, Execution of arbitrary code via network, Modification of system information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in OpenSSL. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information. Citrix NetScaler is affected.

Applications using OpenSSL that print may leak some stack contents to the application [CVE-2014-3508]. The OpenSSL client and server are not affected. Ivan Fratric (Google) reported this vulnerability on June 19, 2014.


A remote server can send a specially crafted ec point format extension to the target multithreaded client via a resumed session to trigger a race condition in ssl_parse_serverhello_tlsext and write to freed memory [CVE-2014-3509]. Version 1.0.0 and 1.0.1 clients are affected. Gabor Tyukasz (LogMeIn Inc) reported this vulnerability on July 8, 2014.

A remote user can send specially crafted DTLS packets to trigger a double free memory error and deny service on the target system [CVE-2014-3505]. Adam Langley and Wan-Teh Chang (Google) reported this vulnerability on June 6, 2014.

A remote user can send specially crafted data to trigger a DTLS handshake processing flaw and consume excessive memory resources on the target system [CVE-2014-3506]. Adam Langley (Google) reported this vulnerability on June 6, 2014.

A remote user can send specially crafted zero-length DTLS fragments to trigger a memory leak [CVE-2014-3507]. Adam Langley (Google) reported this vulnerability on June 6, 2014.

A remote server can specify an anonymous EC(DH) ciphersuite to trigger a null pointer dereference in the target DTLS client and cause the client to crash [CVE-2014-3510]. Felix Grobert (Google) reported this vulnerability on July 18, 2014.

A remote user in a privileged network position can cause a target user's ClientHello message to be fragmented to trigger a flaw in the server code and force a downgrade to TLS 1.0 [CVE-2014-3511]. Version 1.0.1 is affected. David Benjamin and Adam Langley (Google) reported this vulnerability on July 21, 2014.

A remote user can send specially crafted SRP data to trigger a buffer overflow and potentially execute arbitrary code on the target system [CVE-2014-3512]. Version 1.0.1 is affected. Sean Devlin and Watson Ladd (Cryptography Services, NCC
Group) reported this vulnerability on July 31, 2014.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can cause denial of service conditions.

A user can obtain potentially sensitive information from the stack.

Solution:   Citrix has issued a fix for CVE-2014-3508, CVE-2014-3509, and CVE-2014-3511 for Citrix NetScaler for the Lights Out Management (LOM) component firmware.

A fix is available for the following NetScaler products:

NetScaler Application Delivery Controller (ADC)
NetScaler Gateway
NetScaler Service Delivery Appliance
CloudBridge (NetScaler SD-WAN)
Command Center Appliance
NetScaler T1 (formerly Citrix ByteMobile)

The Citrix advisory is available at:

http://support.citrix.com/article/CTX216642

Vendor URL:  support.citrix.com/article/CTX216642 (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, Resource error, State error

Message History:   This archive entry is a follow-up to the message listed below.
Aug 7 2014 OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC