UPDATE Vulnerability in SSLv3 affects AIX

0
906
IBM SECURITY ADVISORY

First Issued: Wed Jun 17 09:52:06 CDT 2015
|Updated: Fri Jun 26 15:52:00 CDT 2015
|Update: Added clarification that the sendmail fixes only apply when
|using the SSL-enabled sendmail binary, /usr/sbin/sendmail_ssl


The most recent version of this document is available here:

http://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc
https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc
ftp://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc

 
Security Bulletin: Vulnerability in SSLv3 affects ftpd, sendmail, imapd, 
 and popd on AIX (CVE-2014-3566)


===============================================================================

SUMMARY:

    SSLv3 contains a vulnerability that has been referred to as the Padding
    Oracle On Downgraded Legacy Encryption (POODLE) attack.  SSLv3 is enabled
|   in ftpd, sendmail when using the sendmail_ssl binary, imapd, and popd on
    AIX.


===============================================================================

VULNERABILITY DETAILS:

    CVEID: CVE-2014-3566
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566


    DESCRIPTION:

        Product could allow a remote attacker to obtain sensitive information,
        caused by a design error when using the SSLv3 protocol. A remote user
        with the ability to conduct a man-in-the-middle attack could exploit
        this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy
        Encryption) attack to decrypt SSL sessions and access the plaintext
        of encrypted connections.


    CVSS:
 
        CVSS Base Score: 4.3
        CVSS Temporal Score: See 
        http://xforce.iss.net/xforce/xfdb/97013 for the current score. 
        CVSS Environmental Score*: Undefined
        CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)


    AFFECTED PRODUCTS AND VERSIONS:
 
        AIX 6.1, 7.1
        VIOS 2.2.x

        The following fileset levels are vulnerable:
 
        AIX Fileset        Lower Level Upper Level KEY
        --------------------------------------------------------
        bos.net.tcp.client 6.1.0.0     6.1.8.19    key_w_fs
        bos.net.tcp.client 6.1.0.0     6.1.9.48    key_w_fs
        bos.net.tcp.client 7.1.0.0     7.1.2.19    key_w_fs
        bos.net.tcp.client 7.1.0.0     7.1.3.48    key_w_fs

        bos.net.tcp.server 6.1.0.0     6.1.8.18    key_w_fs
        bos.net.tcp.server 6.1.0.0     6.1.9.45    key_w_fs
        bos.net.tcp.server 7.1.0.0     7.1.2.18    key_w_fs
        bos.net.tcp.server 7.1.0.0     7.1.3.45    key_w_fs

        AIX Fileset (VIOS)  Lower Level           Upper Level
        ------------------------------------------------------------
        bos.net.tcp.client  6.1.0.0(2.2.0.0)      6.1.8.19(2.2.2.6)
        bos.net.tcp.client  6.1.0.0(2.2.0.0)      6.1.9.48(2.2.3.50)

        bos.net.tcp.server  6.1.0.0(2.2.0.0)      6.1.8.18(2.2.2.6)
        bos.net.tcp.server  6.1.0.0(2.2.0.0)      6.1.9.45(2.2.3.50)


        Note:  to find out whether the affected filesets are installed 
        on your systems, refer to the lslpp command found in AIX user's guide.

        Example:  lslpp -L | grep -i bos.net.tcp.client 


    REMEDIATION:
        
        A. APARS
            
            IBM has assigned the following APARs to this problem:

            For ftpd:

            AIX Level APAR     Availability  SP   KEY
            ---------------------------------------------------
            6.1.8     IV69768  9/30/15       SP7  key_w_apar
            6.1.9     IV73324  12/04/15      SP6  key_w_apar
            7.1.2     IV73319  9/30/15       SP7  key_w_apar
            7.1.3     IV73316  2/26/16       SP6  key_w_apar

            Subscribe to the APARs here:

            http://www.ibm.com/support/docview.wss?uid=isg1IV69768
            http://www.ibm.com/support/docview.wss?uid=isg1IV73324
            http://www.ibm.com/support/docview.wss?uid=isg1IV73319
            http://www.ibm.com/support/docview.wss?uid=isg1IV73316

            For sendmail:
|           Please note that these only apply to the SSL-enabled
|           sendmail binary, /usr/sbin/sendmail_ssl.  The default
|           sendmail binary, /usr/sbin/sendmail, does not use SSL and
|           is therefore not vulnerable to POODLE.

            AIX Level APAR     Availability  SP   KEY
            ---------------------------------------------------
            6.1.8     IV73416  9/30/15       SP7  key_w_apar
            6.1.9     IV73417  12/04/15      SP6  key_w_apar
            7.1.2     IV73418  9/30/15       SP7  key_w_apar
            7.1.3     IV73419  2/26/16       SP6  key_w_apar

            Subscribe to the APARs here:

            http://www.ibm.com/support/docview.wss?uid=isg1IV73416
            http://www.ibm.com/support/docview.wss?uid=isg1IV73417
            http://www.ibm.com/support/docview.wss?uid=isg1IV73418
            http://www.ibm.com/support/docview.wss?uid=isg1IV73419

            For imapd and popd:

            AIX Level APAR     Availability  SP   KEY
            ---------------------------------------------------
            6.1.8     IV73973  9/30/15       SP7  key_w_apar
            6.1.9     IV73976  12/04/15      SP6  key_w_apar
            7.1.2     IV73974  9/30/15       SP7  key_w_apar
            7.1.3     IV73975  2/26/16       SP6  key_w_apar

            Subscribe to the APARs here:

            http://www.ibm.com/support/docview.wss?uid=isg1IV73973
            http://www.ibm.com/support/docview.wss?uid=isg1IV73976
            http://www.ibm.com/support/docview.wss?uid=isg1IV73974
            http://www.ibm.com/support/docview.wss?uid=isg1IV73975

            By subscribing, you will receive periodic email alerting you
            to the status of the APAR, and a link to download the fix once
            it becomes available.

        B. FIXES

            Fixes are available.  The fixes can be downloaded via ftp or
            http from:

            ftp://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar
            http://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar
            https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar 

            The link above is to a tar file containing this signed
            advisory, fix packages, and OpenSSL signatures for each package.
            The fixes below include prerequisite checking. This will
            enforce the correct mapping between the fixes and AIX
            Technology Levels.

            For ftpd:

            AIX Level  Interim Fix (*.Z)         KEY
            ------------------------------------------------
            6.1.8.6    IV69768s6a.150515.epkg.Z  key_w_fix
            6.1.9.5    IV73324s5a.150515.epkg.Z  key_w_fix
            7.1.2.6    IV73319s6a.150515.epkg.Z  key_w_fix
            7.1.3.5    IV73316s5a.150515.epkg.Z  key_w_fix

            For sendmail:
|           Please note that these only apply to the SSL-enabled
|           sendmail binary, /usr/sbin/sendmail_ssl.  The default
|           sendmail binary, /usr/sbin/sendmail, does not use SSL and
|           is therefore not vulnerable to POODLE.

            AIX Level  Interim Fix (*.Z)         KEY
            ------------------------------------------------
            6.1.8.6    IV73416s6a.150520.epkg.Z  key_w_fix
            6.1.9.5    IV73417s5a.150520.epkg.Z  key_w_fix
            7.1.2.6    IV73418s6a.150520.epkg.Z  key_w_fix
            7.1.3.5    IV73419s5a.150520.epkg.Z  key_w_fix

            For imapd and popd:
            
            AIX Level  Interim Fix (*.Z)         KEY
            ------------------------------------------------
            6.1.8.6    IV73973s6a.150609.epkg.Z  key_w_fix
            6.1.9.5    IV73976s5a.150609.epkg.Z  key_w_fix
            7.1.2.6    IV73974s6b.150610.epkg.Z  key_w_fix
            7.1.3.5    IV73975s5a.150619.epkg.Z  key_w_fix

            To extract the fixes from the tar file:

            tar xvf nettcp_fix.tar
            cd nettcp_fix

            Verify you have retrieved the fixes intact:

            The checksums below were generated using the
            "openssl dgst -sha256 file" command as the followng:

            For ftpd:
    
            openssl dgst -sha256                                              
            filename                 KEY
            ----------------------------------------------------------------
            -------------------------------------
            e7abdef186219eb2b039cc19746a1914725b2018d6ff9558bd43df3fa18514fa  
            IV69768s6a.150515.epkg.Z key_w_csum
            9f608ce43a1d828d3414f9c02fc41358d0e9ae4dcbac4d7f549d7cc9b5a7afb4  
            IV73324s5a.150515.epkg.Z key_w_csum
            89a73255f06eb6bffeb5884bfce3b1a3b97b1e4d477affb7b92c4c8a9196de75  
            IV73319s6a.150515.epkg.Z key_w_csum
            4ad25780e666538604e490494d7c5b6c48b9ed71c72d9f54cecd749480851c59  
            IV73316s5a.150515.epkg.Z key_w_csum 

            For sendmail:

            openssl dgst -sha256                                              
            filename                 KEY
            ----------------------------------------------------------------
            -------------------------------------
            7083ce308673424836224cadf6e021df35bf461b66a262c2691c043748242ee9  
            IV73416s6a.150520.epkg.Z key_w_csum
            638e54c7f0218f020370e261d4d4a68b355568dbf5119384c4a82c7d4b374832  
            IV73417s5a.150520.epkg.Z key_w_csum
            cd99a31c28acdc76d6a5c48b47c3c915cd7fd1c18b2cab1e356aed47fc7d2a97  
            IV73418s6a.150520.epkg.Z key_w_csum
            21f0b58c4a5bebb91c7f531ec3f8a301ba45b991cf1bd27fd323926d28b269e9  
            IV73419s5a.150520.epkg.Z key_w_csum

            For imapd and popd:

            openssl dgst -sha256                                              
            filename                 KEY
            ----------------------------------------------------------------
            -------------------------------------
            3e3e27c1b2b07b363423fba245047c6ddf2e94605d0d051e2d50b08bf74b2c23  
            IV73973s6a.150609.epkg.Z key_w_csum
            a4225da8f1fa4173e2a483dd656bdc2b5ac0fd8c68f4a1434eac05daeb1bdca9  
            IV73976s5a.150609.epkg.Z key_w_csum
            b2e11c499f66f09f3268626939b2037b3b6e949a2a80dc1f3551998a47d5815a  
            IV73974s6b.150610.epkg.Z key_w_csum
            b2160ee3496e57cae7d66c480bd8c2b965e37b43564731fd799a335c00a7d11b  
            IV73975s5a.150619.epkg.Z key_w_csum


            These sums should match exactly. The OpenSSL signatures in the tar
            file and on this advisory can also be used to verify the
            integrity of the fixes.  If the sums or signatures cannot be
            confirmed, contact IBM AIX Security at
            security-alert@austin.ibm.com and describe the discrepancy.
            
            openssl dgst -sha1 -verify  -signature
.sig 

            openssl dgst -sha1 -verify  -signature .sig


            Published advisory OpenSSL signature file location:
 
           
http://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc.sig
           
https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc.sig
           
ftp://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc.sig 

        C. FIX AND INTERIM FIX INSTALLATION

            IMPORTANT: If possible, it is recommended that a mksysb backup
            of the system be created.  Verify it is both bootable and
            readable before proceeding.

            To preview a fix installation:

            installp -a -d fix_name -p all  # where fix_name is the name of the
                                        # fix package being previewed.
            To install a fix package:

            installp -a -d fix_name -X all  # where fix_name is the name of the
                                        # fix package being installed.

            Interim fixes have had limited functional and regression
            testing but not the full regression testing that takes place
            for Service Packs; however, IBM does fully support them.

            Interim fix management documentation can be found at:

           
http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html

            To preview an interim fix installation:

            emgr -e ipkg_name -p         # where ipkg_name is the name of the
                                         # interim fix package being previewed.

            To install an interim fix package:

            emgr -e ipkg_name -X         # where ipkg_name is the name of the
                                         # interim fix package being installed.


    WORKAROUNDS AND MITIGATIONS:

        None.


===============================================================================

CONTACT US:

    If you would like to receive AIX Security Advisories via email,
    please visit "My Notifications":

        http://www.ibm.com/support/mynotifications

    To view previously issued advisories, please visit:

        http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq
 
    Comments regarding the content of this announcement can be
    directed to:

        security-alert@austin.ibm.com

    To obtain the OpenSSL public key that can be used to verify the
    signed advisories and ifixes:

        Download the key from our web page:

       
http://www.ibm.com/systems/resources/systems_p_os_aix_security_pubkey.txt

    To obtain the PGP public key that can be used to communicate
    securely with the AIX Security Team via security-alert@austin.ibm.com you
    can either:

        A. Download the key from our web page:

           
http://www.ibm.com/systems/resources/systems_p_os_aix_security_pgppubkey.txt

        B. Download the key from a PGP Public Key Server. The key ID is:

            0x28BFAA12

    Please contact your local IBM AIX support center for any
    assistance.


REFERENCES:
 
    Complete CVSS Guide:  http://www.first.org/cvss/cvss-guide.html
    On-line Calculator V2:  
    http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2


ACKNOWLEDGEMENTS:

    None.


CHANGE HISTORY:

    First Issued: Wed Jun 17 09:52:06 CDT 2015
    Updated: Thu Jun 18 09:48:23 CDT 2015
    Update: Corrected vulnerable 7.1.2 upper fileset levels
    Updated: Fri Jun 19 08:27:55 CDT 2015
    Update: New iFix IV73975s5a filename and checksum. iFix rebuilt with a new,
    corrected description on install but is functionally the same.
|   Updated: Fri Jun 26 15:52:00 CDT 2015
|   Update: Added clarification that the sendmail fixes only apply when
|   using the SSL-enabled sendmail binary, /usr/sbin/sendmail_ssl

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.