3rd party component upgrade required for security reasons: OpenSSL Security Advisory [22 Sept 2016]

Summary

The OpenSSL project released an advisory on Sept 22nd, 2016, describing 1 High, 1 Medium and 12 Low severity vulnerabilities, as listed below:



* OCSP Status Request extension unbounded memory growth (CVE-2016-6304)



* SSL_peek() hang on empty record (CVE-2016-6305)



* SWEET32 Mitigation (CVE-2016-2183)



* OOB write in MDC2_Update() (CVE-2016-6303)



* Malformed SHA512 ticket DoS (CVE-2016-6302)



* OOB write in BN_bn2dec() (CVE-2016-2182)



* OOB read in TS_OBJ_print_bio() (CVE-2016-2180)



* Pointer arithmetic undefined behaviour (CVE-2016-2177)



* Constant time flag not preserved in DSA signing (CVE-2016-2178)



* DTLS buffered message DoS (CVE-2016-2179)



* DTLS replay protection DoS (CVE-2016-2181)



* Certificate message OOB reads (CVE-2016-6306)



* Excessive allocation of memory in tls_get_message_header() (CVE-2016-6307)



* Excessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308)

Affected Products

FortiOS versions 5.4.1, 5.4.0, 5.2.9 and below are impacted by CVEs:
* 2016-2177
* 2016-2178
* 2016-2179
* 2016-2180
* 2016-2181
* 2016-2182
* 2016-2183
* 2016-6302
* 2016-6303
* 2016-6304
* 2016-6306
FortiAnalyzer versions 5.4.1, 5.4.0, 5.2.9 and below are impacted by CVEs:
* 2016-2177
* 2016-2178
* 2016-2179
* 2016-2181
* 2016-2182
* 2016-2183
* 2016-6302
* 2016-6303
* 2016-6304
* 2016-6305
* 2016-6306
* 2016-6307
* 2016-6308
FortSwitch versions 3.5.0 and below are impacted by CVEs:
* 2016-2177
* 2016-2179
* 2016-2180
* 2016-2181
* 2016-2182
* 2016-6302
* 2016-6303
* 2016-6304
* 2016-6305
* 2016-6306
* 2016-6307
* 2016-6308
FortiAP versions 5.4.1 and below are impacted by all CVEs included in the OpenSSL Advisory

Solutions

For FortiOS: Upgrade to firmware version 5.2.10 or 5.4.2 or 5.6.0
For FortiAnalyzer: Upgrade to firmware version 5.2.10 or 5.4.2 or 5.6.0
For FortiSwitch: Upgrade to firmware version 3.5.1
For FortiAP: Upgrade to firmware version 5.4.2