PSIRT Advisories
OpenSSL Security Advisory [22 Sept 2016]
Summary
The OpenSSL project released an advisory on Sept 22nd, 2016, describing 1 High, 1 Medium and 12 Low severity vulnerabilities, as listed below:
- OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
- SSL_peek() hang on empty record (CVE-2016-6305)
- SWEET32 Mitigation (CVE-2016-2183)
- OOB write in MDC2_Update() (CVE-2016-6303)
- Malformed SHA512 ticket DoS (CVE-2016-6302)
- OOB write in BN_bn2dec() (CVE-2016-2182)
- OOB read in TS_OBJ_print_bio() (CVE-2016-2180)
- Pointer arithmetic undefined behaviour (CVE-2016-2177)
- Constant time flag not preserved in DSA signing (CVE-2016-2178)
- DTLS buffered message DoS (CVE-2016-2179)
- DTLS replay protection DoS (CVE-2016-2181)
- Certificate message OOB reads (CVE-2016-6306)
- Excessive allocation of memory in tls_get_message_header() (CVE-2016-6307)
- Excessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308)
Affected Products
FortiOS versions 5.4.1, 5.4.0, 5.2.9 and below are impacted by CVEs:
- 2016-2177
- 2016-2178
- 2016-2179
- 2016-2180
- 2016-2181
- 2016-2182
- 2016-2183
- 2016-6302
- 2016-6303
- 2016-6304
- 2016-6306
FortiAnalyzer versions 5.4.1, 5.4.0, 5.2.9 and below are impacted by CVEs:
- 2016-2177
- 2016-2178
- 2016-2179
- 2016-2181
- 2016-2182
- 2016-2183
- 2016-6302
- 2016-6303
- 2016-6304
- 2016-6305
- 2016-6306
- 2016-6307
- 2016-6308
FortSwitch versions 3.5.0 and below are impacted by CVEs:
- 2016-2177
- 2016-2179
- 2016-2180
- 2016-2181
- 2016-2182
- 2016-6302
- 2016-6303
- 2016-6304
- 2016-6305
- 2016-6306
- 2016-6307
- 2016-6308
FortiAP versions 5.4.1 and below are impacted by all CVEs included in the OpenSSL Advisory
Solutions
For FortiOS: Upgrade to firmware version 5.2.10 or 5.4.2 or 5.6.0
For FortiAnalyzer: Upgrade to firmware version 5.2.10 or 5.4.2 or 5.6.0
For FortiSwitch: Upgrade to firmware version 3.5.1
For FortiAP: Upgrade to firmware version 5.4.2