Blue Coat ProxySG 6.5.x Multiple OpenSSL Vulnerabilities

medium Nessus Plugin ID 76165

Synopsis

The remote device is potentially affected by multiple vulnerabilities.

Description

The remote Blue Coat ProxySG device's SGOS self-reported version is 6.5 prior to 6.5.4.4 and, therefore, contains a bundled version of OpenSSL that contains multiple flaws. It is, therefore, potentially affected by the following vulnerabilities :

- An error exists in the function 'ssl3_read_bytes' that could allow data to be injected into other sessions or allow denial of service attacks. Note this issue is only exploitable if 'SSL_MODE_RELEASE_BUFFERS' is enabled. (CVE-2010-5298)

- An error exists in the function 'do_ssl3_write' that could allow a NULL pointer to be dereferenced leading to denial of service attacks. Note this issue is exploitable only if 'SSL_MODE_RELEASE_BUFFERS' is enabled. (CVE-2014-0198)

- An unspecified error exists that could allow an attacker to cause usage of weak keying material, leading to simplified man-in-the-middle attacks.
(CVE-2014-0224)

Solution

Upgrade to version 6.5.4.4 or later.

See Also

https://bto.bluecoat.com/security-advisory/sa80

Plugin Details

Severity: Medium

ID: 76165

File Name: bluecoat_proxy_sg_6_5_4_4.nasl

Version: 1.11

Type: local

Family: Firewalls

Published: 6/20/2014

Updated: 11/26/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2014-0224

Vulnerability Information

CPE: cpe:/o:bluecoat:sgos

Required KB Items: Host/BlueCoat/ProxySG/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/6/2014

Vulnerability Publication Date: 4/12/2014

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-5298, CVE-2014-0198, CVE-2014-0224

BID: 66801, 67193, 67899

CERT: 978508