Splunk Enterprise 6.2.2 addresses two vulnerabilities

Advisory ID: SP-CAAANXD

CVE ID: -

Published: 2015-03-24

Last Update: 2015-03-24

CVSSv3.1 Score: -, Medium

CVSSv3.1 Vector: -

CWE: -

Bug ID: SPL-95206, SPL-95205, SPL-95204, SPL-97914, SPL-91660

Description

Splunk Enterprise versions 6.1.7, 6.0.8, and 5.0.12 address two vulnerabilities.

  • Multiple vulnerabilities in OpenSSL prior to 1.0.1k and 0.98zd (SPL-95206, SPL-95205, SPL-95204, CVE-2014-3572, CVE-2015-0204)
  • Path Traversal Vulnerability in Search Inspector (SPL-97914, SPL-91660)

At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no CVE Identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2.

Affected Products and Components

  • Multiple vulnerabilities in OpenSSL prior to 1.0.1k and 0.98zd (SPL-95206, SPL-95205, SPL-95204, CVE-2014-3572, CVE-2015-0204
    • Affected Versions: These vulnerabilities affect all versions of Splunk Enterprise 6.1.x before 6.1.7, 6.0.x before 6.0.8, and 5.0.x before 5.0.12.
    • Affected Components: All Splunk Enterprise components.
  • Path Traversal Vulnerability in Search Inspector (SPL-97914, SPL-91660)
    • Affected Versions: These vulnerabilities affect all versions of 6.0.x before 6.0.8, and 5.0.x before 5.0.12.
    • Unaffected Versions: These vulnerabilities do not affect Splunk Enterprise 6.1.x or 6.2.x.
    • Affected Components: Search Heads, Heavy Forwarders with Splunk Web enabled.
  • Unaffected Components: Indexers, Deployment Server, Universal Forwarders.

    Mitigation and Upgrades

    To mitigate these issues, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk Enterprise releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.

Vulnerability Descriptions and Ratings

Multiple vulnerabilities in OpenSSL prior to 1.0.1k and 0.98zd (SPL-95206, SPL-95205, SPL-95204, CVE-2014-3572, CVE-2015-0204

Description: OpenSSL versions prior to 1.0.1k and 0.98zd do not properly validate session parameters. These vulnerabilities could cause a Splunk instance communicating with a malicious server to not properly use ephemeral keys (CVE-2014-3572) or use weaker RSA keys (CVE-2015-0204).

CVSS Severity (version 2.0):

CVSS Base Score 3.6

CVSS Impact Subscore 4.9

CVSS Exploitability Subscore 3.9

Overall CVSS Score 3.6

Path Traversal Vulnerability in Search Inspector (SPL-97914, SPL-91660)

Description: A path traversal vulnerability exists in Splunk Enterprise versions 6.0.x prior to 6.0.8 and 5.0.x prior to 5.0.12. This vulnerability permits an authenticated user to read arbitrary files on the host running Splunk Web.

CVSS Severity (version 2.0):

CVSS Base Score 6.8

CVSS Impact Subscore 6.9

CVSS Exploitability Subscore 8.0

Overall CVSS Score 6.8

Document History

  • 2015-Mar-24: Rev 1. Initial Release