Splunk Enterprise 6.1.2, 6.0.5 and 5.0.9 address two vulnerabilities - July 1, 2014
Table of Contents
Splunk Enterprise versions 6.1.2, 6.0.5 and 5.0.9 address the following two OpenSSL vulnerabilities:
- OpenSSL susceptible to man-in-the-middle via CCS Injection (SPL-85063, CVE-2014-0224)
- OpenSSL anonymous ECDH cipher suite contains weakness (SPL-85063, CVE-2014-3470)
At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no CVE Identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2.
Affected Products and Components
The security vulnerabilities addressed by these maintenance releases affect indexers, search heads, forwarders, deployment servers, and license servers in the following versions:
- SPL-85063: All versions of Splunk Enterprise prior to 6.1.2, 6.0.5 and 5.0.9.
Mitigation and Upgrades
To mitigate this issue, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.
Vulnerability Descriptions and Ratings
OpenSSL susceptible to man-in-the-middle via CCS Injection (SPL-85063, CVE-2014-0224)
Description: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
CVSS Severity (version 2.0):
|CVSS Base Score||6.8|
|CVSS Impact Subscore||6.4|
|CVSS Exploitability Subscore||8.6||Overall CVSS Score||6.8|
OpenSSL anonymous ECDH cipher suite contains weakness (SPL-85063, CVE-2014-3470)
Description: The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
CVSS Severity (version 6.0):
|CVSS Base Score||4.3|
|CVSS Impact Subscore||2.9|
|CVSS Exploitability Subscore||8.6||Overall CVSS Score||4.3|