Splunk 6.0.3 addresses two vulnerabilities

Advisory ID: SP-CAAAMB3

CVE ID: -

Published: 2014-04-10

Last Update: 

CVSSv3.1 Score: -, 

CVSSv3.1 Vector: -

CWE: -

Bug ID: -

Description

Splunk version 6.0.3 addresses the following two vulnerabilities:

  • OpenSSL 1.0.1 TLS Heartbeat leaks sensitive information (SPL-82696, CVE-2014-0160)
  • Invalid TLS handshake could crash OpenSSL with a NULL pointer exception (SPL-78823, CVE-2013-4353)

  • At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no CVE Identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2.

Affected Products and Components

The security vulnerabilities addressed by this maintenance release affect indexers, search heads, forwarders, deployment servers, and license servers in the following versions:

  • SPL-82696: Splunk 6.0.0, 6.0.1, 6.0.2
  • SPL-78823: Splunk 6.0.0, 6.0.1, 6.0.2

    Mitigation and Upgrades

    To mitigate this issue, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.

Vulnerability Descriptions and Ratings

OpenSSL 1.0.1 TLS Heartbeat leaks sensitive information (SPL-82696, CVE-2014-0160)

Description: The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS Severity (version 2.0):

CVSS Base Score 5.0

CVSS Impact Subscore 2.9

CVSS Exploitability Subscore 10.0

Overall CVSS Score 5.0

Invalid TLS handshake could crash OpenSSL with a NULL pointer exception (SPL-78823, CVE-2013-4353)

Description: The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.

CVSS Severity (version 2.0):

CVSS Base Score 4.3

CVSS Impact Subscore 2.9

CVSS Exploitability Subscore 8.6

Overall CVSS Score 4.3

Document History

  • 2014-Apr-10: Rev 1. Initial Release