OpenSSL SSL_MODE_RELEASE_BUFFERS Vulnerabilities in NetApp Products
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
Subscribe to NTAP-20140609-0003 updates
Subscribe to NTAP-20140609-0003 advisory updates
Unsubscribe from NTAP-20140609-0003 advisory updates
Unsubscribe from NTAP-20140609-0003 advisory updates
Advisory ID: NTAP-20140609-0003 Version: 23.0 Last updated: 12/23/2014 Status: Final. CVEs: CVE-2014-0198, CVE-2010-5298
Summary
Specified NetApp products are affected by two vulnerabilities in the OpenSSL libraries, which may result in a denial-of-service attack. Several NetApp products incorporate the OpenSSL software libraries to provide cryptographic capabilities. The OpenSSL releases prior to 1.0.0m and 1.0.1h are affected by two vulnerabilities related to SSL_MODE_RELEASE_BUFFERS. Both of these vulnerabilities require that SSL_MODE_RELEASE_BUFFERS be enabled. CVE-2014-0198 addresses SSL_MODE_RELEASE_BUFFERS in the do_ssl3_write function, which can allow an attacker to cause a denial-of-service condition with a NULL pointer dereference. CVE-2010-5298 addresses a race condition in the ssl3_read_bytes function that can allow data injection across sessions or cause a denial of service attack.
Impact
Successful exploitation of these vulnerabilities can allow compromise of data integrity and denial of service.
Vulnerability Scoring Details
CVE | Score | Vector |
---|---|---|
CVE-2010-5298 | 3.8 (LOW) | AV:N/AC:H/Au:N/C:N/I:P/A:P/E:F/RL:U/RC:C |
CVE-2014-0198 | 4.1 (MEDIUM) | AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:U/RC:C |
Exploitation and Public Announcements
NetApp is aware of public discussion of this vulnerability.
References
Affected Products
None.
Products Not Affected
- 7-Mode Transition Tool
- ATTO FibreBridge
- Brocade Fabric Operating System Firmware
- Brocade Network Advisor Software
- Clustered Data ONTAP
- Clustered Data ONTAP Antivirus Connector
- Data ONTAP operating in 7-Mode
- E-Series SANtricity Management Plug-ins (VMware vCenter)
- E-Series SANtricity Storage Manager
- E-Series SANtricity Web Services (REST API) for Web Services Proxy
- FAS/AFF BIOS
- Host Utilities - SAN for Linux
- Host Utilities - SAN for Windows
- NetApp Cloud Backup (formerly AltaVault)
- NetApp Manageability SDK
- NetApp NFS Plug-in for VMware VAAI
- NetApp Plug-in for Symantec NetBackup
- NetApp SANtricity SMI-S Provider
- NetApp SMI-S Provider
- NetApp Storage Encryption
- NetApp VASA Provider for Clustered Data ONTAP 7.2 and above
- OnCommand Cloud Manager
- OnCommand Insight
- OnCommand System Manager 9.x
- OnCommand Unified Manager for 7-Mode (core package)
- OnCommand Workflow Automation
- Open Systems SnapVault Agent
- RAID Controller CTS2600 Legacy Engenio
- Service Processor
- Single Mailbox Recovery
- Snap Creator Framework
- SnapDrive for Unix
- SnapDrive for Windows
- SnapManager for Exchange
- SnapManager for Hyper-V
- SnapManager for MS SQL
- SnapManager for Oracle
- SnapManager for SAP
- SnapManager for Sharepoint
- Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 7.2 and above
- Storage Services Connector
- StorageGRID (formerly StorageGRID Webscale)
- StorageGRID9 (9.x and prior)
- System Setup
- Virtual Storage Console for VMware vSphere 7.2 and above
Software Versions and Fixes
None.
This section will be updated as patches are released.
Workarounds
None
Obtaining Software Fixes
Software fixes will be made available through the NetApp Support website in the Software Download section.
https://mysupport.netapp.com/site/downloads/
Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.
Contact Information
Check http://mysupport.netapp.com for further
updates.
For questions, contact NetApp at:
Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)
Status of This Notice
Final.
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20140609-0003
Revision History
Revision # | Date | Comments |
---|---|---|
1.0 | 20140609 | Initial Public Release |
2.0 | 20140610 | Updated affected products. |
3.0 | 20140611 | Updated products not affected. |
4.0 | 20140612 | Updated products not affected. |
5.0 | 20140613 | Updated products not affected. |
6.0 | 20146017 | Updated affected & not affected products. |
7.0 | 20146021 | Updated affected & not affected products. |
8.0 | 20140710 | Updated affected & not affected products. |
9.0 | 20140714 | Updated not affected products. |
10.0 | 20140716 | Updated not affected products. |
11.0 | 2014724 | Updated products not affected. |
12.0 | 2014731 | Updated products affected & not affected. |
13.0 | 20140804 | Updated products affected & not affected. |
14.0 | 20140904 | Updated products not affected. |
15.0 | 20140908 | Updated fixed available software. |
16.0 | 20140910 | Updated fixed available software. |
17.0 | 20140911 | Updated fixed available software. |
18.0 | 20140918 | Updated fixed available software & products not affected. |
19.0 | 20141002 | KB transition - no content change. |
20.0 | 20141106 | Added link to the advisory; formatting. |
21.0 | 20141110 | Updated Software Versions and Fixes; formatting. |
22.0 | 20141112 | Updated Software Versions and Fixes. |
23.0 | 20141223 | Final update. |
This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.