Reset Search
 

 

Article

JSA10327 - CERT-CA02002-031, Released 07/31/02

« Go Back

Information

 
Product AffectedIVE OS Software Releases 2.x and 1.x
Problem
As outlined in the CERT® Advisory CA-2002-23 Multiple Vulnerabilities In OpenSSL (link below), a remote exploit is possible when the PCS acts as an SSL client or as an SSL server. When customers browse to any https site, the PCS acts as an SSL client but from a customer's browser the PCS acts as an SSL server.
Solution
Please see attached .pdf file for complete bulletin text.
Workaround
Implementation
All customers running any PCS Software version earlier than 3.3.1 GA Patch 1 (build 5847) should upgrade to 3.3.1 GA Patch 1. All customers running 4.0 GA (build 5531) should upgrade to 4.0 GA Patch 1 (build 5871).
Related Links
CVSS Score
Risk Assessment
Acknowledgements
Alert TypePSN - Product Support Notification
Risk Level 
Attachment 2 
Legacy IDPSN-2004-07-011, JSA10327

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255