Reset Search
 

 

Article

JSA10482 - 2011-07 Out of Cycle Security Bulletin: Multiple Products; TLS/SSL Renegotiation Vulnerability (CVE-2009-3555)

« Go Back

Information

 
Product AffectedPCS500, PCS700, PCS2000, PCS2500, PCS4000, PCS4500, PCS6000, PCS6500, PCS4000 FIPS, PCS6000 FIPS, PCS4500 FIPS, PCS6500 FIPS, MAG PCS2600, MAG PCS4610, MAG PCS160, MAG PCS360
PPS4000, PPS4500, PPS6500, PPS6500, PPS6500 FIPS
Problem
The Pulse Secure products, listed above, have resolved CVE-2009-3555, in accordance with IETF standards.

CVE-2009-3555 summary: The TLS protocol, and the SSL protocol 3.0 and possibly earlier, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue. (Note: US-CERT identifies this issue as VU#120541.)

Any workarounds published by Pulse Secure are still valid however upgrade is recommended.
 
Solution
For customers who are concerned with this issue, upgrade is recommended to the following or later releases:

PCS: 7.1R1
PPS: 4.1R1
SBR EE/GEE: 6.16

SBR Note: If you have SBR version 5.41 or 6.0x, the upgrades listed above may (depending on your support plan) require purchasing a license. You may instead patch your existing version at no cost. If you have an SBR Appliance, the upgrades listed above are not applicable. Patching the appliance is recommend. Either way, go to the Pulse Secure support site for instructions on obtaining and installing the patch for your version.
Workaround
Implementation
Related Links
CVSS Score5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)
Risk Assessment- Based on the available public information, this vulnerability is seen to be difficult to exploit on Pulse Secure's products. Existing Best Common Practices (BCP) to limit the "attack surface" are effective tools to limit potential risk to Pulse Secure products.
Acknowledgements
Alert TypePSN - Product Support Notification
Risk LevelMedium
Attachment 1 
Attachment 2 
Legacy IDPSN-2011-06-290, JSA10482

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255